
Binxing Fang
Bingxing Fang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j71]Peiyi Han
, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan
, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [j70]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. Comput. Commun. 150: 455-462 (2020) - [j69]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun
, Zhihong Tian
:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j68]Jing Qiu
, Zhihong Tian
, Chunlai Du, Qi Zuo, Shen Su
, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j67]Tiantian Ji
, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j66]Mingtao Lei, Lingyang Chu, Zhefeng Wang, Jian Pei, Caifeng He, Xi Zhang, Binxing Fang:
Mining top-k sequential patterns in transaction database graphs. World Wide Web 23(1): 103-130 (2020) - [j65]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:
Scene text reading based cloud compliance access. World Wide Web 23(4): 2633-2647 (2020) - [c164]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CIKM 2020: 1445-1454 - [c163]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. ESORICS (1) 2020: 419-439 - [c162]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. ISCC 2020: 1-7 - [i12]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Jiawen Diao, Tian Wang, Weiqiang Yu:
First Step Towards Modeling Unbreakable Malware. CoRR abs/2008.06163 (2020) - [i11]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CoRR abs/2009.03823 (2020)
2010 – 2019
- 2019
- [j64]Mingtao Lei
, Xi Zhang
, Jincui Yang, Binxing Fang:
Efficiently Approximating Top- $k$ Sequential Patterns in Transactional Graphs. IEEE Access 7: 62817-62832 (2019) - [j63]Shang Li
, Hongli Zhang, Lin Ye
, Xiaoding Guo, Binxing Fang:
MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction. IEEE Access 7: 151144-151155 (2019) - [j62]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
A competitive model of popularity prediction using correlation matrix. Clust. Comput. 22(Supplement): 2747-2759 (2019) - [j61]Dongyang Zhan, Lin Ye
, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j60]Jinlin Wang
, Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu:
DRAV: Detection and repair of data availability violations in Internet of Things. Int. J. Distributed Sens. Networks 15(11) (2019) - [j59]Qingfeng Tan
, Yue Gao
, Jinqiao Shi, Xuebin Wang
, Binxing Fang, Zhihong Tian
:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j58]Jirui Li
, Xiaoyong Li
, Jie Yuan
, Rui Zhang, Binxing Fang:
Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things. IEEE Internet Things J. 6(2): 2778-2796 (2019) - [j57]Xi Zhang
, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing stock market prediction with extended coupled hidden Markov model over multi-sourced data. Knowl. Inf. Syst. 61(2): 1071-1090 (2019) - [j56]Zhongru Wang, Yuntao Zhang, Zhihong Tian
, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi
:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j55]Zhongru Wang, Binxing Fang:
Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J. Supercomput. 75(9): 5946-5964 (2019) - [j54]Zhongru Wang, Binxing Fang:
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J. Supercomput. 75(9): 5965 (2019) - [j53]Xi Zhang
, Yuan Su, Siyu Qu, Sihong Xie, Binxing Fang, Philip S. Yu:
IAD: Interaction-Aware Diffusion Framework in Social Networks. IEEE Trans. Knowl. Data Eng. 31(7): 1341-1354 (2019) - [c161]Yue Wu, Zhongru Wang, Qiang Ruan, Jinyu Shi, Binxing Fang:
Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain. BigComp 2019: 1-7 - [c160]Jieyun Huang, Xi Zhang, Binxing Fang:
CoStock: A DeepFM Model for Stock Market Prediction with Attentional Embeddings. BigData 2019: 5522-5531 - [c159]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c158]Mingtao Lei, Xi Zhang, Jincui Yang, Binxing Fang:
PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs. DASFAA (3) 2019: 254-258 - [c157]Yuan Su, Xi Zhang, Senzhang Wang, Binxing Fang, Tianle Zhang, Philip S. Yu:
Understanding Information Diffusion via Heterogeneous Information Network Embeddings. DASFAA (1) 2019: 501-516 - [c156]Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. DSC 2019: 46-53 - [c155]Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. DSC 2019: 373-380 - [c154]Jie Lin, Chuanyi Liu, Xinyi Zhang, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. DSC 2019: 528-535 - [c153]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. DSC 2019: 686-693 - [c152]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. HPCC/SmartCity/DSS 2019: 1743-1748 - [c151]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu:
EDCleaner: Data Cleaning for Entity Information in Social Network. ICC 2019: 1-7 - [c150]Wenfeng Liu, Yu Zhang, Yongyue Li, Binxing Fang:
Modeling, Measuring, and Analyzing the Resolution Process of Popular Domains. ICC 2019: 1-7 - [c149]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Binxing Fang:
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash. ICC 2019: 1-7 - [c148]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c147]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6 - [c146]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - [c145]Shang Li
, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. ICAIS (1) 2019: 148-158 - [c144]Jie Lin, Chuanyi Liu, Binxing Fang:
Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile. ICITEE 2019: 144:1-144:5 - [c143]Shang Li
, Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang:
Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges. ICTAI 2019: 660-667 - [c142]Muqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang:
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel. ISCC 2019: 1-7 - [c141]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic. ISCC 2019: 1-7 - [i10]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019) - [i9]Mingtao Lei, Xi Zhang, Lingyang Chu, Zhefeng Wang, Philip S. Yu, Binxing Fang:
Finding Route Hotspots in Large Labeled Networks. CoRR abs/1911.11354 (2019) - 2018
- [j52]Guofeng Wang
, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j51]Guofeng Wang
, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo
, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [j50]Xi Zhang
, Siyu Qu, Jieyun Huang
, Binxing Fang, Philip S. Yu:
Stock Market Prediction via Multi-Source Multiple Instance Learning. IEEE Access 6: 50720-50728 (2018) - [j49]Jirui Li
, Xiaoyong Li
, Yunquan Gao
, Jie Yuan, Binxing Fang:
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things. IEEE Access 6: 74579-74597 (2018) - [j48]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li
, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018) - [j47]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting investors social network for stock prediction in China's market. J. Comput. Sci. 28: 294-303 (2018) - [j46]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving stock market prediction via heterogeneous information fusion. Knowl. Based Syst. 143: 236-247 (2018) - [j45]Lihua Yin, Yanwei Sun
, Zhen Wang, Yunchuan Guo
, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j44]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018) - [c140]Liyan Shen, Xiaojun Chen, Dakui Wang, Binxing Fang, Ye Dong:
Efficient and Private Set Intersection of Human Genomes. BIBM 2018: 761-764 - [c139]Zhongyue Pei, Xi Zhang, Fangwei Zhang, Binxing Fang:
Attributed Multi-layer Network Embedding. BigData 2018: 3701-3710 - [c138]Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. DSC 2018: 39-44 - [c137]Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:
Virtual Community Detection Model and Related Research in Online Social Networks. DSC 2018: 61-68 - [c136]Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:
SLBot: A Serverless Botnet Based on Service Flux. DSC 2018: 181-188 - [c135]Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. DSC 2018: 242-249 - [c134]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391 - [c133]Shang Li
, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. DSC 2018: 392-397 - [c132]Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. DSC 2018: 659-664 - [c131]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. DSC 2018: 811-818 - [c130]Fangfang Yuan, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, Binxing Fang:
Insider Threat Detection with Deep Neural Network. ICCS (1) 2018: 43-54 - [c129]Pin Lv, Jing Ya, Tingwen Liu, Jinqiao Shi, Binxing Fang, Zhaojun Gu:
You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse. ICCS (1) 2018: 221-233 - [c128]Yanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang:
Identifying the Propagation Sources of Stealth Worms. ICCS (3) 2018: 811-817 - [c127]Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. IFIP Int. Conf. Digital Forensics 2018: 199-224 - [c126]Chao Zheng, Qiuwen Lu, Jia Li, Qinyun Liu, Binxing Fang:
A flexible and efficient container-based NFV platform for middlebox networking. SAC 2018: 989-995 - [c125]Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:
Individual Analysis Model and Related Research in Social Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1837-1843 - [i8]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving Stock Market Prediction via Heterogeneous Information Fusion. CoRR abs/1801.00588 (2018) - [i7]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting Investors Social Network for Stock Prediction in China's Market. CoRR abs/1801.00597 (2018) - [i6]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018) - [i5]Xi Zhang, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing Stock Market Prediction with Extended Coupled Hidden Markov Model over Multi-Sourced Data. CoRR abs/1809.00306 (2018) - [i4]Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu, Binxing Fang:
Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method. CoRR abs/1811.10857 (2018) - [i3]Yu Han, Zhongru Wang, Qiang Ruan, Binxing Fang:
Sapiens Chain: A Blockchain-based Cybersecurity Framework. CoRR abs/1811.10868 (2018) - 2017
- [j43]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017) - [j42]Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, Hongtao Xie, Binxing Fang:
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j41]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Zhikai Xu:
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach. IEICE Trans. Inf. Syst. 100-D(10): 2307-2318 (2017) - [j40]Binxing Fang, Yan Jia, Xiaoyong Li, Aiping Li, Xindong Wu
:
