Xiangliang Zhang
Xiangliang Zhang
Associate Professor, KAUST
Verified email at kaust.edu.sa - Homepage
Title
Cited by
Cited by
Year
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
1762014
An up-to-date comparison of state-of-the-art classification algorithms
C Zhang, C Liu, X Zhang, G Almpanidis
Expert Systems with Applications 82, 128-150, 2017
1422017
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
1182018
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1092008
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
1032018
Data streaming with affinity propagation
X Zhang, C Furtlehner, M Sebag
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2008
942008
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
922006
Collaborative User Network Embedding for Social Recommender Systems
C Zhang, L Yu, Y Wang, C Shah, X Zhang
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017
84*2017
Decision theory for discrimination-aware classification
F Kamiran, A Karim, X Zhang
2012 IEEE 12th International Conference on Data Mining, 924-929, 2012
822012
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
822009
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
822004
Data Stream Clustering with Affinity Propagation
X Zhang, C Furtlehner, C Germain-Renaud, M Sebag
IEEE Transactions on Knowledge and Data Engineering (TKDE), 26, 1644-1656, 2013
792013
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
782014
Virtual machine migration in an over-committed cloud
X Zhang, ZY Shae, S Zheng, H Jamjoom
2012 IEEE Network Operations and Management Symposium, 196-203, 2012
742012
Modeling program behaviors by hidden Markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Proceedings of 2004 International Conference on Machine Learning and …, 2004
742004
K-AP: generating specified K clusters by efficient affinity propagation
X Zhang, W Wang, K Norvag, M Sebag
2010 IEEE International Conference on Data Mining, 1187-1192, 2010
682010
Controlling attribute effect in linear regression
T Calders, A Karim, F Kamiran, W Ali, X Zhang
2013 IEEE 13th International Conference on Data Mining, 71-80, 2013
652013
A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams
AA Qahtan, B Alharbi, S Wang, X Zhang
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge …, 2015
562015
Efficient task assignment in spatial crowdsourcing with worker and task privacy protection
A Liu, W Wang, S Shang, Q Li, X Zhang
GeoInformatica 22 (2), 335-362, 2018
502018
Constructing attribute weights from computer audit data for effective intrusion detection
W Wang, X Zhang, S Gombault
Journal of Systems and Software 82 (12), 1974-1981, 2009
492009
The system can't perform the operation now. Try again later.
Articles 1–20