Xiangliang Zhang
Xiangliang Zhang
Associate Professor, KAUST
Verified email at kaust.edu.sa - Homepage
TitleCited byYear
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
1272014
An up-to-date comparison of state-of-the-art classification algorithms
C Zhang, C Liu, X Zhang, G Almpanidis
Expert Systems with Applications 82, 128-150, 2017
982017
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
942008
Data streaming with affinity propagation
X Zhang, C Furtlehner, M Sebag
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008
892008
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
822006
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
752004
Data Stream Clustering with Affinity Propagation
X Zhang, C Furtlehner, C Germain-Renaud, M Sebag
IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013
722013
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
Pervasive systems, algorithms, and networks (ISPAN), 2009 10th international …, 2009
722009
Modeling program behaviors by hidden markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Machine Learning and Cybernetics, 2004. Proceedings of 2004 International …, 2004
672004
Virtual machine migration in an over-committed cloud
X Zhang, ZY Shae, S Zheng, H Jamjoom
Network Operations and Management Symposium (NOMS), 2012 IEEE, 196-203, 2012
662012
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
632018
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
632014
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
592018
K-AP: generating specified K clusters by efficient affinity propagation
X Zhang, W Wang, K Norvag, M Sebag
Data mining (ICDM), 2010 IEEE 10th international conference on, 1187-1192, 2010
582010
Collaborative User Network Embedding for Social Recommender Systems
C Zhang, L Yu, Y Wang, C Shah, X Zhang
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017
54*2017
Decision theory for discrimination-aware classification
F Kamiran, A Karim, X Zhang
Data Mining (ICDM), 2012 IEEE 12th International Conference on, 924-929, 2012
522012
Controlling attribute effect in linear regression
T Calders, A Karim, F Kamiran, W Ali, X Zhang
Data Mining (ICDM), 2013 IEEE 13th International Conference on, 71-80, 2013
472013
Fast intrusion detection based on a non-negative matrix factorization model
X Guan, W Wang, X Zhang
Journal of Network and Computer Applications 32 (1), 31-44, 2009
472009
Constructing attribute weights from computer audit data for effective intrusion detection
W Wang, X Zhang, S Gombault
Journal of Systems and Software 82 (12), 1974-1981, 2009
462009
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams
AA Qahtan, B Alharbi, S Wang, X Zhang
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
402015
The system can't perform the operation now. Try again later.
Articles 1–20