<?xml version="1.0"?>
<dblpperson name="Hongsong Chen" pid="60/2" n="50">
<person key="homepages/60/2" mdate="2009-06-08">
<author pid="60/2">Hongsong Chen</author>
</person>
<r><article key="journals/eswa/KhanC26" mdate="2026-02-03">
<author orcid="0009-0003-6713-8776" pid="135/6037">Muhammad Shoaib Khan</author>
<author pid="60/2">Hongsong Chen</author>
<title>Hybrid transformer deep neural architectures for enhanced misinformation detection on social media.</title>
<pages>130470</pages>
<year>2026</year>
<volume>300</volume>
<journal>Expert Syst. Appl.</journal>
<ee>https://doi.org/10.1016/j.eswa.2025.130470</ee>
<url>db/journals/eswa/eswa300.html#KhanC26</url>
<stream>streams/journals/eswa</stream>
</article>
</r>
<r><article key="journals/kbs/NadeemC26" mdate="2026-03-31">
<author pid="75/6495">Muhammad Nadeem</author>
<author pid="60/2">Hongsong Chen</author>
<title>RaSA-BoDX: A meta-cognitive reasoning framework for cyberbullying language detection and mitigation using multi-agent systems.</title>
<year>2026</year>
<pages>115639</pages>
<volume>339</volume>
<journal>Knowl. Based Syst.</journal>
<ee>https://doi.org/10.1016/j.knosys.2026.115639</ee>
<url>db/journals/kbs/kbs339.html#NadeemC26</url>
<stream>streams/journals/kbs</stream>
</article>
</r>
<r><article key="journals/lre/ChenZ26" mdate="2026-02-09">
<author pid="60/2">Hongsong Chen</author>
<author pid="57/10047">Xiufeng Zhao</author>
<title>Cyberspace fake news and manipulator accounts detection and language governance.</title>
<pages>21</pages>
<year>2026</year>
<month>March</month>
<volume>60</volume>
<journal>Lang. Resour. Evaluation</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10579-026-09904-0</ee>
<url>db/journals/lre/lre60.html#ChenZ26</url>
<stream>streams/journals/lre</stream>
</article>
</r>
<r><article key="journals/cluster/JalaliC25" mdate="2025-03-03">
<author orcid="0000-0003-0686-147X" pid="341/8604">Nasir Ahmad Jalali</author>
<author pid="60/2">Hongsong Chen</author>
<title>Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G.</title>
<pages>112</pages>
<year>2025</year>
<month>April</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10586-024-04788-7</ee>
<url>db/journals/cluster/cluster28.html#JalaliC25</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cluster/AliC25" mdate="2025-06-11">
<author pid="405/4279">Ghazi Mergani Ahmead Ali</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<title>MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts.</title>
<pages>337</pages>
<year>2025</year>
<month>October</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1007/s10586-024-05051-9</ee>
<url>db/journals/cluster/cluster28.html#AliC25</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cluster/AliC25a" mdate="2025-09-07">
<author pid="405/4279">Ghazi Mergani Ahmead Ali</author>
<author pid="60/2">Hongsong Chen</author>
<title>Contract-guardian: a bagging-based gradient boosting decision tree for detection vulnerability in smart contract.</title>
<pages>528</pages>
<year>2025</year>
<month>September</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s10586-025-05230-2</ee>
<url>db/journals/cluster/cluster28.html#AliC25a</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cluster/JalaliC25a" mdate="2025-11-15">
<author orcid="0000-0003-0686-147X" pid="341/8604">Nasir Ahmad Jalali</author>
<author pid="60/2">Hongsong Chen</author>
<title>Securing social network user data in large language model deployments: challenges and best practices.</title>
<pages>717</pages>
<year>2025</year>
<month>October</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>11</number>
<ee>https://doi.org/10.1007/s10586-025-05482-y</ee>
<url>db/journals/cluster/cluster28.html#JalaliC25a</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cluster/ChenL25a" mdate="2025-10-31">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="45/2385">Xingyu Li</author>
<title>6G network cloud-edge-end collaboration security auditing traceability scheme and experiment verification.</title>
<pages>1052</pages>
<year>2025</year>
<month>December</month>
<volume>28</volume>
