Seguir
Jianhai Chen
Jianhai Chen
Dirección de correo verificada de zju.edu.cn
Título
Citado por
Citado por
Año
Live migration of multiple virtual machines with resource reservation in cloud computing environments
K Ye, X Jiang, D Huang, J Chen, B Wang
2011 IEEE 4th International Conference on Cloud Computing, 267-274, 2011
2452011
Behavior pattern clustering in blockchain networks
B Huang, Z Liu, J Chen, A Liu, Q Liu, Q He
Multimedia Tools and Applications 76, 20099-20110, 2017
1002017
V-fuzz: Vulnerability-oriented evolutionary fuzzing
Y Li, S Ji, C Lv, Y Chen, J Chen, Q Gu, C Wu
arXiv preprint arXiv:1901.01142, 2019
632019
Non-cooperative games on multidimensional resource allocation
D Ye, J Chen
Future Generation Computer Systems 29 (6), 1345-1352, 2013
602013
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
552021
Virt-LM: a benchmark for live migration of virtual machine
D Huang, D Ye, Q He, J Chen, K Ye
Proceedings of the 2nd ACM/SPEC International Conference on Performance …, 2011
492011
Smartseed: Smart seed generation for efficient fuzzing
C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen
arXiv preprint arXiv:1807.02606, 2018
452018
AAGA: Affinity-aware grouping for allocation of virtual machines
J Chen, K Chiew, D Ye, L Zhu, W Chen
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
442013
V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs
Y Li, S Ji, C Lyu, Y Chen, J Chen, Q Gu, C Wu, R Beyah
IEEE transactions on cybernetics 52 (5), 3745-3756, 2020
372020
Towards understanding the security of modern image captchas and underground captcha-solving services
H Weng, B Zhao, S Ji, J Chen, T Wang, Q He, R Beyah
Big Data Mining and Analytics 2 (2), 118-144, 2019
362019
Fedrecattack: Model poisoning attack to federated recommendation
D Rong, S Ye, R Zhao, HN Yuen, J Chen, Q He
2022 IEEE 38th International Conference on Data Engineering (ICDE), 2643-2655, 2022
352022
Towards evaluating the security of real-world deployed image captchas
B Zhao, H Weng, S Ji, J Chen, T Wang, Q He, R Beyah
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security …, 2018
342018
De-sag: On the de-anonymization of structure-attribute graph data
S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah
IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017
292017
Informed live migration strategies of virtual machines for cluster load balancing
X Li, Q He, J Chen, K Ye, T Yin
IFIP International Conference on Network and Parallel Computing, 111-122, 2011
262011
Poisoning deep learning based recommender model in federated learning scenarios
D Rong, Q He, J Chen
arXiv preprint arXiv:2204.13594, 2022
242022
Cats: cross-platform e-commerce fraud detection
H Weng, S Ji, F Duan, Z Li, J Chen, Q He, T Wang
2019 ieee 35th international conference on data engineering (icde), 1874-1885, 2019
202019
Digital resource rights confirmation and infringement tracking based on smart contracts
P Qian, Z Liu, X Wang, J Chen, B Wang, R Zimmermann
2019 IEEE 6th International Conference on Cloud Computing and Intelligence …, 2019
182019
VTestkit: A performance benchmarking framework for virtualization environments
K Ye, J Che, X Jiang, J Chen, X Li
2010 Fifth Annual ChinaGrid Conference, 130-136, 2010
172010
Rapido: Scaling blockchain with multi-path payment channels
C Lin, N Ma, X Wang, J Chen
Neurocomputing 406, 322-332, 2020
162020
A truthful FPTAS mechanism for emergency demand response in colocation data centers
J Chen, D Ye, S Ji, Q He, Y Xiang, Z Liu
IEEE INFOCOM 2019-IEEE conference on computer communications, 2557-2565, 2019
152019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20