Zesheng Chen, Ph.D. - Publications
Affiliations: | 2007 | Georgia Institute of Technology, Atlanta, GA |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2020 | Chen Z. Characterising spatial dependence on epidemic thresholds in networks International Journal of Security and Networks. 15: 1-14. DOI: 10.1504/Ijsn.2020.10028187 | 0.415 | |||
2019 | Chen C, Chen Z. Self-stopping strategies for tractable information dissemination in dense mobile sensor networks International Journal of Sensor Networks. 29: 88-100. DOI: 10.1504/Ijsnet.2019.10019055 | 0.381 | |||
2019 | Chen Z. Discrete-Time vs. Continuous-Time Epidemic Models in Networks Ieee Access. 7: 127669-127677. DOI: 10.1109/Access.2019.2940132 | 0.403 | |||
2016 | Chen Z, Chen C. Characterising heterogeneity in vulnerable hosts on worm propagation International Journal of Security and Networks. 11: 224-234. DOI: 10.1504/Ijsn.2016.079276 | 0.419 | |||
2012 | Wang Q, Chen Z, Chen C. On the Characteristics of the Worm Infection Family Tree Ieee Transactions On Information Forensics and Security. 7: 1614-1627. DOI: 10.1109/Tifs.2012.2204981 | 0.348 | |||
2011 | Wang Q, Chen Z, Chen C. Darknet-Based Inference of Internet Worm Temporal Characteristics Ieee Transactions On Information Forensics and Security. 6: 1382-1393. DOI: 10.1109/Tifs.2011.2161288 | 0.414 | |||
2010 | Chen C, Chen Z, Li Y. Characterizing and defending against divide-conquer-scanning worms Computer Networks. 54: 3210-3222. DOI: 10.1016/J.Comnet.2010.06.010 | 0.443 | |||
2009 | Chen Z, Chen C, Li Y. Deriving a closed-form expression for worm-scanning strategies International Journal of Security and Networks. 4: 135-144. DOI: 10.1504/Ijsn.2009.027339 | 0.362 | |||
2009 | Chen C, Chen Z. Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding Ieee Transactions On Mobile Computing. 8: 1397-1411. DOI: 10.1109/Tmc.2009.55 | 0.375 | |||
2009 | Chen Z, Ji C. An Information-Theoretic View of Network-Aware Malware Attacks Ieee Transactions On Information Forensics and Security. 4: 530-541. DOI: 10.1109/Tifs.2009.2025847 | 0.611 | |||
2007 | Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions International Journal of Security and Networks. 2: 71-80. DOI: 10.1504/Ijsn.2007.012826 | 0.591 | |||
2005 | Chen Z, Ji C. Spatial-temporal modeling of malware propagation in networks. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 16: 1291-303. PMID 16252834 DOI: 10.1109/Tnn.2005.853425 | 0.584 | |||
Show low-probability matches. |