Exploring permission-induced risk in Android applications for malicious application detection W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014 | 217 | 2014 |
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang IEEE Transactions on Intelligent Transportation Systems, 2018 | 203 | 2018 |
An up-to-date comparison of state-of-the-art classification algorithms C Zhang, C Liu, X Zhang, G Almpanidis Expert Systems with Applications 82, 128-150, 2017 | 184 | 2017 |
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers W Wang, Y Li, X Wang, J Liu, X Zhang Future Generation Computer Systems 78, 987-994, 2018 | 138 | 2018 |
Decision theory for discrimination-aware classification F Kamiran, A Karim, X Zhang 2012 IEEE 12th International Conference on Data Mining, 924-929, 2012 | 118 | 2012 |
Processing of massive audit data streams for real-time anomaly intrusion detection W Wang, X Guan, X Zhang Computer Communications 31 (1), 58-72, 2008 | 116 | 2008 |
Collaborative User Network Embedding for Social Recommender Systems C Zhang, L Yu, Y Wang, C Shah, X Zhang Proceedings of the 2017 SIAM International Conference on Data Mining, 2017 | 110* | 2017 |
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data W Wang, X Guan, X Zhang, L Yang computers & security 25 (7), 539-550, 2006 | 104 | 2006 |
Data streaming with affinity propagation X Zhang, C Furtlehner, M Sebag Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008 | 103 | 2008 |
Attribute normalization in network intrusion detection W Wang, X Zhang, S Gombault, SJ Knapskog 2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009 | 92 | 2009 |
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang Knowledge-Based Systems 70, 103-117, 2014 | 89 | 2014 |
Controlling attribute effect in linear regression T Calders, A Karim, F Kamiran, W Ali, X Zhang 2013 IEEE 13th International Conference on Data Mining, 71-80, 2013 | 88 | 2013 |
Data Stream Clustering with Affinity Propagation X Zhang, C Furtlehner, C Germain-Renaud, M Sebag IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013 | 86 | 2013 |
A novel intrusion detection method based on principle component analysis in computer security W Wang, X Guan, X Zhang International Symposium on Neural Networks, 657-662, 2004 | 85 | 2004 |
Modeling program behaviors by hidden Markov models for intrusion detection W Wang, XH Guan, XL Zhang Proceedings of 2004 International Conference on Machine Learning and …, 2004 | 83 | 2004 |
Virtual machine migration in an over-committed cloud X Zhang, ZY Shae, S Zheng, H Jamjoom 2012 IEEE Network Operations and Management Symposium, 196-203, 2012 | 81 | 2012 |
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams AA Qahtan, B Alharbi, S Wang, X Zhang Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015 | 72 | 2015 |
K-AP: generating specified K clusters by efficient affinity propagation X Zhang, W Wang, K Nørvåg, M Sebag 2010 IEEE International Conference on Data Mining, 1187-1192, 2010 | 70 | 2010 |
Efficient task assignment in spatial crowdsourcing with worker and task privacy protection A Liu, W Wang, S Shang, Q Li, X Zhang GeoInformatica 22 (2), 335-362, 2018 | 61 | 2018 |
Abstracting massive data for lightweight intrusion detection in computer networks W Wang, J Liu, G Pitsilis, X Zhang Information Sciences 433, 417-430, 2018 | 57 | 2018 |