default search action
Chunjie Cao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun:
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification. Comput. Secur. 137: 103606 (2024) - [i5]Binghui Zou, Chunjie Cao, Longjuan Wang, Yinan Cheng, Jingzhang Sun:
Feature graph construction with static features for malware detection. CoRR abs/2404.16362 (2024) - 2023
- [c30]Zhiyuan Liu, Chunjie Cao, Fangjian Tao, Jingzhang Sun:
Revisiting Graph Contrastive Learning for Anomaly Detection. ECAI 2023: 1585-1592 - [c29]Sizheng Fu, Chunjie Cao, Fangjian Tao, Binghui Zou, Xiaoyu Lin, Jingzhang Sun:
LGWAE: Label-Guided Weighted Autoencoder Network for Flexible Targeted Attacks of Deep Hashing. IJCNN 2023: 1-9 - [c28]Yinglin Wang, Chunjie Cao, Yifan Li, Qianlin Dong, Haoran Li, Jingzhang Sun:
Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage Network. NaNA 2023: 551-557 - [c27]Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer:
FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets. USENIX Security Symposium 2023: 1343-1360 - [i4]Zhiyuan Liu, Chunjie Cao, Fangjian Tao, Jingzhang Sun:
Revisiting Graph Contrastive Learning for Anomaly Detection. CoRR abs/2305.02496 (2023) - 2022
- [j11]Libin Xu, Chunjie Cao:
A Short Signal Backoff MAC Protocol Based on Game Theory for Underwater Sensor Networks. IEEE Access 10: 125992-126000 (2022) - [j10]Binghui Zou, Chunjie Cao, Fangjian Tao, Longjuan Wang:
IMCLNet: A lightweight deep neural network for Image-based Malware Classification. J. Inf. Secur. Appl. 70: 103313 (2022) - [c26]Yuhao Lin, Ying Li, Mianxue Gu, Hongyu Sun, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey. DSN Workshops 2022: 141-146 - [c25]Xiaoyu Lin, Chunjie Cao, Longjuan Wang, Zhiyuan Liu, Mengqian Li, Haiying Ma:
DCAL: A New Method for Defending Against Adversarial Examples. ICAIS (2) 2022: 38-50 - [c24]Mianxue Gu, Hantao Feng, Hongyu Sun, Peng Liu, Qiuling Yue, Jinglu Hu, Chunjie Cao, Yuqing Zhang:
Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection. INFOCOM Workshops 2022: 1-6 - [c23]Yifan Li, Chunjie Cao, Hong Zhang, Xiuhua Wen, Yang Sun, Keqi Zhan:
Feature Extraction and Identification of Specific Radiation Sources Based on Axial Integral Bispectrum and Deep Residual Shrinkage Network. NaNA 2022: 13-18 - [c22]Haifeng Peng, Chunjie Cao, Yang Sun, Haoran Li, Xiuhua Wen:
Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning. NaNA 2022: 67-73 - [c21]Daling Shi, Chunjie Cao, Jun Ye:
Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption. SocialSec 2022: 324-338 - [c20]Zhaoxing Jing, Chunjie Cao, Longjuan Wang, Yulian Sang:
Secure Data Storage Scheme of Judicial System Based on Blockchain. SocialSec 2022: 339-350 - [c19]Xiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun:
DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification. TrustCom 2022: 192-200 - [c18]Haifeng Peng, Chunjie Cao, Yang Sun, Haoran Li, Kangrui Ye:
Deep Learning and Data Randomness based Blind Recognition of Channel Codes. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1441-1448 - [e1]Chunjie Cao, Yuqing Zhang, Yuan Hong, Ding Wang:
Frontiers in Cyber Security - 4th International Conference, FCS 2021, Haikou, China, December 17-19, 2021, Revised Selected Papers. Communications in Computer and Information Science 1558, Springer 2022, ISBN 978-981-19-0522-3 [contents] - [i3]Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, Mathias Payer:
FishFuzz: Throwing Larger Nets to Catch Deeper Bugs. CoRR abs/2207.13393 (2022) - [i2]Zhiyuan Liu, Chunjie Cao, Jingzhang Sun:
Mul-GAD: a semi-supervised graph anomaly detection framework via aggregating multi-view information. CoRR abs/2212.05478 (2022) - 2021
- [c17]Binghui Zou, Chunjie Cao, Longjuan Wang, Fangjian Tao:
DACN: Malware Classification Based on Dynamic Analysis and Capsule Networks. FCS 2021: 3-13 - [c16]Xiang Shu, Chunjie Cao, Longjuan Wang, Fangjian Tao:
GWDGA: An Effective Adversarial DGA. FCS 2021: 30-48 - [c15]Xi Luo, Chunjie Cao, Longjuan Wang:
Multi-modal Universal Embedding Representations for Language Understanding. FCS 2021: 103-119 - [c14]Xiuhua Wen, Chunjie Cao, Yang Sun, Yifan Li, Haifeng Peng, Mengnan Wang:
