Name
Affiliation
Papers
CHUNHE XIA
State Key Laboratory of Virtual Reality Technology and System, Beihang University, Beijing, China
49
Collaborators
Citations 
PageRank 
109
63
18.30
Referers 
Referees 
References 
175
941
346
Search Limit
100941
Title
Citations
PageRank
Year
Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV00.342022
FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification00.342022
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation00.342022
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis00.342021
A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.00.342020
An Information Source Identification Algorithm Based on Shortest Arborescence of Network00.342019
Feature Generation: A Novel Intrusion Detection Model Based On Prototypical Network00.342019
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods10.362019
Which Node Properties Identify The Propagation Source In Networks?00.342019
Topic Reconstruction: A Novel Method Based On Lda Oriented To Intrusion Detection00.342019
H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices00.342018
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.00.342018
On the satisfiability of authorization requirements in business process.00.342017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.10.362017
A Dynamic Placement Policy Of Virtual Machine Based On Moga In Cloud Environment00.342017
An Attack-Oriented Task Execution Collaborative Defense Protocol00.342017
CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud00.342017
The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation10.352015
A Method of Network Security Situation Assessment Based on Hidden Markov Model.10.362015
An Interval Algebra-based Modeling and Routing Method in Bus Delay Tolerant Network10.362015
Modeling, conflict detection, and verification of a new virtualization role‐based access control framework00.342015
Static Compliance Checking beyond Separation of Duty Constraints10.352014
Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.00.342014
An automated method of penetration testing00.342014
An Approach For Description Of Computer Network Defense Scheme And Its Simulation Verification10.352014
Coordinated Scan Detection Algorithm Based on the Global Characteristics of Time Sequence00.342014
Co-segmentation of 3D shapes via multi-view spectral clustering90.452013
A Computer Network Defense Policy Refinement Method00.342013
A Conflict-Related Rules Detection Tool for Access Control Policy10.362013
A Verification Method of Enterprise Network Reachability Based on Topology Path00.342013
Optimal Service Selection Based on Business for Cloud Computing10.352013
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach00.342013
On the Spatial-temporal Reachability of DTNs00.342013
A Botnet-Oriented Collaborative Defense Scheme Description Language00.342013
On the distribution of inter contact time for DTNs30.402012
Characterization and modeling in large-scale urban DTNs130.592012
Design and Implementation of Bus Net Routing Algorithm10.372011
Application for Artificial Bee Colony Algorithm in Migration of Mobile Agent20.392010
A tactical intelligence production model of computer network self-organizing operations00.342010
A Bulk Email Oriented Multi-party Non-repudiation Exchange Protocol00.342009
Research on Survivability of Mobile Ad Hoc Network00.342009
An Evaluation Model of CNO Intelligence Information Confidence10.432009
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment140.842008
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment10.402008
A Network Security Risk Assessment Framework Based on Game Theory70.572008
A New Type of Self-Adaptive Mechanism for Network Survivability Based on Intrusion Deception00.342008
Research on Simulation Framework of Structured P2P Network20.492007
P2P worm detection based on application identification10.372007
Non-repudiation protocol for E-mail and its formal analysis00.342006