Big Search in Cyberspace. IEEE Trans. Knowl. Data Eng. 29(9): 1793-1805 (2017) - [c124]Yuan Su, Xi Zhang, Sihong Xie, Philip S. Yu, Binxing Fang:
Efficient Revenue Maximization for Viral Marketing in Social Networks. ADMA 2017: 209-224 - [c123]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. DSC 2017: 74-81 - [c122]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
Predicting the Popularity of News Based on Competitive Matrix. DSC 2017: 151-155 - [c121]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6 - [c120]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c119]Shang Li
, Zhigang Zhou, Hongli Zhang, Binxing Fang:
An approximate search framework for big data. ICC 2017: 1-6 - [c118]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang:
A closer look at Eclipse attacks against Tor hidden services. ICC 2017: 1-6 - [c117]Chuanyi Liu, Guofeng Wang, Peiyi Han, Hezhong Pan, Binxing Fang:
A Cloud Access Security Broker based approach for encrypted data search and sharing. ICNC 2017: 422-426 - [c116]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. SecureComm 2017: 530-549 - [c115]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
SafeBox: A scheme for searching and sharing encrypted data in cloud applications. SPAC 2017: 648-653 - [i2]Xi Zhang, Yuan Su, Siyu Qu, Sihong Xie, Binxing Fang, Philip S. Yu:
IAD: Interaction-Aware Diffusion Framework in Social Networks. CoRR abs/1709.01773 (2017) - 2016
- [j39]Yuan Su, Xi Zhang, Lixin Liu, Shouyou Song, Binxing Fang:
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective. Frontiers Comput. Sci. 10(3): 518-531 (2016) - [j38]Shen Su, Binxing Fang:
Towards Route Dynamics in AS-Level Path Prediction. IEICE Trans. Commun. 99-B(2): 412-421 (2016) - [j37]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
SNGR: Scalable Name-Based Geometric Routing for ICN. IEICE Trans. Commun. 99-B(8): 1835-1845 (2016) - [j36]Xi Yin, Binxing Fang, Shuyuan Jin, Meikang Qiu, Athanasios V. Vasilakos, Yongjun Xu:
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G. Int. J. Commun. Syst. 29(16): 2375-2387 (2016) - [j35]Peiyi Han, Chuanyi Liu
, Binxing Fang, Guofeng Wang, Xiaobao Song, Lei Wan:
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective. Sci. Program. 2016: 8057208:1-8057208:9 (2016) - [c114]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Shen Su:
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI. ICC 2016: 1-6 - [c113]Yuan Su, Xi Zhang, Philip S. Yu, Wen Hua, Xiaofang Zhou, Binxing Fang:
Understanding Information Diffusion under Interactions. IJCAI 2016: 3875-3881 - [c112]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009 - [c111]Jiali Dong, Xiaoyong Li, Binxing Fang:
A Recommendation System Based on Multi-attribute. ICSS 2016: 165-169 - [c110]Jiali Dong, Xiaoyong Li, Binxing Fang:
Community-Based Recommendations: A Solution to the Vulnerability Problem. SKG 2016: 150-153 - 2015
- [c109]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du:
Geometric Routing on Flat Names for ICN. GLOBECOM 2015: 1-6 - [c108]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - [c107]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108 - [c106]Peng Wang, Chuan Zhou, Peng Zhang, Weiwei Feng, Li Guo, Binxing Fang:
Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data. PAKDD (2) 2015: 79-91 - 2014
- [j34]Chenye Qiu, Chunlu Wang, Binxing Fang, Xingquan Zuo:
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis. Appl. Artif. Intell. 28(6): 555-576 (2014) - [j33]Yi Han, Binxing Fang, Yan Jia:
Predicting the topic influence trends in social media with multiple models. Neurocomputing 144: 463-470 (2014) - [j32]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Liu Yan:
Designing robust routing protocols to protect base stations in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(17): 1613-1626 (2014) - [c105]Zhi Qiao, Peng Zhang, Yanan Cao, Chuan Zhou, Li Guo, Binxing Fang:
Combining Heterogenous Social and Geographical Information for Event Recommendation. AAAI 2014: 145-151 - [c104]Licai Liu, Bingxing Fang, Beiting Yi:
A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things. APWeb Workshophs 2014: 312-324 - [c103]Jie Lin, Chuanyi Liu, Zhichun Ning, Binxing Fang:
Detecting the run time attacks in the cloud with an evidence collection based approach. CCIS 2014: 514-518 - [c102]Jie Lin, Chuanyi Liu, Binxing Fang:
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine. CCS 2014: 1466-1468 - [c101]Licai Liu, Lihua Yin, Yunchuan Guo, Bingxing Fang:
EAC: A Framework of Authentication Property for the IOTs. CyberC 2014: 102-105 - [c100]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye:
Quantifying AS-level routing policy changes. ICC 2014: 1148-1153 - [c99]Yunchuan Guo, Lihua Yin, Licai Liu, Binxing Fang:
Utility-based cooperative decision in cooperative authentication. INFOCOM 2014: 1006-1014 - [c98]Lei Jiang, Qiong Dai, Qiu Tang, Jianlong Tan, Binxing Fang:
A fast regular expression matching engine for NIDS applying prediction scheme. ISCC 2014: 1-7 - [c97]Jinqiao Shi, Xiao Wang, Binxing Fang, Li Guo:
A Moving Target Framework to Improve Network Service Accessibility. NAS 2014: 281-286 - [c96]Peng Wang, Peng Zhang, Yanan Cao, Li Guo, Binxing Fang:
Forward Classification on Data Streams. PAKDD (1) 2014: 261-272 - [c95]