RF Transmitter Identification and Classification Based on Deep Residual Shrinkage Network. HPCC/DSS/SmartCity/DependSys 2021: 327-335 - [c13]Xin Zheng, Chunjie Cao, Jiaxian Deng:
DCDC-LSB: Double Cover Dark Channel Least Significant Bit Steganography. ICAIS (2) 2021: 360-375 - 2020
- [j9]Jinbo Xiong, Lei Chen, Md. Zakirul Alam Bhuiyan, Chunjie Cao, Minshen Wang, Entao Luo, Ximeng Liu:
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener. Comput. Syst. 111: 741-753 (2020) - [c12]Jianbin Mai, Chunjie Cao, Qian Wu:
Malware Variants Detection Based on Feature Fusion. CSS 2020: 67-77 - [c11]Qian Wu, Chunjie Cao, Jianbin Mai, Fangjian Tao:
Robust GAN Based on Attention Mechanism. CSS 2020: 78-86
2010 – 2019
- 2019
- [j8]Yucong Duan, Xiaobing Sun, Haoyang Che, Chunjie Cao, Zhao Li, Xiaoxian Yang:
Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources. IEEE Access 7: 99161-99176 (2019) - [j7]Zhen Guo, Hui Li, Chunjie Cao, Zhengxi Wei:
Verifiable algorithm for outsourced database with updating. Clust. Comput. 22(Supplement): 5185-5193 (2019) - [j6]Dandan Meng, Xianpeng Wang, Mengxing Huang, Chunjie Cao, Kun Zhang:
Block rank sparsity-aware DOA estimation with large-scale arrays in the presence of unknown mutual coupling. Digit. Signal Process. 94: 96-104 (2019) - [c10]Jilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou:
A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning Model. CSS (2) 2019: 263-274 - [c9]Tianjiao Yu, Chunjie Cao:
Privacy Protection in Blockchain Systems: A Review. DPTA 2019: 2045-2052 - [c8]Jun Ye, Chunjie Cao, Zhen Guo:
Fine-Grained Comparable Encryption Scheme in Multi-User Settings. GLOBECOM Workshops 2019: 1-7 - [c7]Fangjian Tao, Chunjie Cao, Zhihui Liu:
Webshell Detection Model Based on Deep Learning. ICAIS (4) 2019: 408-420 - [i1]Ao Huang, Mengxing Huang, Zhentang Shao, Xu Zhang, Di Wu, Chunjie Cao:
A Practical Marine Wireless Sensor Network Monitoring System Based on LoRa and MQTT. CoRR abs/1906.09571 (2019) - 2018
- [j5]Yuehao Guo, Xianpeng Wang, Wensi Wang, Mengxing Huang, Chong Shen, Chunjie Cao, Guoan Bi:
Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar. Sensors 18(9): 2788 (2018) - [c6]Minjun Zhao, Shiqin Liu, Chunjie Cao, Jiangyuan Yao, Xiaoyi Zhou:
A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic Matrix. ICCCS (4) 2018: 208-220 - [c5]Jingzhang Sun, Chunjie Cao, Hui Li:
Searchable Encryption Scheme Based on CPABE with Attribute Update in a Cloud Medical Environment. ICCCS (3) 2018: 265-276 - [c4]Huafei Wang, Xianpeng Wang, Mengxing Huang, Chunjie Cao, Guoan Bi:
Off-Grid DOA Estimation in Mutual Coupling via Robust Sparse Bayesian Learning. DSP 2018: 1-5 - [c3]Xianpeng Wang, Mengxing Huang, Chong Shen, Chunjie Cao, Kun Zhang, Guoan Bi:
Robust DOA Estimation for MIMO Radar in Unknown Nonuniform Noise and Mutual Coupling. SAM 2018: 194-197 - 2017
- [j4]Zhen Guo, Yu Fu, Chunjie Cao:
Secure first-price sealed-bid auction scheme. EURASIP J. Inf. Secur. 2017: 16 (2017) - [j3]Jiezhuo Zhong, Wei Wu, Chunjie Cao, Wenlong Feng:
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network. J. Electr. Comput. Eng. 2017: 3053202:1-3053202:7 (2017) - [j2]Chunjie Cao, Zhiqiang Zhang, Jingzhang Sun, Xianpeng Wang, Mengxing Huang:
Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling. J. Electr. Comput. Eng. 2017: 9080252:1-9080252:5 (2017) - [c2]Xianpeng Wang, Mengxing Huang, Chunjie Cao, Hui Li:
Angle Estimation of Noncircular Source in MIMO Radar via Unitary Nyström Method. CSPS 2017: 339-346 - 2014
- [c1]Li Yang, Jianfeng Ma, Wei Wang, Chunjie Cao:
Multi-domain Direct Anonymous Attestation Scheme from Pairings. NSS 2014: 566-573
2000 – 2009
- 2009
- [p1]Jianfeng Ma, Chunjie Cao:
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access. Guide to Wireless Mesh Networks 2009: 299-323 - 2008
- [j1]Chunjie Cao, Chao Yang, Jianfeng Ma, Sang-Jae Moon:
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP J. Wirel. Commun. Netw. 2008 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint