default search action
Chun-lin Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jie Ying, Tiantian Zhu, Qiang Liu, Chunlin Xiong, Zhengqiu Weng, Tieming Chen, Lei Fu, Mingqi Lv, Han Wu, Ting Wang, Yan Chen:
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy. IEEE Trans. Mob. Comput. 23(4): 2832-2848 (2024) - [i2]Jie Ying, Tiantian Zhu, Wenrui Cheng, Qixuan Yuan, Mingjun Ma, Chunlin Xiong, Tieming Chen, Mingqi Lv, Yan Chen:
SPARSE: Semantic Tracking and Path Analysis for Attack Investigation in Real-time. CoRR abs/2405.02629 (2024) - [i1]Tiantian Zhu, Jie Ying, Tieming Chen, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Aohan Zheng, Mingqi Lv, Yan Chen:
Nip in the Bud: Forecasting and Interpreting Post-exploitation Attacks in Real-time through Cyber Threat Intelligence Reports. CoRR abs/2405.02826 (2024) - 2023
- [j13]Tieming Chen, Chenbin Zheng, Tiantian Zhu, Chunlin Xiong, Jie Ying, Qixuan Yuan, Wenrui Cheng, Mingqi Lv:
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends. Comput. Secur. 135: 103485 (2023) - [j12]Tiantian Zhu, Jinkai Yu, Chunlin Xiong, Wenrui Cheng, Qixuan Yuan, Jie Ying, Tieming Chen, Jiabo Zhang, Mingqi Lv, Yan Chen, Ting Wang, Yuan Fan:
APTSHIELD: A Stable, Efficient and Real-Time APT Detection System for Linux Hosts. IEEE Trans. Dependable Secur. Comput. 20(6): 5247-5264 (2023) - [c9]Fan Yang, Jiacen Xu, Chunlin Xiong, Zhou Li, Kehuan Zhang:
PROGRAPHER: An Anomaly Detection System based on Provenance Graph Embedding. USENIX Security Symposium 2023: 4355-4372 - 2022
- [j11]Chunlin Xiong, Zhenyuan Li, Yan Chen, Tiantian Zhu, Jian Wang, Hai Yang, Wei Ruan:
Generic, efficient, and effective deobfuscation and semantic-aware attack detection for PowerShell scripts. Frontiers Inf. Technol. Electron. Eng. 23(3): 361-381 (2022) - [j10]Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. IEEE Trans. Dependable Secur. Comput. 19(1): 551-565 (2022) - [j9]Runqing Yang, Xutong Chen, Haitao Xu, Yueqiang Cheng, Chunlin Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, Yan Chen:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. IEEE Trans. Dependable Secur. Comput. 19(3): 1621-1638 (2022) - 2021
- [j8]Tiantian Zhu, Jiayu Wang, Linqi Ruan, Chunlin Xiong, Jinkai Yu, Yaosheng Li, Yan Chen, Mingqi Lv, Tieming Chen:
General, Efficient, and Real-Time Data Compaction Strategy for APT Forensic Analysis. IEEE Trans. Inf. Forensics Secur. 16: 3312-3325 (2021)
2010 – 2019
- 2019
- [c8]Zhenyuan Li, Qi Alfred Chen, Chunlin Xiong, Yan Chen, Tiantian Zhu, Hai Yang:
Effective and Light-Weight Deobfuscation and Semantic-Aware Attack Detection for PowerShell Scripts. CCS 2019: 1831-1847 - 2016
- [j7]Fanglin Gu, Hang Zhang, Wenwu Wang, Chunlin Xiong:
A Promising Technique for Blind Identification: The Generic Statistics. Circuits Syst. Signal Process. 35(7): 2544-2562 (2016) - [j6]Jian Wang, Chunlin Xiong, Kangli Zhang, Jibo Wei:
A Mixed-Decimation MDF Architecture for Radix-2k Parallel FFT. IEEE Trans. Very Large Scale Integr. Syst. 24(1): 67-78 (2016) - [j5]Wei Li, Jing Lei, Tao Wang, Chunlin Xiong, Jibo Wei:
Dynamic Optimization for Resource Allocation in Relay-Aided OFDMA Systems Under Multiservice. IEEE Trans. Veh. Technol. 65(3): 1303-1313 (2016) - 2015
- [j4]Jian Wang, Chunlin Xiong, Kangli Zhang, Jibo Wei:
Fixed-Point Analysis and Parameter Optimization of the Radix-2k Pipelined FFT Processor. IEEE Trans. Signal Process. 63(18): 4879-4893 (2015) - [j3]Kangli Zhang, Chun-lin Xiong, Bin Chen, Jian Wang, Jibo Wei:
A Maximum Likelihood Combining Algorithm for Spatial Multiplexing MIMO Amplify-and-Forward Relaying Systems. IEEE Trans. Veh. Technol. 64(12): 5767-5774 (2015) - [c7]Bin Chen, Chunsheng Zhu, Mithun Mukherjee, Zhengguo Sheng, Chun-lin Xiong, Jibo Wei, Victor C. M. Leung:
Radiated Power Scaling Factor and Its Effect on The Secrecy Performance of Multi-user Massive MIMO System. MSCC@MobiHoc 2015: 7-12 - 2014
- [j2]Wei Li, Yanqun Tang, Mounir Ghogho, Jibo Wei, Chunlin Xiong:
Secure communications via sending artificial noise by both transmitter and receiver: optimum power allocation to minimise the insecure region. IET Commun. 8(16): 2858-2862 (2014) - 2012
- [j1]Wei Li, Mounir Ghogho, Bin Chen, Chunlin Xiong:
Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis. IEEE Commun. Lett. 16(10): 1628-1631 (2012) - 2010
- [c6]Xiaoying Zhang, De-Gang Wang, Chun-lin Xiong, Ji-Bo Wei:
Joint symbol detection and channel tracking for MIMO-OFDM systems via the variational bayes EM algorithm. PIMRC 2010: 46-51
2000 – 2009
- 2009
- [c5]Chun-lin Xiong, Xin Wang, De-Gang Wang, Jibo Wei:
Low Complexity Semi-Blind Bayesian Iterative Receiver for MIMO-OFDM Systems. GLOBECOM 2009: 1-6 - [c4]Hua Wang, Chun-lin Xiong, Villy Bæk Iversen:
Uplink Capacity of Multi-Class IEEE 802.16j Relay Networks with Adaptive Modulation and Coding. ICC 2009: 1-6 - [c3]Chun-lin Xiong, Hua Wang, Xiaoying Zhang, Ji-Bo Wei, Chaojing Tang:
Low Complexity Variational Bayes Iterative Receiver for MIMO-OFDM Systems. ICC 2009: 1-5 - [c2]Chun-lin Xiong, De-Gang Wang, Xiaoying Zhang, Ji-Bo Wei, Chaojing Tang:
Recursive channel estimation algorithms for iterative receiver in MIMO-OFDM systems. WCNC 2009: 785-789 - 2008
- [c1]Chun-lin Xiong, De-Gang Wang, Ji-Bo Wei:
A near-ML sphere constraint stack detection algorithm with very low complexity in VBLAST systems. PIMRC 2008: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint