loci - The Lab of Cyber Intelligence

newsletter

Publications

Journal Papers

2018

  • GIST: A Generative Model with Individual and Subgroup-based Topics For Group Recommendation.
    Ke Ji*, Zhenxiang Chen, Runyuan Sun, Kun Ma, Zhongjie Yuan, Guandong Xu
    In (Elsevier) Expert Systems with Applications (CCF C; JCR Q1)
    2018, pp(94): 81-93.

  • Machine learning based mobile malware detection using highly imbalanced network traffic.
    Zhenxiang Chen*, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang
    In (Elsevier) Information Sciences (CCF B; JCR Q1)
    2018,433: 346-364.

2017

  • Detecting Android Malware Leveraging Text Semantics of Network Flows.  
    Transactions on Information Forensics & Security, 2017, PP(99):1-1.
    Shanshan Wang, Qiben Yan, Zhenxiang Chen*, Bo Yang, Chuan Zhao, Mauro Conti
    In (IEEE) Transactions on Information Forensics & Security (CCF A; JCR Q1)
    2017, PP(99):1-1.

  • Flexible neural trees based early stage identification for IP traffic.  
    Zhenxiang Chen*, Lizhi Pengand, Chongzhi Gao, Bo Yang, Yuehui Chen, Jin Li
    In (Springer) Soft Computing (CCF C; JCR Q2)
    2017, 21(8):1-12.

  • A novel semi-supervised learning method for Internet application identification.  
    Zhenxiang Chen*, Zhusong Liu, Lizhi Peng, Lin Wang, Lei Zhang
    In (Springer) Soft Computing (CCF C; JCR Q2)
    2017, 21(8):1963-1975.

2014

  • Construction of dynamic three-dimensional microstructure for the hydration of cement using 3D image registration.
    Lin Wang, Bo Yang, Ajith Abraham, Lu Qi, Xiuyang Zhao, Zhenxiang Chen
    In (Springer) Pattern Analysis & Applications (CCF C; JCR Q3)
    2014, 17(3):655-665.

  • Personality analysis and prediction of social network users.  
    Zhang Lei, ZhenXiang Chen*, Yang Bo
    Chinese Journal of Computes
    37(8):1877-1894.

Conference paper

2018

  • DroidDetector: a traffic-based platform to detect android malware using machine learning
    Jingya Shen, Zhenxiang Chen*, Shanshan Wang, Yvhui Zhu, Hassan, Muhammad Umair
    In Proceedings of the International workshop on Pattern Recognition
    Vol. 10828

  • Recognizing Emotions in Chinese Text Using Dictionary and Ensemble of Classifiers
    Yanyong Ai, Zhenxiang Chen*, Shanshan Wang, Ying Pang
    In Proceedings of the International workshop on Pattern Recognition
    Vol. 10828

  • Deep and Broad Learning based Detection of Android Malware via Network Traffic
    Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti
    In Proceedings of the IEEE/ACM International Symposium on Quality of Service (CCF B)

  • Lexical Mining of Malicious Urls for Classifying Android malware
    Shanshan Wang, Qiben Yan, Zhenxiang Chen*, Lin Wang, Riccardo,Spolaor, Bo Yang, Mauro Conti
    In Proceedings of the International Conference on Security and Privacy in Communication Networks
    (CCF C)

2017

  • Android Malware Clustering Analysis on Network-Level Behavior.  
    Shanshan Wang, Zhenxiang Chen*, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao
    In Proceedings of the International Conference on Intelligent Computing
    2017:796-807.

  • Finding Android Malware Trace from Highly Imbalanced Network Traffic.  
    Ying Pang, Zhenxiang Chen*, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li
    In Proceedings of the IEEE International Conference on Computational Science and Engineering
    2017:588-595.

  • TextDroid: Semantics-based detection of mobile malware using network flows.  
    Shanshan Wang, Qiben Yan, Zhenxiang Chen*, Bo Yang, Chuan Zhao, Mauro Conti
    In Proceedings of the IEEE INFOCOM 2017 -Ieee Conference on Computer Communications Workshops
    (CCF A)
    2017:18-23.

  • DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.  
    Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen*, Qiben Yan, Lizhi Peng, Bo Yang
    In Proceedings of the IEEE International Conference on Trustcom/bigdatase/ispa (CCF C)
    2017:1753-1758.

  • Three Dimensional Segmentation for Cement Microtomography Images using Self-Organizing Map and Neighborhood Features.
    Liangliang Zhang, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Yamin Han, Meihui Li
    In Proceedings of the IEEE Symposium Series on Computational Intelligence
    2017, 2982-2989.

  • A Novel Method for Generating Benchmark Functions Using Recurrent Neural Network.
    Fengyang Sun, Lin Wang, Bo Yang, Jin Zhou, Zhenxiang Chen
    In Proceedings of the International Conference on Intelligent Computing
    2017:768-773.

  • Improving Multi-layer Particle Swarm Optimization Using Powell Method.
    Fengyang Sun, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou, Kun Tang, Jinyan Wu
    In Proceedings of the International Conference in Swarm Intelligence
    2017:166-173.

2016

  • Delay-Tolerant Network Based Secure Transmission System Design
    Gang Ming, Zhenxiang Chen*
    In Proceedings of the International Conference on Cloud Computing International Conference on Security and Privacy in New Computing Environments
    2018:227-231.

  • TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.  
    Shanshan Wang, Zhenxiang Chen*, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia
    In Proceedings of the International Symposium on Quality of Service (CCF B)
    2016:1-6.