<journal>Clust. Comput.</journal>
<number>16</number>
<ee>https://doi.org/10.1007/s10586-025-05790-3</ee>
<url>db/journals/cluster/cluster28.html#ChenL25a</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/cn/NadeemC25" mdate="2025-07-04">
<author orcid="0000-0003-3566-7078" pid="75/6495">Muhammad Nadeem</author>
<author pid="60/2">Hongsong Chen</author>
<title>Advancing social network security with magteon-turing L3TM: A multi-layered defense system against cyber threats.</title>
<pages>111375</pages>
<year>2025</year>
<volume>267</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2025.111375</ee>
<url>db/journals/cn/cn267.html#NadeemC25</url>
<stream>streams/journals/cn</stream>
</article>
</r>
<r><article key="journals/concurrency/AliCWD25" mdate="2026-03-31">
<author orcid="0009-0001-3296-3923" pid="405/4279">Ghazi Mergani Ahmead Ali</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="220/5388">Zhongru Wang</author>
<author pid="236/3672">Chunlai Du</author>
<title>CrossGuard: Runtime-Adaptive LLM Fuzzing for Cross-Contract Vulnerabilities Detection.</title>
<year>2025</year>
<volume>37</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>27-28</number>
<ee>https://doi.org/10.1002/cpe.70421</ee>
<url>db/journals/concurrency/concurrency37.html#AliCWD25</url>
<stream>streams/journals/concurrency</stream>
</article>
</r>
<r><article key="journals/eswa/NadeemC25" mdate="2025-05-01">
<author orcid="0000-0003-3566-7078" pid="75/6495">Muhammad Nadeem</author>
<author pid="60/2">Hongsong Chen</author>
<title>Protecting social networks against Dual-Vector attacks using Swarm OpenAI, Large Language Models, Swarm Intelligence, and Transformers.</title>
<pages>127307</pages>
<year>2025</year>
<volume>278</volume>
<journal>Expert Syst. Appl.</journal>
<ee>https://doi.org/10.1016/j.eswa.2025.127307</ee>
<url>db/journals/eswa/eswa278.html#NadeemC25</url>
<stream>streams/journals/eswa</stream>
</article>
</r>
<r><article key="journals/istr/ChenTWL25" mdate="2025-03-04">
<author pid="60/2">Hongsong Chen</author>
<author pid="398/7582">Zimei Tao</author>
<author pid="52/2567">Zhiheng Wang</author>
<author pid="82/8038">Xinrui Liu</author>
<title>Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage.</title>
<pages>103981</pages>
<year>2025</year>
<volume>89</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2025.103981</ee>
<url>db/journals/istr/istr89.html#ChenTWL25</url>
<stream>streams/journals/istr</stream>
</article>
</r>
<r><article key="journals/jnca/AnjumLC25" mdate="2025-03-07">
<author orcid="0000-0002-8636-8388" pid="193/2306">Naveed Anjum</author>
<author orcid="0000-0002-5373-8063" pid="221/5993">Zohaib Latif</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<title>Security and privacy of industrial big data: Motivation, opportunities, and challenges.</title>
<pages>104130</pages>
<year>2025</year>
<volume>237</volume>
<journal>J. Netw. Comput. Appl.</journal>
<ee>https://doi.org/10.1016/j.jnca.2025.104130</ee>
<url>db/journals/jnca/jnca237.html#AnjumLC25</url>
<stream>streams/journals/jnca</stream>
</article>
</r>
<r><article key="journals/wpc/JalaliCZA25" mdate="2025-12-07">
<author orcid="0000-0003-0686-147X" pid="341/8604">Nasir Ahmad Jalali</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="420/8081">Farid Ahmad Zahin</author>
<author pid="363/5732">Aliyu Ashiru</author>
<title>Enhanced Security and Privacy Framework for Federated Learning in Beyond 5G IoT Networks.</title>
<pages>115-156</pages>
<year>2025</year>
<month>September</month>
<volume>144</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>1-2</number>
<ee>https://doi.org/10.1007/s11277-025-11841-0</ee>
<url>db/journals/wpc/wpc144.html#JalaliCZA25</url>
<stream>streams/journals/wpc</stream>
</article>
</r>
<r><article key="journals/cluster/JalaliC24" mdate="2025-03-03">
<author orcid="0000-0003-0686-147X" pid="341/8604">Nasir Ahmad Jalali</author>
<author pid="60/2">Hongsong Chen</author>
<title>Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system.</title>
<pages>10859-10882</pages>
<year>2024</year>
<month>November</month>
<volume>27</volume>
