Calculated based on number of publications stored in Pure and citations from Scopus
20142024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    An Anomaly Detection Method Based on Meta-Path and Heterogeneous Graph Attention Network

    Peng, Z., Shan, C. & Hu, C., 2024, 2024 5th International Conference on Computer Engineering and Application, ICCEA 2024. Institute of Electrical and Electronics Engineers Inc., p. 137-140 4 p. (2024 5th International Conference on Computer Engineering and Application, ICCEA 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A PSO-based Method to Test Deep Learning Library at API Level

    Liao, S. & Shan, C., 26 Jan 2024, Proceedings of the 3rd International Conference on Computer, Artificial Intelligence and Control Engineering, CAICE 2024. Association for Computing Machinery, p. 117-130 14 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Research on Software Network Key Nodes Mining Methods Based on Complex Network

    Shan, C., Wang, P., Hu, C., Gao, X. & Mei, S., 2020, Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Revised Selected Papers. Han, W., Zhu, L. & Yan, F. (eds.). Springer, p. 193-205 13 p. (Communications in Computer and Information Science; vol. 1149 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    A vulnerability detection model for java systems based on complex networks

    Xiong, L., Chun, S., Hu, C., Yu, Z. & Xiong, W., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 1339-1347 9 p. 9060132. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Network risk assessment method based on asset correlation graph

    Shan, C., Gao, J., Hu, C., Guan, F. & Zhao, X., 2019, Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers. Zhang, H., Zhao, B. & Yan, F. (eds.). Springer Verlag, p. 65-83 19 p. (Communications in Computer and Information Science; vol. 960).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Research on a multi-level combination of software defect localization method

    Wang, P., Shan, C., Mei, S. & Li, N., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 1305-1311 7 p. 9060118. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Software defect prediction model based on KPCA-SVM

    Zhou, Y., Shan, C., Sun, S., Wei, S. & Zhang, S., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 1326-1332 7 p. 9060079. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • 2018

    A secure pairing-free certificate-less authenticated key agreement protocol

    Chun, S., Kangwen, H., Jingfeng, X., Changzhen, H. & Rui, M., 2018, Lecture Notes in Real-Time Intelligent Systems. Mizera-Pietraszko, J. & Pichappan, P. (eds.). Springer Verlag, p. 205-216 12 p. (Advances in Intelligent Systems and Computing; vol. 613).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Design and Implementation of Hotel Room Information Management System Based on Kendo UI Front-End Framework

    Shan-Shan, M., Chun, S. & Jing-Feng, X., Apr 2018, Proceedings - 2018 4th Annual International Conference on Network and Information Systems for Computers, ICNISC 2018. Song, Y., Kim, H., Luo, L. & Zaman, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 452-455 4 p. 8842948. (Proceedings - 2018 4th Annual International Conference on Network and Information Systems for Computers, ICNISC 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Real-Time Processing and Storage of Multimedia Data with Content Delivery Network in Vehicle Monitoring System

    Xiong, W., Shan, C., Sun, Z. & Meng, Q., 2 Jul 2018, Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018. Sabir, E., Sadik, M., Tmiri, A., EL-Azouzi, R. & Altman, E. (eds.). Institute of Electrical and Electronics Engineers Inc., 8629708. (Proceedings - 2018 International Conference on Wireless Networks and Mobile Communications, WINCOM 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Software System Representation Methods Based on Algebraic Component

    Yu, Z., Shan, C., Mao, L., Hu, C. & Xiong, W., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1008-1013 6 p. 8456011. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2017

    A detecting method of array bounds defects based on symbolic execution

    Shan, C., Sun, S., Xue, J., Hu, C. & Zhu, H., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 373-385 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Homology analysis method of worms based on attack and propagation features

    Wang, L., Xue, J., Cui, Y., Wang, Y. & Shan, C., 2017, Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings. Yan, F., Xu, M., Fu, S. & Qin, Z. (eds.). Springer Verlag, p. 1-15 15 p. (Communications in Computer and Information Science; vol. 704).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Predicting vulnerable software components using software network graph

    Wei, S., Du, X., Hu, C. & Shan, C., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (eds.). Springer Verlag, p. 280-290 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10581 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Research on malicious code analysis method based on semi-supervised learning

    He, T., Xue, J., Fu, J., Wang, Y. & Shan, C., 2017, Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings. Yan, F., Xu, M., Fu, S. & Qin, Z. (eds.). Springer Verlag, p. 227-241 15 p. (Communications in Computer and Information Science; vol. 704).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • SulleyEX: A fuzzer for stateful network protocol

    Ma, R., Zhu, T., Hu, C., Shan, C. & Zhao, X., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 359-372 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2016

    Software defect prediction model based on improved LLE-SVM

    Shan, C., Zhu, H., Hu, C., Cui, J. & Xue, J., 13 Jun 2016, Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015. Institute of Electrical and Electronics Engineers Inc., p. 530-535 6 p. 7490804. (Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • 2015

    An innovative software testing course based on CDIO

    Shan, C., Ma, R., Zhao, X. L. & Xue, J. F., 2015, Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014. Zheng, D. (ed.). CRC Press/Balkema, p. 59-64 6 p. (Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Research on Identification and Addressing of the Internet of Things

    Ma, R., Liu, Y., Shan, C., Zhao, X. L. & Wang, X. A., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Messina, F., Xhafa, F., Ogiela, M. R. & Barolli, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 810-814 5 p. 7424673. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Taint propagation path analysis based on program dependency

    Wang, Y., Wang, C., Hu, C. Z. & Shan, C., 2015, Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014. Zheng, D. (ed.). CRC Press/Balkema, p. 159-164 6 p. (Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2014

    A method to creating visualization model with consistency rule in paradigm

    Huang, B. J., Zhao, X. L., Shan, C., Li, Z. Q. & Xue, J. F., 2014, Applied Science, Materials Science and Information Technologies in Industry. p. 1998-2003 6 p. (Applied Mechanics and Materials; vol. 513-517).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Design and implementation of dynamic web services publishing software based on CXF

    Shan, C., Wu, L. X., Yang, Y. & Xue, J. F., 2014, Materials Science, Computer and Information Technology. Trans Tech Publications Ltd., p. 4350-4354 5 p. (Advanced Materials Research; vol. 989-994).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fuzz testing data generation for network protocol using classification tree

    Ma, R., Ji, W., Hu, C., Shan, C. & Peng, W., 2014, IET Conference Publications. CP653 ed. Institution of Engineering and Technology, 0748. (IET Conference Publications; vol. 2014, no. CP653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • Software defect prediction model based on LLE and SVM

    Shan, C., Chen, B., Hu, C., Xue, J. & Li, N., 2014, IET Conference Publications. CP653 ed. Institution of Engineering and Technology, 0749. (IET Conference Publications; vol. 2014, no. CP653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Citations (Scopus)
  • Software structural stability evaluation method based on motifs

    Shan, C., Huang, L., Hu, C. Z., Zhao, X. L. & Ma, J. S., 2014, Materials Science, Computer and Information Technology. Trans Tech Publications Ltd., p. 2128-2134 7 p. (Advanced Materials Research; vol. 989-994).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review