  • Improving Particle Swarm Optimization Using Co-Optimization of Particles and Acceleration Constants.
    Wang Lin, Yang Bo, Chen Zhenxiang
    In Proceedings of the 16th International Conference on Hybrid Intelligent Systems
    2016, 578-587.

2015

  • A Real-time Android Malware Detection System Based on Network Traffic Analysis.
    Hongbo Han, Zhenxiang Chen*, Yan Qiben, Peng Lizhi, Zhang Lei
    In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing
    (CCF C)
    2015:504-516.

  • High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator.  
    Zhenxiang Chen, Keke Wang, Lizhi Peng, Tao Sun, Lei Zhang
    In Proceedings of the International Conference on Advances in Swarm and Computational Intelligence
    2015:287-296.

  • Using Map-Based Interactive Interface for Understanding and Characterizing Crime Data in Cities.
    Zhenxiang Chen, Qiben Yan, Lei Zhang, Lizhi Peng, Hongbo Han
    In Proceedings of the International Conference on Advances in Swarm and Computational Intelligence
    2015:479-490.

  • A First Look at Android Malware Traffic in First Few Minutes.  
    Zhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li
    In Proceedings of the International Conference on Trustcom/bigdatase/ispa
    2015:206-213.

  • QR code location based reverse car-searching route recommendation model.  
    Zhenxiang Chen, Jiabin Fu, Runyuan Sun, Hongbo Han
    In Proceedings of the IEEE International Conference on Vehicular Electronics and Safety
    2015:73-77.

  • Reconstruction of Android Applications’ Network Behavior Based on Application Layer Traffic.  
    Qun Li, Lei Zhang, Shifeng Hou, Zhenxiang Chen*, Hongbo Han
    In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing (CCF C)
    2015:487-496.

  • Android Malware Network Behavior Analysis at HTTP Protocol Packet Level.  
    Shanshang Wang, Shifeng, Lei Zhang, Zhenxiang Chen*, Hongbo Han
    In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing (CCF C)
    2015: 497-507.

  • An Intention-Topic Model Based on Verbs Clustering and Short Texts Topic Mining.  
    Tingting Lu, Shifeng Hou, Zhenxiang Chen*, Lizhen Cui, LeiZhang
    In Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
    2015:837-842.

2014

  • Feature Selection Toward Optimizing Internet Traffic Behavior Identification.  
    Zhenxiang Chen, Lizhi Peng, Shupeng Zhao, Lei Zhang, Shan Jing
    In Proceedings of the IEEE International Conference on Algorithms and Architectures for Parallel Processing (CCF C)
    2014:631-644.

  • Using Linguistic Features to Estimate Suicide Probability of Chinese Microblog Users.  
    Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, Tingshao Zhu
    In Proceedings of the International Conference on Human Centered Computing
    2014:549-559.

In press

2018

  • A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic
    Anran Liu, Zhenxiang Chen*, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yvliang Shi
    In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing (CCF C)

  • MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion
    Qun Li, Zhenxiang Chen*, Qiben Yan, Shanshan Wang, Kun Ma, Yvliang Shi, Lizhen Cui
    In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing (CCF C)

  • Optimizing Floating Centroids Method Neural Network Classifier Using Dynamic Multilayer Particle Swarm Optimization
    Changwei Cai, Shuangrong Liu, Lin Wang, Bo Yang, Zhenxiang Chen, Jin Zhou
    In proceedings of the Genetic and Evolutionary Computation Conference (CCF C)

Authorized Patent

  • A method and a system for reconstructing mobile applications’ malicious network behavior.
    Zhenxiang Chen, Bo Yang, Hongbo Han, Lei Zhang, Lizhi Peng, Shan Jing
    2018.3.22, China, ZL 201510487157.6.

  • A proxy server with the abilities of detecting mobile applications' malicious network behavior.
    Zhenxiang Chen, Qun Li, Lei Zhang, Bo Yang, Hongbo Han, Dong Cao
    2017.11.1, China, ZL 201510487184.3.

  • Network access point based mobile malwares detecting method and system.
    Zhenxiang Chen, Bo Yang, Hongbo Han, Lei Zhang, Lizhi Peng, Shan Jing
    2017.11.1, China, ZL 201510487144.9.

  • Network traffic based multi-features mobile malwares detecting method and system.
    Zhenxiang Chen, Bo Yang, Hongbo Han, Lizhi Peng, Lei Zhang, Runyuan Sun, Jinguang Wang
    2017.11.1, China,ZL 201510486986.2.

  • A test and comparison system for remote database response performance.
    Zhenxiang Chen, Keke Wang , Bo Yang, Kun Ma, Kun Liu
    2016.3.7, China, ZL 201210307910.5.

  • High Performance NetFPGA and Multi-fractal Wavelet Model Based Network Traffic Generator system and method.
    Zhenxiang Chen, Bo Yang, Keke Wang, Tao Sun , Jinguang Wang
    2015.9.30,China,ZL 201310201863.0.

  • A Method for obtaining network traffic data set with accurate application type identification.
    Zhenxiang Chen, Caiyun Zhao, Lizhi Peng, Bo Yang, Shan Jing
    2015.2.9,China,ZL 201210184213.5.

  • FPGA based real time database backup system and method
    Zhenxiang Chen, Jinguang Wang, Bo Yang, Lei zhang, Lizhi Peng
    2015.2.5,China,ZL 201210309087.1.

  • Internet traffic differentiation method
    Zhenxiang Chen, Shupeng Zhao , Xiaomei Yu, Bo Yang , Runyuan Sun
    2015.1.1,China, ZL 201210184211.6.

bg1
line

University of Jinan