<journal>Clust. Comput.</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s10586-024-04515-2</ee>
<url>db/journals/cluster/cluster27.html#JalaliC24</url>
<stream>streams/journals/cluster</stream>
</article>
</r>
<r><article key="journals/compsec/ChenLL24" mdate="2024-02-10">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author orcid="0000-0003-2791-944X" pid="45/2385">Xingyu Li</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.</title>
<pages>103581</pages>
<year>2024</year>
<month>February</month>
<volume>137</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2023.103581</ee>
<url>db/journals/compsec/compsec137.html#ChenLL24</url>
</article>
</r>
<r><article key="journals/tcss/ChenZ24" mdate="2025-01-08">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author orcid="0009-0008-2906-1057" pid="57/10047">Xiufeng Zhao</author>
<title>Stochastic Evolutionary Game Model of Hot Topics Propagation for Network Public Opinion.</title>
<pages>8178-8190</pages>
<year>2024</year>
<month>December</month>
<volume>11</volume>
<journal>IEEE Trans. Comput. Soc. Syst.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TCSS.2023.3265020</ee>
<url>db/journals/tcss/tcss11.html#ChenZ24</url>
<stream>streams/journals/tcss</stream>
</article>
</r>
<r><article key="journals/wpc/ChenZHCZ24" mdate="2024-08-02">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="64/3770">Yiying Zhang</author>
<author pid="120/9155">Xintong Han</author>
<author pid="288/1598">Yongrui Cao</author>
<author pid="16/1081">Yongpeng Zhang</author>
<title>Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment.</title>
<pages>2299-2327</pages>
<year>2024</year>
<month>June</month>
<volume>136</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11277-024-11375-x</ee>
<url>db/journals/wpc/wpc136.html#ChenZHCZ24</url>
<stream>streams/journals/wpc</stream>
</article>
</r>
<r><article key="journals/jaihc/ChenLZHCZ23" mdate="2024-01-13">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="119/1195">Shi Lei</author>
<author pid="64/3770">Yiying Zhang</author>
<author pid="120/9155">Xintong Han</author>
<author pid="288/1598">Yongrui Cao</author>
<author pid="16/1081">Yongpeng Zhang</author>
<title>Blockchain-based internet of things security architecture and applications.</title>
<pages>16703-16714</pages>
<year>2023</year>
<month>December</month>
<volume>14</volume>
<journal>J. Ambient Intell. Humaniz. Comput.</journal>
<number>12</number>
<ee>https://doi.org/10.1007/s12652-023-04675-w</ee>
<url>db/journals/jaihc/jaihc14.html#ChenLZHCZ23</url>
</article>
</r>
<r><article key="journals/wpc/JalaliC23" mdate="2023-03-11">
<author pid="341/8604">Nasir Ahmad Jalali</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<title>Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure.</title>
<pages>475-500</pages>
<year>2023</year>
<month>March</month>
<volume>129</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11277-022-10107-3</ee>
<url>db/journals/wpc/wpc129.html#JalaliC23</url>
</article>
</r>
<r><inproceedings key="conf/fsdm/AliC23" mdate="2024-01-30">
<author pid="366/9616">Ghazi Mergani Ali</author>
<author pid="60/2">Hongsong Chen</author>
<title>Power of Fuzzing and Machine Learning in Smart Contract Security Validation.</title>
<pages>788-796</pages>
<year>2023</year>
<booktitle>FSDM</booktitle>
<ee>https://doi.org/10.3233/FAIA231090</ee>
<crossref>conf/fsdm/2023</crossref>
<url>db/conf/fsdm/fsdm2023.html#AliC23</url>
</inproceedings>
</r>
<r><article key="journals/ijisp/ChenMC21" mdate="2021-08-03">
<author pid="60/2">Hongsong Chen</author>
<author pid="237/8141">Caixia Meng</author>
<author pid="298/6696">Jingjiu Chen</author>
<title>DDoS Attack Simulation and Machine Learning-Based Detection Approach in Internet of Things Experimental Environment.</title>
<pages>1-18</pages>
<year>2021</year>
<volume>15</volume>
<journal>Int. J. Inf. Secur. Priv.</journal>
<number>3</number>
<ee>https://doi.org/10.4018/IJISP.2021070101</ee>
<url>db/journals/ijisp/ijisp15.html#ChenMC21</url>
</article>
</r>
<r><article key="journals/wpc/ChenZCB21" mdate="2023-08-28">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="16/1081">Yongpeng Zhang</author>
