Hongchang Chen

ORCID: 0009-0005-0626-9830
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Advanced Graph Neural Networks
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Imbalanced Data Classification Techniques
  • Network Traffic and Congestion Control
  • Cloud Computing and Resource Management
  • Colorectal Cancer Surgical Treatments
  • Text and Document Classification Technologies
  • Software System Performance and Reliability
  • Opinion Dynamics and Social Influence
  • Advanced Optical Network Technologies
  • Anomaly Detection Techniques and Applications
  • Data Stream Mining Techniques
  • Video Surveillance and Tracking Methods
  • Colorectal and Anal Carcinomas
  • Interconnection Networks and Systems
  • Advanced Database Systems and Queries
  • Colorectal Cancer Treatments and Studies
  • Cognitive Computing and Networks
  • Caching and Content Delivery
  • Appendicitis Diagnosis and Management
  • Intraperitoneal and Appendiceal Malignancies
  • Human Mobility and Location-Based Analysis

Xintai People's Hospital
2025

PLA Information Engineering University
2020-2024

System Equipment (China)
2014-2024

Zhejiang University of Technology
2023-2024

Songshan Lake Materials Laboratory
2022-2024

Wuhou District People's Hospital, Chengdu
2022

National Tsing Hua University
2019-2022

First Affiliated Hospital of GuangXi Medical University
2019-2022

Guangxi Medical University
2019-2022

China Medical University Hospital
2021

Along with the rapid evolution of mobile communication technologies, such as 5G, there has been a significant increase in telecom fraud, which severely dissipates individual fortune and social wealth. In recent years, graph mining techniques are gradually becoming mainstream solution for detecting fraud. However, imbalance problem, caused by Pareto principle, brings severe challenges to data mining. This emerging complex issue received limited attention prior research. this paper, we propose...

10.1109/tbdata.2024.3352978 article EN IEEE Transactions on Big Data 2024-01-11

Distributed control plane is a promising approach to scalable software-defined networking (SDN). However, traffic changes could incur load imbalance among individual controllers. Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch using available resource. Such has performed with well-defined mechanism fully utilize the resource In this paper, we study decide which and where it should migrated for balanced plane, define as...

10.1109/ifipnetworking.2015.7145319 article EN 2015-05-01

Software Defined Networking (SDN) is a revolutionary networking paradigm towards the future network, experiencing rapid development nowadays. However, its main characteristic, separation of control plane and data plane, also brings about new security challenges, i.e., Denial-of-Service (DoS) attacks specific to OpenFlow SDN networks exhaust bandwidth overload buffer memory switch. To mitigate DoS in networks, we design implement SGuard, application on top NOX controller that mainly contains...

10.1109/cc.2017.7961368 article EN China Communications 2017-01-01

In recent years, the increasing prevalence of mobile social network fraud has led to significant distress and depletion personal wealth, resulting in considerable economic harm. Graph neural networks (GNNs) have emerged as a popular approach tackle this issue. However, challenge graph imbalance, which can greatly impede effectiveness GNN-based detection methods, received little attention prior research. Thus, we are going present novel cost-sensitive (CSGNN) article. Initially, reinforcement...

10.1109/tcss.2023.3302651 article EN IEEE Transactions on Computational Social Systems 2023-08-17

Software-defined networking (SDN) has emerged as a new paradigm that can provide fine-grained network management service. Since the SDN controller makes control decision for network, it becomes main target of denial service (DoS) attacks. In this paper, we propose BWManager to mitigateE which mainly consists mitigate DoS attacks on with four key components: 1) simplified detection module; 2) forecasting engine; 3) priority manager; and 4) scheduler. The module calculates comprehensive...

10.1109/tnsm.2018.2873639 article EN IEEE Transactions on Network and Service Management 2018-10-03

Summary Distributed control plane is a promising approach to scalable software‐defined networking (SDN). Live migration of switches from controllers that are overloaded those underutilized may be solution handle peak switch traffic using available resource. However, such has performed with well‐designed mechanism fully utilize resources in all three resource dimensions: CPU, bandwidth, and memory. In this article, we first provide model for SDN reduce the decision centralized utilization...

10.1002/dac.3101 article EN International Journal of Communication Systems 2016-02-24

The authors present a case of an infected anterolateral thigh flap repairing the defect after auricular squamous cell carcinoma surgery. A 59-year-old male with in right auricle was admitted to hospital. After extended excision tumor, repaired free flap. accidentally multiple digestive tract bacteria. Computed tomography (CT) angiography employed reconstruct anastomosed artery patient followed up for 3 years. survived well. No recurrence or metastasis observed. In addition, satisfied...

