Zesheng Chen, Ph.D. - Publications

Affiliations: 
2007 Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

12 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Chen Z. Characterising spatial dependence on epidemic thresholds in networks International Journal of Security and Networks. 15: 1-14. DOI: 10.1504/Ijsn.2020.10028187  0.415
2019 Chen C, Chen Z. Self-stopping strategies for tractable information dissemination in dense mobile sensor networks International Journal of Sensor Networks. 29: 88-100. DOI: 10.1504/Ijsnet.2019.10019055  0.381
2019 Chen Z. Discrete-Time vs. Continuous-Time Epidemic Models in Networks Ieee Access. 7: 127669-127677. DOI: 10.1109/Access.2019.2940132  0.403
2016 Chen Z, Chen C. Characterising heterogeneity in vulnerable hosts on worm propagation International Journal of Security and Networks. 11: 224-234. DOI: 10.1504/Ijsn.2016.079276  0.419
2012 Wang Q, Chen Z, Chen C. On the Characteristics of the Worm Infection Family Tree Ieee Transactions On Information Forensics and Security. 7: 1614-1627. DOI: 10.1109/Tifs.2012.2204981  0.348
2011 Wang Q, Chen Z, Chen C. Darknet-Based Inference of Internet Worm Temporal Characteristics Ieee Transactions On Information Forensics and Security. 6: 1382-1393. DOI: 10.1109/Tifs.2011.2161288  0.414
2010 Chen C, Chen Z, Li Y. Characterizing and defending against divide-conquer-scanning worms Computer Networks. 54: 3210-3222. DOI: 10.1016/J.Comnet.2010.06.010  0.443
2009 Chen Z, Chen C, Li Y. Deriving a closed-form expression for worm-scanning strategies International Journal of Security and Networks. 4: 135-144. DOI: 10.1504/Ijsn.2009.027339  0.362
2009 Chen C, Chen Z. Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding Ieee Transactions On Mobile Computing. 8: 1397-1411. DOI: 10.1109/Tmc.2009.55  0.375
2009 Chen Z, Ji C. An Information-Theoretic View of Network-Aware Malware Attacks Ieee Transactions On Information Forensics and Security. 4: 530-541. DOI: 10.1109/Tifs.2009.2025847  0.611
2007 Chen Z, Ji C. Optimal worm-scanning method using vulnerable-host distributions International Journal of Security and Networks. 2: 71-80. DOI: 10.1504/Ijsn.2007.012826  0.591
2005 Chen Z, Ji C. Spatial-temporal modeling of malware propagation in networks. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 16: 1291-303. PMID 16252834 DOI: 10.1109/Tnn.2005.853425  0.584
Show low-probability matches.