<author pid="288/1598">Yongrui Cao</author>
<author pid="b/BKBhargava">Bharat K. Bhargava</author>
<title>Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment.</title>
<pages>3505-3525</pages>
<year>2021</year>
<volume>117</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11277-021-08284-8</ee>
<ee>https://www.wikidata.org/entity/Q115145463</ee>
<url>db/journals/wpc/wpc117.html#ChenZCB21</url>
</article>
</r>
<r><article key="journals/fgcs/ZimbaCWC20" mdate="2025-01-19">
<author orcid="0000-0002-2587-106X" pid="204/8399">Aaron Zimba</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="131/6508">Zhaoshun Wang</author>
<author pid="207/4993">Mumbi Chishimba</author>
<title>Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics.</title>
<pages>501-517</pages>
<year>2020</year>
<volume>106</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2020.01.032</ee>
<ee>https://www.wikidata.org/entity/Q126298773</ee>
<url>db/journals/fgcs/fgcs106.html#ZimbaCWC20</url>
</article>
</r>
<r><article key="journals/iet-ifs/ChenMFL20" mdate="2021-01-26">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="237/8141">Caixia Meng</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="45/4007">Chao-Hsien Lee</author>
<title>Novel LDoS attack detection by Spark-assisted correlation analysis approach in wireless sensor network.</title>
<pages>452-458</pages>
<year>2020</year>
<volume>14</volume>
<journal>IET Inf. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1049/iet-ifs.2018.5512</ee>
<url>db/journals/iet-ifs/iet-ifs14.html#ChenMFL20</url>
</article>
</r>
<r><article key="journals/access/ChenMSFB19" mdate="2025-01-19">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="237/8141">Caixia Meng</author>
<author pid="60/6880">Zhiguang Shan</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="b/BKBhargava">Bharat K. Bhargava</author>
<title>A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.</title>
<pages>32853-32866</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2903816</ee>
<ee>https://www.wikidata.org/entity/Q128261452</ee>
<url>db/journals/access/access7.html#ChenMSFB19</url>
</article>
</r>
<r><article key="journals/comsis/ChenZSLF19" mdate="2019-11-11">
<author pid="60/2">Hongsong Chen</author>
<author pid="252/5540">Haiyan Zhuang</author>
<author pid="60/6880">Zhiguang Shan</author>
<author pid="45/4007">Chao-Hsien Lee</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>A novel SMP-based survivability evaluation metric and approach in wireless sensor network.</title>
<pages>733-751</pages>
<year>2019</year>
<volume>16</volume>
<journal>Comput. Sci. Inf. Syst.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.2298/CSIS180918024C</ee>
<url>db/journals/comsis/comsis16.html#ChenZSLF19</url>
</article>
</r>
<r><article key="journals/fgcs/ZimbaCW19" mdate="2020-02-19">
<author orcid="0000-0002-2587-106X" pid="204/8399">Aaron Zimba</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author pid="131/6508">Zhaoshun Wang</author>
<title>Bayesian network based weighted APT attack paths modeling in cloud computing.</title>
<pages>525-537</pages>
<year>2019</year>
<volume>96</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2019.02.045</ee>
<url>db/journals/fgcs/fgcs96.html#ZimbaCW19</url>
</article>
</r>
<r><article key="journals/ijes/ChenFW19" mdate="2025-01-19">
<author pid="60/2">Hongsong Chen</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="71/4292">Gang Wang</author>
<title>A novel HHT and KS statistic approach to detect RoQ attack in wireless sensor network.</title>
<pages>643-652</pages>
<year>2019</year>
<volume>11</volume>
<journal>Int. J. Embed. Syst.</journal>
<number>5</number>
<ee>https://doi.org/10.1504/IJES.2019.102439</ee>
<ee>https://www.wikidata.org/entity/Q127210370</ee>
<url>db/journals/ijes/ijes11.html#ChenFW19</url>
</article>
</r>
<r><article key="journals/itiis/ZimbaWCM19" mdate="2021-02-16">
<author orcid="0000-0002-2587-106X" pid="204/8399">Aaron Zimba</author>
<author pid="131/6508">Zhaoshun Wang</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="207/5098">Mwenge Mulenga</author>