10.1097/scs.0000000000011209 article EN Journal of Craniofacial Surgery 2025-03-07

With the rapid evolution of mobile communication networks, number subscribers and their practices is increasing dramatically worldwide. However, fraudsters are also sniffing out benefits. Detecting from massive volume call detail records (CDR) in networks has become an important yet challenging topic. Fortunately, Graph neural network (GNN) brings new possibilities for telecom fraud detection. presence graph imbalance GNN oversmoothing problems makes fraudster detection unsatisfactory. To...

10.3390/e25010150 article EN cc-by Entropy 2023-01-11

Telecom fraud detection is of great significance in online social networks. Yet the massive, redundant, incomplete, and uncertain network information makes it a challenging task to handle. Hence, this paper mainly uses correlation attributes by entropy function optimize data quality then solves problem telecommunication with incomplete information. First, filter out redundancy noise, we propose an attribute reduction algorithm based on max-correlation max-independence rate (MCIR) improve...

10.3390/e25010112 article EN cc-by Entropy 2023-01-05

Software-Defined Networking (SDN) has quickly emerged as a promising technology for future networks and gained much attention. However, the centralized nature of SDN makes system vulnerable to denial-of-services (DoS) attacks, especially currently widely deployed multicontroller system. Due DoS model may additionally face risk cascading failures controllers. In this paper, we propose SDNManager, lightweight fast denial-of-service detection mitigation SDN. It five components: monitor,...

10.1155/2018/7545079 article EN cc-by Security and Communication Networks 2018-01-01

Elastic control could balance the distributed plane in Software-Defined Networking (SDN). Dynamic switch migration has been proposed to achieve it. However, existing schemes mainly focus on how execute operation, but not why. This paper designs a decision-making mechanism based zero-sum game theory reelect new controller as master for migrated switches. It first chooses heavy which invites its neighbors players compete role of this game-playing field (GPF) is an occasional and loose domain...

10.1109/cc.2016.7489978 article EN China Communications 2016-05-01

Several reported studies have focussed particular interest on the elastic control via OpenFlow (OF) switch migrations in software‐defined networks to avoid uneven load distributions among controllers. However, it is not clear which should be migrated and where will moved. A paradigm that heavy controller tries migrate its switches, other light controllers compete for designed. Then, taking as game players OF switches commodities, a zero‐sum model exploited, emulate competitions This first...

10.1049/el.2014.2086 article EN Electronics Letters 2014-10-28

Recently, a number of similarity-based methods have been proposed for link prediction complex networks. Among these indices, the resource-allocation-based perform very well considering amount resources in information transmission process between nodes. However, they ignore channels and their capacity two endpoints. Motivated by Cannikin Law, definition is to quantify capability any Then, based on capacity, potential (PIC) index prediction. Empirical study 15 datasets has shown that PIC we...

10.3390/e21090863 article EN cc-by Entropy 2019-09-04

In this letter, we model the dynamic instance switching problem based on fact that some routing instances could have common vulnerabilities. We propose correlation-aware (CDIS) algorithm to solve problem. The simulation results show that, compared with baseline algorithms, CDIS improves network compromised ratio by at least 10%.

10.1109/lcomm.2019.2901486 article EN IEEE Communications Letters 2019-02-25

INTRODUCTION: Natural orifice specimen extraction is the next step in minimally invasive colorectal surgery but can be technically challenging, with additional risks, especially for oncologic surgery. For several key reasons, sigmoid volvulus well suited natural We describe our method and experience double-stapled anastomosis transrectal volvulus. TECHNIQUE: Using 3- or 4-port laparoscopy, mesentery separated from long loop. After distal bowel tied off washed out, rectum completely...

10.1097/dcr.0000000000001922 article EN Diseases of the Colon & Rectum 2021-01-25

Super spread detection has been widely applied in network management, recommender systems, and cyberspace security. It is more complicated than heavy hitter owing to the requirement of duplicate removal. Accurately detecting a super real-time with small memory demands remains nontrivial yet challenging issue. The previous work either had low accuracy or incurred overhead could not provide precise cardinality estimation. This paper designed an invertible sketch for high accuracy. introduces...

10.3390/electronics13010222 article EN Electronics 2024-01-03
Coming Soon ...