K-Means Clustering with Local Distance Privacy
Yang, Mengmeng, Huang, Longxia, Tang, Chenghua
Published in Big Data Mining and Analytics (01.12.2023)
Published in Big Data Mining and Analytics (01.12.2023)
Get full text
Journal Article
Semantic Description and Verification of Security Policy Based on Ontology
Tang, Chenghua, Wang, Lina, Tang, Shensheng, Qiang, Baohua, Tian, Jilong
Published in Wuhan University journal of natural sciences (01.10.2014)
Published in Wuhan University journal of natural sciences (01.10.2014)
Get full text
Journal Article
Assessing the Risk Situation of Network Security for Active Defense
Xiang, Zhang, Shuping, Yao, Chenghua, Tang
Published in Wuhan University journal of natural sciences (01.11.2006)
Published in Wuhan University journal of natural sciences (01.11.2006)
Get full text
Journal Article
Android static taint analysis based on multi branch search association
Tang, Chenghua, Du, Zheng, Yang, Mengmeng, Qiang, Baohua
Published in Computers & security (01.06.2023)
Published in Computers & security (01.06.2023)
Get full text
Journal Article
A Network Security Policy Model and Its Realization Mechanism
Tang, Chenghua, Yao, Shuping, Cui, Zhongjie, Mao, Limin
Published in Information Security and Cryptology (2006)
Published in Information Security and Cryptology (2006)
Get full text
Book Chapter
Conference Proceeding
SPoFC: A framework for stream data aggregation with local differential privacy
Yang, Mengmeng, Lam, Kwok‐Yan, Zhu, Tianqing, Tang, Chenghua
Published in Concurrency and computation (28.02.2023)
Published in Concurrency and computation (28.02.2023)
Get full text
Journal Article
Analysis of spectrum utilization for ISM band cognitive Radio Sensor Networks
Shensheng Tang, Chenghua Tang, Rong Yu, Xiaojiang Chen, Yi Xie
Published in 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) (01.06.2016)
Published in 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN) (01.06.2016)
Get full text
Conference Proceeding
Analysis of an Unreliable Opportunistic Spectrum Sharing System under Multiple Call Collision Results
Shensheng Tang, Rong Yu, Xiaojiang Chen, Chenghua Tang, Yi Xie
Published in 2015 8th International Conference on u- and e-Service, Science and Technology (UNESST) (01.11.2015)
Published in 2015 8th International Conference on u- and e-Service, Science and Technology (UNESST) (01.11.2015)
Get full text
Conference Proceeding
Detection and classification of anomaly intrusion using hierarchy clustering and SVM
Tang, Chenghua, Xiang, Yang, Wang, Yu, Qian, Junyan, Qiang, Baohua
Published in Security and communication networks (10.11.2016)
Published in Security and communication networks (10.11.2016)
Get full text
Journal Article
An Improved Object-Oriented Rete Algorithm and Network Structure Model
Chenghua Tang, Yi Xie
Published in 2010 2nd International Symposium on Information Engineering and Electronic Commerce (01.07.2010)
Published in 2010 2nd International Symposium on Information Engineering and Electronic Commerce (01.07.2010)
Get full text
Conference Proceeding
Description and Reasoning of Security Policy in Information System Based on Security Domain
Chenghua Tang, Yi Xie
Published in 2010 2nd International Symposium on Information Engineering and Electronic Commerce (01.07.2010)
Published in 2010 2nd International Symposium on Information Engineering and Electronic Commerce (01.07.2010)
Get full text
Conference Proceeding
A Verification Algorithm of Network Security Policy Repository
Chenghua Tang, Shunzheng Yu
Published in 2009 International Conference on Information Technology and Computer Science (01.07.2009)
Published in 2009 International Conference on Information Technology and Computer Science (01.07.2009)
Get full text
Conference Proceeding
A Dynamic and Self-Adaptive Network Security Policy Realization Mechanism
Chenghua Tang, Shunzheng Yu
Published in 2008 IFIP International Conference on Network and Parallel Computing (01.10.2008)
Published in 2008 IFIP International Conference on Network and Parallel Computing (01.10.2008)
Get full text
Conference Proceeding
Assessment of network security policy based on security capability
Chenghua Tang, Shunzheng Yu
Published in 2008 11th IEEE Singapore International Conference on Communication Systems (01.11.2008)
Published in 2008 11th IEEE Singapore International Conference on Communication Systems (01.11.2008)
Get full text
Conference Proceeding
Research on Key Technologies of Network Security Management Policy
Chenghua Tang, Shunzheng Yu
Published in 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (01.10.2008)
Published in 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (01.10.2008)
Get full text
Conference Proceeding