<title>Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks.</title>
<pages>3258-3279</pages>
<year>2019</year>
<volume>13</volume>
<journal>KSII Trans. Internet Inf. Syst.</journal>
<number>6</number>
<ee type="oa">https://doi.org/10.3837/tiis.2019.06.027</ee>
<url>db/journals/itiis/itiis13.html#ZimbaWCM19</url>
</article>
</r>
<r><article key="journals/jsjkx/ZhanGHLSC19" mdate="2020-03-12">
<author pid="176/6731">Xiong Zhan</author>
<author pid="97/3499">Hao Guo</author>
<author pid="80/3328">Xiaoyun He</author>
<author pid="209/7082">Zhoubin Liu</author>
<author pid="160/5587">Xuejie Sun</author>
<author pid="60/2">Hongsong Chen</author>
<title>&#22269;&#23478;&#30005;&#32593;&#36793;&#32536;&#35745;&#31639;&#20449;&#24687;&#31995;&#32479;&#23433;&#20840;&#39118;&#38505;&#35780;&#20272;&#26041;&#27861;&#30740;&#31350; (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).</title>
<pages>428-432</pages>
<year>2019</year>
<volume>46</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>11A</number>
<ee type="oa">http://www.jsjkx.com/CN/Y2019/V46/I11A/428</ee>
<ee type="oa">http://www.jsjkx.com/EN/Y2019/V46/I11A/428</ee>
<url>db/journals/jsjkx/jsjkx46.html#ZhanGHLSC19</url>
</article>
</r>
<r><article key="journals/wpc/ChenLF19" mdate="2020-08-20">
<author pid="60/2">Hongsong Chen</author>
<author pid="20/2039">Ming Liu</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>Using Improved Hilbert-Huang Transformation Method to Detect Routing-Layer Reduce of Quality Attack in Wireless Sensor Network.</title>
<pages>595-615</pages>
<year>2019</year>
<volume>104</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s11277-018-6036-3</ee>
<url>db/journals/wpc/wpc104.html#ChenLF19</url>
</article>
</r>
<r><article key="journals/ict-express/ZimbaWC18" mdate="2021-09-16">
<author orcid="0000-0002-2587-106X" pid="204/8399">Aaron Zimba</author>
<author pid="131/6508">Zhaoshun Wang</author>
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<title>Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems.</title>
<pages>14-18</pages>
<year>2018</year>
<volume>4</volume>
<journal>ICT Express</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1016/j.icte.2017.12.007</ee>
<url>db/journals/ict-express/ict-express4.html#ZimbaWC18</url>
</article>
</r>
<r><article key="journals/ijnsec/ZimbaCW18" mdate="2021-01-04">
<author pid="204/8399">Aaron Zimba</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="131/6508">Zhaoshun Wang</author>
<title>Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions.</title>
<pages>558-567</pages>
<year>2018</year>
<volume>20</volume>
<journal>Int. J. Netw. Secur.</journal>
<number>3</number>
<ee type="oa">http://ijns.jalaxy.com.tw/contents/ijns-v20-n3/ijns-2018-v20-n3-p558-567.pdf</ee>
<url>db/journals/ijnsec/ijnsec20.html#ZimbaCW18</url>
</article>
</r>
<r><article key="journals/mam/ZhangFCC18" mdate="2020-02-22">
<author pid="229/7292">Bi-ying Zhang</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="08/4975">Gang Cui</author>
<title>TCSTM: A task-characteristic-considered steady-state thermal model of multicore processors.</title>
<pages>162-172</pages>
<year>2018</year>
<volume>60</volume>
<journal>Microprocess. Microsystems</journal>
<ee>https://doi.org/10.1016/j.micpro.2018.04.007</ee>
<url>db/journals/mam/mam60.html#ZhangFCC18</url>
</article>
</r>
<r><article key="journals/ns/FarhaC18" mdate="2020-02-22">
<author orcid="0000-0003-3894-7913" pid="219/2902">Fadi Farha</author>
<author pid="60/2">Hongsong Chen</author>
<title>Mitigating replay attacks with ZigBee solutions.</title>
<pages>13-19</pages>
<year>2018</year>
<volume>2018</volume>
<journal>Netw. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/S1353-4858(18)30008-4</ee>
<url>db/journals/ns/ns2018.html#FarhaC18</url>
</article>
</r>
<r><inproceedings key="conf/isi/ZimbaWC17" mdate="2017-09-16">
<author orcid="0000-0002-2587-106X" pid="204/8399">Aaron Zimba</author>
<author pid="131/6508">Zhaoshun Wang</author>
<author pid="60/2">Hongsong Chen</author>
<title>Reasoning crypto ransomware infection vectors with Bayesian networks.</title>
<pages>149-151</pages>
<year>2017</year>
<booktitle>ISI</booktitle>
<ee>https://doi.org/10.1109/ISI.2017.8004894</ee>
<crossref>conf/isi/2017</crossref>
<url>db/conf/isi/isi2017.html#ZimbaWC17</url>
</inproceedings>
</r>
<r><article key="journals/jsjkx/ChenWF18" mdate="2020-03-20">
<author pid="60/2">Hongsong Chen</author>
<author pid="71/4292">Gang Wang</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>&#22522;&#20110;&#20998;&#27573;&#27169;&#22411;&#26816;&#27979;&#30340;&#20113;&#26381;&#21153;&#36328;&#22495;&#35748;&#35777;&#21327;&#35758;&#30340;&#24418;&#24335;&#21270;&#20998;&#26512;&#19982;&#39564;&#35777; (Cloud Services Cross-domain Authentication Protocol Formal Analysis and Verification Based on Fragment Model Check).</title>
<pages>140-144</pages>
<year>2016</year>
<volume>43</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2016.04.028</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2016.04.028</ee>
<url>db/journals/jsjkx/jsjkx43.html#ChenWF18</url>
</article>
</r>
<r><article key="journals/mis/ChenF15" mdate="2020-10-01">
<author pid="60/2">Hongsong Chen</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation.</title>
<pages>852173:1-852173:9</pages>
<year>2015</year>
<volume>2015</volume>
<journal>Mob. Inf. Syst.</journal>
<ee type="oa">https://doi.org/10.1155/2015/852173</ee>
<ee>https://www.wikidata.org/entity/Q59118369</ee>
<url>db/journals/mis/mis2015.html#ChenF15</url>
</article>
</r>
<r><inproceedings key="conf/trustcom/ChenHF15" mdate="2017-05-23">
<author pid="60/2">Hongsong Chen</author>
<author pid="14/3563">Zhi Han</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks.</title>
<pages>1272-1278</pages>
<year>2015</year>
<booktitle>TrustCom/BigDataSE/ISPA (1)</booktitle>
<ee>https://doi.org/10.1109/Trustcom.2015.517</ee>
<crossref>conf/trustcom/2015-1</crossref>
<url>db/conf/trustcom/trustcom2015-1.html#ChenHF15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uic/ChenW15" mdate="2023-03-23">
<author pid="60/2">Hongsong Chen</author>
<author pid="32/6877">Xiaomei Wang</author>
<title>Design and Implementation of Cloud Server Remote Management System Based on IMPI Protocol.</title>
<pages>1475-1478</pages>
<year>2015</year>
<booktitle>UIC/ATC/ScalCom</booktitle>
<ee>https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.266</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.266</ee>
<crossref>conf/uic/2015</crossref>
<url>db/conf/uic/uic2015.html#ChenW15</url>
</inproceedings>
</r>
<r><article key="journals/cloudcomp/ChenBF14" mdate="2020-04-25">
<author pid="60/2">Hongsong Chen</author>
<author pid="b/BKBhargava">Bharat K. Bhargava</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>Multilabels-Based Scalable Access Control for Big Data Applications.</title>
<pages>65-71</pages>
<year>2014</year>
<volume>1</volume>
<journal>IEEE Cloud Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MCC.2014.62</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MCC.2014.62</ee>
<url>db/journals/cloudcomp/cloudcomp1.html#ChenBF14</url>
</article>
</r>
<r><article key="journals/tasm/Chen13" mdate="2017-05-28">
<author pid="60/2">Hongsong Chen</author>
<title>Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review].</title>
<pages>10</pages>
<year>2013</year>
<volume>32</volume>
<journal>IEEE Technol. Soc. Mag.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/MTS.2013.2276667</ee>
<url>db/journals/tasm/tasm32.html#Chen13</url>
</article>
</r>
<r><article key="journals/iasc/ChenF11" mdate="2021-02-26">
<author pid="60/2">Hongsong Chen</author>
<author pid="01/8379">Zhongchuan Fu</author>
<title>A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks.</title>
<pages>1063-1074</pages>
<year>2011</year>
<volume>17</volume>
<journal>Intell. Autom. Soft Comput.</journal>
<number>8</number>
<ee type="archive">https://doi.org/10.1080/10798587.2011.10643211</ee>
<url>db/journals/iasc/iasc17.html#ChenF11</url>
</article>
</r>
<r><inproceedings key="conf/IEEEcit/WangFCBLCZWC10" mdate="2023-03-24">
<author pid="188/7759-77">Chao Wang 0077</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="60/2">Hongsong Chen</author>
<author pid="36/8378">Wei Ba</author>
<author pid="89/6764">Bin Li</author>
<author pid="13/3479">Lin Chen</author>
<author pid="91/7576">Zexu Zhang</author>
<author pid="61/270">Yuying Wang</author>
<author pid="08/4975">Gang Cui</author>
<title>CFCSS without Aliasing for SPARC Architecture.</title>
<pages>2094-2100</pages>
<year>2010</year>
<booktitle>CIT</booktitle>
<ee>https://doi.org/10.1109/CIT.2010.356</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CIT.2010.356</ee>
<crossref>conf/IEEEcit/2010</crossref>
<url>db/conf/IEEEcit/IEEEcit2010.html#WangFCBLCZWC10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/LuCHHHYWZC10" mdate="2017-05-23">
<author pid="16/718">Xiaoming Lu</author>
<author pid="86/2704">Weihua Cao</author>
<author pid="21/8970">Xusheng Huang</author>
<author pid="00/1971">Feiyi Huang</author>
<author pid="17/3407">Liwen He</author>
<author pid="01/8970">Wenhong Yang</author>
<author pid="81/2972">Shaobin Wang</author>
<author pid="31/2303">Xiaotong Zhang</author>
<author pid="60/2">Hongsong Chen</author>
<title>A Real Implementation of DPI in 3G Network.</title>
<pages>1-5</pages>
<year>2010</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2010.5684117</ee>
<crossref>conf/globecom/2010</crossref>
<url>db/conf/globecom/globecom2010.html#LuCHHHYWZC10</url>
</inproceedings>
</r>
<r><article key="journals/cit/ChenFWJH07" mdate="2022-06-10">
<author pid="60/2">Hongsong Chen</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="69/4431">Chengyao Wang</author>
<author pid="23/3418">Zhenzhou Ji</author>
<author pid="h/MingzengHu">Mingzeng Hu</author>
<title>Using network processor to establish security agent for AODV routing protocol.</title>
<pages>61-70</pages>
<year>2007</year>
<volume>15</volume>
<journal>J. Comput. Inf. Technol.</journal>
<number>1</number>
<ee>https://doi.org/10.2498/cit.1000748</ee>
<url>db/journals/cit/cit15.html#ChenFWJH07</url>
</article>
</r>
<r><article key="journals/jnca/ChenJHZR07" mdate="2023-08-28">
<author pid="60/2">Hongsong Chen</author>
<author pid="23/3418">Zhenzhou Ji</author>
<author pid="h/MingzengHu">Mingzeng Hu</author>
<author pid="01/8379">Zhongchuan Fu</author>
<author pid="35/1259">Ruixiang Jiang</author>
<title>Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol.</title>
<pages>145-166</pages>
<year>2007</year>
<volume>30</volume>
<journal>J. Netw. Comput. Appl.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.jnca.2005.09.006</ee>
<ee>https://www.wikidata.org/entity/Q115041086</ee>
<url>db/journals/jnca/jnca30.html#ChenJHZR07</url>
</article>
</r>
<r><article key="journals/wpc/ChenWZL07" mdate="2020-08-20">
<author pid="60/2">Hongsong Chen</author>
<author pid="131/6508">Zhaoshun Wang</author>
<author pid="34/6971">Guangping Zeng</author>
<author pid="43/5900">Hongwei Liu</author>
<title>Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol.</title>
<pages>49-62</pages>
<year>2007</year>
<volume>42</volume>
<journal>Wirel. Pers. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11277-006-9166-y</ee>
<url>db/journals/wpc/wpc42.html#ChenWZL07</url>
</article>
</r>
<r><inproceedings key="conf/appt/ChenJH03" mdate="2017-05-21">
<author pid="60/2">Hongsong Chen</author>
<author pid="23/3418">Zhenzhou Ji</author>
<author pid="h/MingzengHu">Mingzeng Hu</author>
<title>Orthogonal Design Method for Optimal Cache Configuration.</title>
<pages>172-176</pages>
<ee>https://doi.org/10.1007/978-3-540-39425-9_22</ee>
<year>2003</year>
<crossref>conf/appt/2003</crossref>
<booktitle>APPT</booktitle>
<url>db/conf/appt/appt2003.html#ChenJH03</url>
</inproceedings>
</r>
<coauthors n="65" nc="8">
<co c="-1"><na f="a/Ali:Ghazi_Mergani" pid="366/9616">Ghazi Mergani Ali</na></co>
<co c="3"><na f="a/Ali:Ghazi_Mergani_Ahmead" pid="405/4279">Ghazi Mergani Ahmead Ali</na></co>
<co c="6"><na f="a/Anjum:Naveed" pid="193/2306">Naveed Anjum</na></co>
<co c="4"><na f="a/Ashiru:Aliyu" pid="363/5732">Aliyu Ashiru</na></co>
<co c="0"><na f="b/Ba:Wei" pid="36/8378">Wei Ba</na></co>
<co c="0"><na f="b/Bhargava:Bharat_K=" pid="b/BKBhargava">Bharat K. Bhargava</na></co>
