Follow
Xiangliang Zhang
Xiangliang Zhang
Associate Professor, University of Notre Dame
Verified email at nd.edu - Homepage
Title
Cited by
Cited by
Year
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
3622018
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
3012014
An up-to-date comparison of state-of-the-art classification algorithms
C Zhang, C Liu, X Zhang, G Almpanidis
Expert Systems with Applications 82, 128-150, 2017
2792017
Decision theory for discrimination-aware classification
F Kamiran, A Karim, X Zhang
2012 IEEE 12th International Conference on Data Mining, 924-929, 2012
2112012
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
1972018
Collaborative User Network Embedding for Social Recommender Systems
C Zhang, L Yu, Y Wang, C Shah, X Zhang
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017
172*2017
The soundscape of the Anthropocene ocean
CM Duarte, L Chapuis, SP Collin, DP Costa, RP Devassy, VM Eguiluz, ...
Science 371 (6529), 2021
1572021
Controlling attribute effect in linear regression
T Calders, A Karim, F Kamiran, W Ali, X Zhang
2013 IEEE 13th International Conference on Data Mining, 71-80, 2013
1232013
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1202008
Data streaming with affinity propagation
X Zhang, C Furtlehner, M Sebag
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008
1132008
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
1102006
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1052009
Co-embedding attributed networks
Z Meng, S Liang, H Bao, X Zhang
Proceedings of the Twelfth ACM International Conference on Web Search and …, 2019
1042019
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
1032014
Use of unmanned aerial vehicles for efficient beach litter monitoring
C Martin, S Parkes, Q Zhang, X Zhang, MF McCabe, CM Duarte
Marine pollution bulletin 131, 662-673, 2018
1002018
Data Stream Clustering with Affinity Propagation
X Zhang, C Furtlehner, C Germain-Renaud, M Sebag
IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013
962013
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams
AA Qahtan, B Alharbi, S Wang, X Zhang
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
942015
Modeling program behaviors by hidden Markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Proceedings of 2004 International Conference on Machine Learning and …, 2004
892004
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
872004
Virtual machine migration in an over-committed cloud
X Zhang, ZY Shae, S Zheng, H Jamjoom
2012 IEEE Network Operations and Management Symposium, 196-203, 2012
852012
The system can't perform the operation now. Try again later.
Articles 1–20