Xiangliang Zhang
Xiangliang Zhang
Associate Professor, KAUST
Verified email at kaust.edu.sa - Homepage
Title
Cited by
Cited by
Year
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
1952014
An up-to-date comparison of state-of-the-art classification algorithms
C Zhang, C Liu, X Zhang, G Almpanidis
Expert Systems with Applications 82, 128-150, 2017
1612017
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
1532018
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
1202018
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1132008
Collaborative User Network Embedding for Social Recommender Systems
C Zhang, L Yu, Y Wang, C Shah, X Zhang
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017
100*2017
Data streaming with affinity propagation
X Zhang, C Furtlehner, M Sebag
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008
982008
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
982006
Decision theory for discrimination-aware classification
F Kamiran, A Karim, X Zhang
2012 IEEE 12th International Conference on Data Mining, 924-929, 2012
962012
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
852009
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
842014
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
832004
Data Stream Clustering with Affinity Propagation
X Zhang, C Furtlehner, C Germain-Renaud, M Sebag
IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013
822013
Modeling program behaviors by hidden Markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Proceedings of 2004 International Conference on Machine Learning and …, 2004
762004
Virtual machine migration in an over-committed cloud
X Zhang, ZY Shae, S Zheng, H Jamjoom
2012 IEEE Network Operations and Management Symposium, 196-203, 2012
752012
Controlling attribute effect in linear regression
T Calders, A Karim, F Kamiran, W Ali, X Zhang
2013 IEEE 13th International Conference on Data Mining, 71-80, 2013
742013
K-AP: generating specified K clusters by efficient affinity propagation
X Zhang, W Wang, K Nørvåg, M Sebag
2010 IEEE International Conference on Data Mining, 1187-1192, 2010
702010
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams
AA Qahtan, B Alharbi, S Wang, X Zhang
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
622015
Efficient task assignment in spatial crowdsourcing with worker and task privacy protection
A Liu, W Wang, S Shang, Q Li, X Zhang
GeoInformatica 22 (2), 335-362, 2018
572018
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
522018
The system can't perform the operation now. Try again later.
Articles 1–20