<co c="1"><na f="c/Cao:Weihua" pid="86/2704">Weihua Cao</na></co>
<co c="0"><na f="c/Cao:Yongrui" pid="288/1598">Yongrui Cao</na></co>
<co c="0"><na f="c/Chen:Jingjiu" pid="298/6696">Jingjiu Chen</na></co>
<co c="0"><na f="c/Chen:Lin" pid="13/3479">Lin Chen</na></co>
<co c="2"><na f="c/Chishimba:Mumbi" pid="207/4993">Mumbi Chishimba</na></co>
<co c="0"><na f="c/Cui:Gang" pid="08/4975">Gang Cui</na></co>
<co c="3"><na f="d/Du:Chunlai" pid="236/3672">Chunlai Du</na></co>
<co c="-1"><na f="f/Farha:Fadi" pid="219/2902">Fadi Farha</na></co>
<co c="0"><na f="f/Fu:Zhongchuan" pid="01/8379">Zhongchuan Fu</na></co>
<co c="0"><na f="g/Guo:Hao" pid="97/3499">Hao Guo</na></co>
<co c="0"><na f="h/Han:Xintong" pid="120/9155">Xintong Han</na></co>
<co c="0"><na f="h/Han:Zhi" pid="14/3563">Zhi Han</na></co>
<co c="1"><na f="h/He:Liwen" pid="17/3407">Liwen He</na></co>
<co c="0"><na f="h/He:Xiaoyun" pid="80/3328">Xiaoyun He</na></co>
<co c="0"><na f="h/Hu:Mingzeng" pid="h/MingzengHu">Mingzeng Hu</na></co>
<co c="1"><na f="h/Huang:Feiyi" pid="00/1971">Feiyi Huang</na></co>
<co c="1"><na f="h/Huang:Xusheng" pid="21/8970">Xusheng Huang</na></co>
<co c="4"><na f="j/Jalali:Nasir_Ahmad" pid="341/8604">Nasir Ahmad Jalali</na></co>
<co c="0"><na f="j/Ji:Zhenzhou" pid="23/3418">Zhenzhou Ji</na></co>
<co c="0"><na f="j/Jiang:Ruixiang" pid="35/1259">Ruixiang Jiang</na></co>
<co c="-1"><na f="k/Khan:Muhammad_Shoaib" pid="135/6037">Muhammad Shoaib Khan</na></co>
<co c="6"><na f="l/Latif:Zohaib" pid="221/5993">Zohaib Latif</na></co>
<co c="0"><na f="l/Lee:Chao=Hsien" pid="45/4007">Chao-Hsien Lee</na></co>
<co c="0"><na f="l/Lei:Shi" pid="119/1195">Shi Lei</na></co>
<co c="0"><na f="l/Li:Bin" pid="89/6764">Bin Li</na></co>
<co c="7"><na f="l/Li:Xingyu" pid="45/2385">Xingyu Li</na></co>
<co c="2"><na f="l/Liu:Hongwei" pid="43/5900">Hongwei Liu</na></co>
<co c="0"><na f="l/Liu:Ming" pid="20/2039">Ming Liu</na></co>
<co c="7"><na f="l/Liu:Wenmao" pid="62/9032">Wenmao Liu</na></co>
<co c="5"><na f="l/Liu:Xinrui" pid="82/8038">Xinrui Liu</na></co>
<co c="0"><na f="l/Liu:Zhoubin" pid="209/7082">Zhoubin Liu</na></co>
<co c="1"><na f="l/Lu:Xiaoming" pid="16/718">Xiaoming Lu</na></co>
<co c="0"><na f="m/Meng:Caixia" pid="237/8141">Caixia Meng</na></co>
<co c="2"><na f="m/Mulenga:Mwenge" pid="207/5098">Mwenge Mulenga</na></co>
<co c="-1"><na f="n/Nadeem:Muhammad" pid="75/6495">Muhammad Nadeem</na></co>
<co c="0"><na f="s/Shan:Zhiguang" pid="60/6880">Zhiguang Shan</na></co>
<co c="0"><na f="s/Sun:Xuejie" pid="160/5587">Xuejie Sun</na></co>
<co c="5"><na f="t/Tao:Zimei" pid="398/7582">Zimei Tao</na></co>
<co c="0"><na f="w/Wang_0077:Chao" pid="188/7759-77">Chao Wang 0077</na></co>
<co c="0"><na f="w/Wang:Chengyao" pid="69/4431">Chengyao Wang</na></co>
<co c="0"><na f="w/Wang:Gang" pid="71/4292">Gang Wang</na></co>
<co c="1"><na f="w/Wang:Shaobin" pid="81/2972">Shaobin Wang</na></co>
<co c="-1"><na f="w/Wang:Xiaomei" pid="32/6877">Xiaomei Wang</na></co>
<co c="0"><na f="w/Wang:Yuying" pid="61/270">Yuying Wang</na></co>
<co c="2"><na f="w/Wang:Zhaoshun" pid="131/6508">Zhaoshun Wang</na></co>
<co c="5"><na f="w/Wang:Zhiheng" pid="52/2567">Zhiheng Wang</na></co>
<co c="3"><na f="w/Wang:Zhongru" pid="220/5388">Zhongru Wang</na></co>
<co c="1"><na f="y/Yang:Wenhong" pid="01/8970">Wenhong Yang</na></co>
<co c="4"><na f="z/Zahin:Farid_Ahmad" pid="420/8081">Farid Ahmad Zahin</na></co>
<co c="2"><na f="z/Zeng:Guangping" pid="34/6971">Guangping Zeng</na></co>
<co c="0"><na f="z/Zhan:Xiong" pid="176/6731">Xiong Zhan</na></co>
<co c="0"><na f="z/Zhang:Bi=ying" pid="229/7292">Bi-ying Zhang</na></co>
<co c="1"><na f="z/Zhang:Xiaotong" pid="31/2303">Xiaotong Zhang</na></co>
<co c="0"><na f="z/Zhang:Yiying" pid="64/3770">Yiying Zhang</na></co>
<co c="0"><na f="z/Zhang:Yongpeng" pid="16/1081">Yongpeng Zhang</na></co>
<co c="0"><na f="z/Zhang:Zexu" pid="91/7576">Zexu Zhang</na></co>
<co c="-1"><na f="z/Zhao:Xiufeng" pid="57/10047">Xiufeng Zhao</na></co>
<co c="0"><na f="z/Zhuang:Haiyan" pid="252/5540">Haiyan Zhuang</na></co>
<co c="2"><na f="z/Zimba:Aaron" pid="204/8399">Aaron Zimba</na></co>
</coauthors>
</dblpperson>

