default search action
Chenghua Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Chenghua Tang, Min Hu, Mengmeng Yang, Baohua Qiang:
Malicious program ontology rule set based on association decision and linear discriminant. Int. J. Electron. Secur. Digit. Forensics 16(2): 135-159 (2024) - [j16]Chenghua Tang, Mengmeng Yang, Qingze Gao, Baohua Qiang:
PBDG: a malicious code detection method based on precise behaviour dependency graph. Int. J. Inf. Comput. Secur. 23(2): 163-189 (2024) - [j15]Ruidong Chen, Baohua Qiang, Mingliang Zhou, Shihao Zhang, Hong Zheng, Chenghua Tang:
An Adversarial and Deep Hashing-based Hierarchical Supervised Cross-Modal Image and Text Retrieval Algorithm. Int. J. Robotics Autom. 39(1): 77-86 (2024) - 2023
- [j14]Mengmeng Yang, Longxia Huang, Chenghua Tang:
K-Means Clustering with Local Distance Privacy. Big Data Min. Anal. 6(4): 433-442 (2023) - [j13]Chenghua Tang, Zheng Du, Mengmeng Yang, Baohua Qiang:
Android static taint analysis based on multi branch search association. Comput. Secur. 129: 103186 (2023) - [j12]Mengmeng Yang, Kwok-Yan Lam, Tianqing Zhu, Chenghua Tang:
SPoFC: A framework for stream data aggregation with local differential privacy. Concurr. Comput. Pract. Exp. 35(5) (2023) - 2022
- [c6]Chenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang:
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN. TrustCom 2022: 9-19 - 2021
- [j11]Yuan Xie, Jisheng Zhao, Baohua Qiang, Luzhong Mi, Chenghua Tang, Longge Li:
Attention Mechanism-Based CNN-LSTM Model for Wind Turbine Fault Prediction Using SSN Ontology Annotation. Wirel. Commun. Mob. Comput. 2021: 6627588:1-6627588:12 (2021)
2010 – 2019
- 2018
- [c5]Shensheng Tang, Chenghua Tang:
A Dual SIS Epidemic Model for Virus Spread Analysis in Cluster-Based Wireless Sensor Networks. MLICOM 2018: 652-662 - 2016
- [j10]Shensheng Tang, Rong Yu, Xiaojiang Chen, Chenghua Tang, Yi Xie:
Impact of sensing errors on the performance of an unreliable opportunistic spectrum sharing system. Int. J. Wirel. Mob. Comput. 10(3): 197-204 (2016) - [j9]Chenghua Tang, Xin Zhang, Lu Wang, Yu Wang, Baohua Qiang:
一种跨域网络资源的安全互操作模型 (Security Interoperation Model of Cross-domain Network Resources). 计算机科学 43(6): 141-145 (2016) - [j8]Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang:
Detection and classification of anomaly intrusion using hierarchy clustering and SVM. Secur. Commun. Networks 9(16): 3401-3411 (2016) - 2015
- [j7]Chenghua Tang, Jilong Tian, Lu Wang, Lina Wang, Baohua Qiang:
一种基于软集和多属性综合的软件漏洞发现方法 (Method for Software Vulnerability Discovery Based on Soft Set and Multi-attribute Comprehensiveness). 计算机科学 42(5): 183-187 (2015) - [j6]Chenghua Tang, Lina Wang, Baohua Qiang, Shensheng Tang, Xin Zhang:
基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity). 计算机科学 42(8): 166-169 (2015) - [j5]Chenghua Tang, Jilong Tian, Shensheng Tang, Xin Zhang, Lu Wang:
一种基于GA-FAHP的软件漏洞风险评估方法 (Risk Assessment of Software Vulnerability Based on GA-FAHP). 计算机科学 42(9): 134-138 (2015) - 2013
- [j4]Shensheng Tang, Yi Xie, Liqiang Zhang, Chenghua Tang:
Analysis of TDOA based radar target positioning in LOS and NLOS environments. Int. J. Wirel. Mob. Comput. 6(4): 313-320 (2013) - [j3]Yi Xie, Shensheng Tang, Xiangnong Huang, Chenghua Tang:
Modeling Web Session for Detecting Pseudo HTTP Traffic. J. Comput. 8(2): 341-348 (2013) - 2012
- [j2]Shensheng Tang, Yi Xie, Chenghua Tang, Jinwen Zhu:
A Comparative Study of Power Line Communication Networks With and Without Buffer. Int. J. Commun. Networks Inf. Secur. 4(2) (2012) - 2011
- [j1]Chenghua Tang, Yi Xie:
Implementation and Realization of Network Security Policy Based on Rule Engine. J. Networks 6(3): 438-445 (2011) - [c4]Chenghua Tang, Xin Wang, Reixia Zhang, Yi Xie:
Modeling and Analysis of Network Security Situation Prediction Based on Covariance Likelihood Neural. ICIC (3) 2011: 71-78
2000 – 2009
- 2008
- [c3]Chenghua Tang, Shunzheng Yu:
Assessment of Network Security Policy Based on Security Capability. CSSE (3) 2008: 906-910 - [c2]Chenghua Tang, Shunzheng Yu:
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism. NPC Workshops 2008: 88-95 - 2006
- [c1]Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao:
A Network Security Policy Model and Its Realization Mechanism. Inscrypt 2006: 168-181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 22:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint