Xiangliang Zhang
Xiangliang Zhang
Associate Professor, KAUST
Verified email at kaust.edu.sa - Homepage
TitleCited byYear
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
1542014
An up-to-date comparison of state-of-the-art classification algorithms
C Zhang, C Liu, X Zhang, G Almpanidis
Expert Systems with Applications 82, 128-150, 2017
1202017
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1042008
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
942018
Data streaming with affinity propagation
X Zhang, C Furtlehner, M Sebag
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008
922008
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
852018
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
852006
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
772004
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
762009
Data Stream Clustering with Affinity Propagation
X Zhang, C Furtlehner, C Germain-Renaud, M Sebag
IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013
752013
Virtual machine migration in an over-committed cloud
X Zhang, ZY Shae, S Zheng, H Jamjoom
2012 IEEE Network Operations and Management Symposium, 196-203, 2012
722012
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
712014
Modeling program behaviors by hidden Markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Proceedings of 2004 International Conference on Machine Learning and …, 2004
702004
Collaborative User Network Embedding for Social Recommender Systems
C Zhang, L Yu, Y Wang, C Shah, X Zhang
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017
69*2017
Decision theory for discrimination-aware classification
F Kamiran, A Karim, X Zhang
2012 IEEE 12th International Conference on Data Mining, 924-929, 2012
672012
K-AP: generating specified K clusters by efficient affinity propagation
X Zhang, W Wang, K Norvag, M Sebag
2010 IEEE International Conference on Data Mining, 1187-1192, 2010
662010
Controlling attribute effect in linear regression
T Calders, A Karim, F Kamiran, W Ali, X Zhang
2013 IEEE 13th International Conference on Data Mining, 71-80, 2013
542013
Constructing attribute weights from computer audit data for effective intrusion detection
W Wang, X Zhang, S Gombault
Journal of Systems and Software 82 (12), 1974-1981, 2009
472009
Fast intrusion detection based on a non-negative matrix factorization model
X Guan, W Wang, X Zhang
Journal of Network and Computer Applications 32 (1), 31-44, 2009
472009
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams
AA Qahtan, B Alharbi, S Wang, X Zhang
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
462015
The system can't perform the operation now. Try again later.
Articles 1–20