Chen Xu

ORCID: 0000-0002-1198-4178
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Higher Education and Teaching Methods
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Advanced Malware Detection Techniques
  • Software-Defined Networks and 5G
  • Security and Verification in Computing
  • Distributed and Parallel Computing Systems
  • Smart Materials for Construction
  • Ultrasonics and Acoustic Wave Propagation
  • Software System Performance and Reliability
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Decision-Making Techniques
  • Scientific Computing and Data Management
  • Nanocluster Synthesis and Applications
  • Cloud Data Security Solutions
  • Rock Mechanics and Modeling
  • Access Control and Trust
  • Language, Communication, and Linguistic Studies
  • Software Reliability and Analysis Research
  • Information and Cyber Security
  • Big Data and Business Intelligence
  • Big Data Technologies and Applications
  • Network Packet Processing and Optimization

Hebei University of Technology
2024

University of Tennessee at Chattanooga
2019-2022

Hohai University
2022

Wuhan University
2021

Shenzhen University
2010-2020

Suzhou Research Institute
2018

Peking University
2017

University of Wyoming
2017

Beijing University of Technology
2015

George Mason University
2013

Many threats that plague today's networks (e.g., phishing, botnets, denial of service attacks) are enabled by a complex ecosystem attack programs commonly called malware. To combat these threats, defenders have turned to the collection, analysis, and reverse engineering malware as mechanisms understand programs, generate signatures, facilitate cleanup infected hosts. Recently however, new instances emerged with capability check often thwart defensive activities — essentially leaving blind...

10.1109/dsn.2008.4630086 article EN 2008-01-01

Abstract In this prospective work, a machine learning (ML) model based on multiple independent random forest models to predict the configuration of binary composite bars is developed. The input variables ML are elastic wave signals collected at one end bar, while targets vectors representing bars. This study results indicate: First, short period propagated through bar can collect and carry detailed information entire bar; second, patterns hidden in be detected, extracted, used by model;...

10.1002/adts.202200674 article EN Advanced Theory and Simulations 2022-12-22

Network intrusion detection system (NIDS) is indispensable for cloud computing providers to detect ongoing cyber attacks and deter future ones in the era. To help users secure their tenant networks inside a cloud, tenant-based NIDS service model has been proposed where services are deployed as virtual instances tenants. However, this approach imposes significant virtualization overhead at cost of tenants, provision process can be time-consuming. In work, we present an innovative OpenStack...

10.1109/icnc47757.2020.9049480 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2020-02-01

Although many studies have been devoted to integrating blockchain into IoT device management, access control, data integrity, security, and privacy, blockchain-facilitated communication is still much less studied. Blockchain has great potential in decentralizing securing communications. In this paper, we propose an innovative service platform powered by the consortium technology. The proposed abstracts machine-to-machine (M2M) human-to-machine (H2M) communications services provided devices....

10.3390/s22218186 article EN cc-by Sensors 2022-10-26

Cybersecurity education and training have gained increasing attention in all sectors due to the prevalence quick evolution of cyberattacks. A variety platforms systems been proposed developed accommodate growing needs hands-on cybersecurity practice. However, those are either lacking sufficient flexibility (e.g., tied a specific virtual computing service provider, little customization support) or difficult scale. In this work, we present cloud-based platform named EZSetup for practice at...

10.1109/icnp.2019.8888060 article EN 2019-10-01

Representational state transfer (REST), which is a style of software architecture with simplicity and flexity, has been widely adopted in web services. To solve challenges like multidimensional API validation requirements, call sequencing organization test cases, data dependency between this thesis proposes REST testing model an expressive description language based on JSON.

10.1109/bigdatasecurity.2017.35 article EN 2017-05-01

Cloud computing has become a major paradigm and data processing approach in almost all sectors. To ensure normal business operation security, performing traffic monitoring detecting suspicious network packets possible intrusions have daily job for tenant administrators. Using existing tools, administrator can set up Network Intrusion Detection System (NIDS) on virtual machine (VM) instance the mirror from other instances to NIDS via Tap as Service (TaaS) or Switched Port Analyzer (SPAN)...

10.1109/icnp.2019.8888078 article EN 2019-10-01

Exception handling is an effective mechanism to guarantee software reliability in modern programming languages. An exception interrupts the program execution and propagates backwards along call chain until caught by handler. In development practices, developers may be confused determining where place handler chain. The reason that requires a developer take comprehensive consideration from global perspective of project. this paper, we propose automatic approach EHAdvisor, which recommends...

10.1109/icpc52881.2021.00042 article EN 2021-05-01

With the growth of Internet, network security has received significant attention over pass ten years due to increasing threat hacker attacks. To achieve goals, most corporate environments have deployed firewalls block intrusion. However, traditional only provided static filleting analysis so that they can not analyze content data packet for providing dynamic requirement. In order address this issue, in paper, we integrate with intrusion detection technologies. The proposed provides defense...

10.4304/jcp.7.12.3110-3115 article EN Journal of Computers 2012-12-01

In implementing the PMC model, trusting relationships between owners and contractors is key to resolving dilemmas caused by institutional constraints conventional thinking, such as frequent organizational conflicts, low management efficiency, higher transaction costs. This study utilized projects in Guangxi, Jiangsu, Zhejiang, Tibet, Guizhou analysis samples employed semi-structured field interviews investigate antecedents of trust contractors. addition, questionnaires were used quantify...

10.1016/j.asej.2022.101974 article EN cc-by-nc-nd Ain Shams Engineering Journal 2022-09-14

The use of security certificates under the Cloud environment is foundation to establish mutual trust between and user.In this paper, we propose an authentication method based on zero-knowledge proof mind key escrow.With method, will not only satisfy requirement anonymity but also can recover real identity information in special circumstances with cooperation multiple parties.We show that proposed more suitable for promotion through analysis comparison existing scheme.

10.14257/ijsia.2015.9.3.22 article EN International Journal of Security and Its Applications 2015-03-31

This paper propose a digital campus model based on "SOA+cloud" grounded deep researching into developing courses and thorough analysis the principle characteristics of SOA (service-oriented architecture)technology description cloud computing. will achieve optimization management service process, thereby creating new educational model.

10.1109/iccse.2012.6295444 article EN 2012-07-01
Coming Soon ...