Follow
Huashan Chen
Title
Cited by
Cited by
Year
A survey on ethereum systems security: Vulnerabilities, attacks, and defenses
H Chen, M Pendleton, L Njilla, S Xu
ACM Computing Surveys (CSUR) 53 (3), 1-43, 2020
5072020
Statistical estimation of malware detection metrics in the absence of ground truth
P Du, Z Sun, H Chen, JH Cho, S Xu
IEEE Transactions on Information Forensics and Security 13 (12), 2965-2980, 2018
472018
Quantifying the security effectiveness of firewalls and dmzs
H Chen, JH Cho, S Xu
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
432018
Quantifying the security effectiveness of network diversity: poster
H Chen, JH Cho, S Xu
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
242018
Blockchain-based automated and robust cyber security management
S He, E Ficke, MMA Pritom, H Chen, Q Tang, Q Chen, M Pendleton, ...
Journal of Parallel and Distributed Computing 163, 62-82, 2022
212022
Quantifying cybersecurity effectiveness of dynamic network diversity
H Chen, H Cam, S Xu
IEEE Transactions on Dependable and Secure Computing 19 (6), 3804-3821, 2021
102021
Optimizing interconnections to maximize the spectral radius of interdependent networks
H Chen, X Zhao, F Liu, S Xu, W Lu
Physical Review E 95 (3), 032308, 2017
102017
Theoretical convergence guaranteed resource-adaptive federated learning with mixed heterogeneity
Y Wang, X Zhang, M Li, T Lan, H Chen, H Xiong, X Cheng, D Yu
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and …, 2023
32023
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection
H Miao, H Bao, Z Tang, W Li, W Wang, H Chen, F Liu, Y Sun
International Conference on Science of Cyber Security, 207-224, 2023
12023
Method and system for blockchain-based cyber security management
S Xu, HE Songlin, E Ficke, MMA Pritom, C Huashan, Q Tang, Q Chen, ...
US Patent App. 17/733,580, 2023
12023
Quantifying Cybersecurity Effectiveness of Software Diversity
H Chen, RB Garcia-Lebron, Z Sun, JH Cho, S Xu
arXiv preprint arXiv:2111.10090, 2021
12021
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention
H Bao, W Li, H Chen, H Miao, Q Wang, Z Tang, F Liu, W Wang
Computers & Security, 103943, 2024
2024
Reordering and Compression for Hypergraph Processing
Y Liu, Q Luo, M Xiao, D Yu, H Chen, X Cheng
IEEE Transactions on Computers, 2024
2024
Keeping Your Enemies Closer: Shedding Light on the Attacker’s Optimal Strategy
W Cai, H Chen, F Liu
International Conference on Science of Cyber Security, 42-59, 2023
2023
Optimal strategy selection for attack graph games using deep reinforcement learning
Y Zhang, F Liu, H Chen
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
2022
Optimal Strategy Selection for Cyber Deception via Deep Reinforcement Learning
Y Zhang, F Liu, H Chen
2022 IEEE Smartworld, Ubiquitous Intelligence & Computing, Scalable …, 2022
2022
A Framework for Quantifying Security Effectiveness of Cyber Defenses
H Chen
The University of Texas at San Antonio, 2021
2021
Simulations of Event-Based Cyber Dynamics via Adversarial Machine Learning
Z Liu, Y Wang, H Chen, W Lu
Science of Cyber Security: Third International Conference, SciSec 2021 …, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–18