default search action
Chenlin Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Wei Wang, Songlei Jian, Yusong Tan, Qingbo Wu, Chenlin Huang:
Robust unsupervised network intrusion detection with self-supervised masked context reconstruction. Comput. Secur. 128: 103131 (2023) - [c22]Xiaoda Xie, Songlei Jian, Chenlin Huang:
LogTraceAD: Anomaly Detection from Both Logs and Traces with Graph Representation Learning. CNCIT 2023: 116-121 - [c21]Xiaoda Xie, Songlei Jian, Chenlin Huang, Fengyuan Yu, Yunjia Deng:
LogRep: Log-based Anomaly Detection by Representing both Semantic and Numeric Information in Raw Messages. ISSRE 2023: 194-206 - 2022
- [j11]Wei Wang, Songlei Jian, Yusong Tan, Qingbo Wu, Chenlin Huang:
Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions. Comput. Secur. 112: 102537 (2022) - [c20]Zhipeng Xue, Zhijie Jiang, Chenlin Huang, Rulin Xu, Xiangbing Huang, Liumin Hu:
SEED: Semantic Graph Based Deep Detection for Type-4 Clone. ICSR 2022: 120-137 - [c19]Chenlin Huang, Keming Wang, Yun Li, Jiajian Li, Qing Liao:
ASPGen-D: Automatically Generating Fine-grained Apparmor Policies for Docker. ISPA/BDCloud/SocialCom/SustainCom 2022: 822-829 - [c18]Chuang Wang, Yan Ding, Chenlin Huang, Liantao Song:
An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field. TrustCom 2022: 422-428 - 2021
- [j10]Chenlin Huang, Wei Chen, Lu Yuan, Yan Ding, Songlei Jian, Yusong Tan, Hua Chen, Dan Chen:
Toward security as a service: A trusted cloud service architecture with policy customization. J. Parallel Distributed Comput. 149: 76-88 (2021) - [c17]Chenlin Huang, Yusong Tan, Guoyun Duan, Zhiwen Chen, Boyang Zhang, Peiyao Deng, Qianxiang Zhang, Jianhua Sun, Hao Chen, Guoqing Xiao, Qing Liao:
A Coverage-Guided Fuzzing Framework for Trusted Execution Environments. HPCC/DSS/SmartCity/DependSys 2021: 775-782 - [c16]Zhipeng Li, Yan Ding, Xiaofan Chen, Pan Dong, Chenlin Huang, Liantao Song, Peng Wang:
Agile Approach on the Performance Prediction of ARM TrustZone-based Mandatory Access Control Security Enhancement. ISPA/BDCloud/SocialCom/SustainCom 2021: 1083-1090 - [i2]Wentai Wu, Ligang He, Weiwei Lin, Rui Mao, Chenlin Huang, Wei Song:
FedProf: Optimizing Federated Learning with Dynamic Data Profiling. CoRR abs/2102.01733 (2021) - 2020
- [j9]Yan Ding, Pan Dong, Zhipeng Li, Yusong Tan, Chenlin Huang, Lifeng Wei, Yudan Zuo:
SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization. Wirel. Commun. Mob. Comput. 2020: 8866996:1-8866996:12 (2020) - [c15]Yan Ding, Liaoliao Feng, Ying Qin, Chenlin Huang, Pan Dong, Long Gao, Yusong Tan:
Blockchain-based Access Control Mechanism of Federated Data Sharing System. ISPA/BDCloud/SocialCom/SustainCom 2020: 277-284 - [c14]Yun Li, Chenlin Huang, Lu Yuan, Yan Ding, Hua Cheng:
ASPGen: an Automatic Security Policy Generating Framework for AppArmor. ISPA/BDCloud/SocialCom/SustainCom 2020: 392-400
2010 – 2019
- 2019
- [c13]Jiang Wu, Bang Di, Jianhua Sun, Hao Chen, Xionghu Zhong, Daokun Hu, Chenlin Huang:
A Fast and Secure GPU Memory Allocator. HPCC/SmartCity/DSS 2019: 146-153 - [c12]Can Peng, Chenlin Huang, Daokun Hu, Bang Di, Jianhua Sun, Hao Chen, Xionghu Zhong:
Address Randomization for Dynamic Memory Allocators on the GPU. HPCC/SmartCity/DSS 2019: 570-577 - 2017
- [j8]Xiaodong Liu, Xiangke Liao, Shanshan Li, Si Zheng, Bin Lin, Jingying Zhang, Lisong Shao, Chenlin Huang, Liquan Xiao:
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks. Complex. 2017: 5049836:1-5049836:14 (2017) - [j7]Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang:
Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers. Int. J. Parallel Program. 45(4): 853-878 (2017) - [c11]Chenlin Huang, Chuanwang Hou, Ligang He, Huadong Dai, Yan Ding:
Policy-Customized: A New Abstraction for Building Security as a Service. ISPAN-FCST-ISCC 2017: 203-210 - 2016
- [j6]Chenlin Huang, Ligang He, Xiangke Liao, Huadong Dai, Mengluo Ji:
Developing a trustworthy computing framework for clouds. Int. J. Embed. Syst. 8(1): 59-68 (2016) - [j5]Songling Fu, Ligang He, Xiangke Liao, Chenlin Huang:
Developing the Cloud-integrated data replication framework in decentralized online social networks. J. Comput. Syst. Sci. 82(1): 113-129 (2016) - [j4]Chenlin Huang, Chuanwang Hou, Huadong Dai, Yan Ding, Songling Fu, Mengluo Ji:
Research on Linux Trusted Boot Method Based on Reverse Integrity Verification. Sci. Program. 2016: 4516596:1-4516596:12 (2016) - [c10]Lifeng Wei, Yudan Zuo, Yan Ding, Pan Dong, Chenlin Huang, Yuanming Gao:
Security Identifier Randomization: A Method to Prevent Kernel Privilege-Escalation Attacks. AINA Workshops 2016: 838-842 - [c9]Chuanwang Hou, Chenlin Huang, Huadong Dai, Yan Ding, Ligang He, Mengluo Ji:
Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing. FAS*W@SASO/ICCAC 2016: 66-71 - 2015
- [j3]Songling Fu, Ligang He, Xiangke Liao, Chenlin Huang, Kenli Li, Cheng Chang:
Analyzing and Boosting the Data Availability in Decentralized Online Social Networks. Int. J. Web Serv. Res. 12(2): 47-72 (2015) - [j2]Songling Fu, Ligang He, Chenlin Huang, Xiangke Liao, Kenli Li:
Performance Optimization for Managing Massive Numbers of Small Files in Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 26(12): 3433-3448 (2015) - [c8]Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang:
An efficient method for motif discovery in CPU host load. FSKD 2015: 1027-1034 - [i1]Xiaodong Liu, Xiangke Liao, Shanshan Li, Jingying Zhang, Lisong Shao, Chenlin Huang, Liquan Xiao:
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks. CoRR abs/1508.00987 (2015) - 2014
- [c7]Songling Fu, Ligang He, Xiangke Liao, Chenlin Huang, Kenli Li, Cheng Chang, Bo Gao:
Cadros: The Cloud-Assisted Data Replication in Decentralized Online Social Networks. IEEE SCC 2014: 43-50 - [c6]Songling Fu, Ligang He, Xiangke Liao, Chenlin Huang, Kenli Li, Cheng Chang, Bo Gao:
Modelling and Predicting the Data Availability in Decentralized Online Social Networks. ICWS 2014: 161-168 - 2013
- [c5]Songling Fu, Chenlin Huang, Ligang He, Nadeem Chaudhary, Xiangke Liao, Shazhou Yang, Xiaochuan Wang, Bao Li:
iFlatLFS: Performance optimization for accessing massive small files. HiPC 2013: 10-19 - 2012
- [j1]Ligang He, Chenlin Huang, Kewei Duan, Kenli Li, Hao Chen, Jianhua Sun, Stephen A. Jarvis:
Modeling and analyzing the impact of authorization on workflow executions. Future Gener. Comput. Syst. 28(8): 1177-1193 (2012) - 2011
- [c4]Ligang He, Chenlin Huang, Kenli Li, Hao Chen, Jianhua Sun, Bo Gao, Kewei Duan, Stephen A. Jarvis:
Modelling and analyzing the authorization and execution of video workflows. HiPC 2011: 1-10 - 2010
- [c3]Songling Fu, Xiangke Liao, Lianyue He, Chenlin Huang, Xiaodong Tang, Si Zheng:
Efficient and fine-grained sharing of encrypted files. IWQoS 2010: 1-2
2000 – 2009
- 2006
- [c2]Chenlin Huang, Huaping Hu, Zhiying Wang:
A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications. ATC 2006: 312-321 - 2004
- [c1]Chenlin Huang, Huaping Hu, Zhiying Wang:
Modeling Time-Related Trust. GCC Workshops 2004: 382-389
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint