Follow
Chen DONG(董晨)
Chen DONG(董晨)
Verified email at fzu.edu.cn
Title
Cited by
Cited by
Year
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection
H Zhang, JL Li, XM Liu, C Dong
Future Generation Computer Systems 122, 130-143, 2021
1272021
A multi-layer hardware trojan protection framework for IoT chips
C Dong, G He, X Liu, Y Yang, W Guo
IEEE Access 7, 23628-23639, 2019
642019
A method of self-adaptive inertia weight for PSO
C Dong, G Wang, Z Chen, Z Yu
2008 international conference on computer science and software engineering 1 …, 2008
572008
The inertia weight self-adapting in PSO
C Dong, G Wang, Z Chen
2008 7th World Congress on Intelligent Control and Automation, 5313-5316, 2008
502008
Hardware trojans in chips: A survey for detection and prevention
C Dong, Y Xu, X Liu, F Zhang, G He, Y Chen
Sensors 20 (18), 5165, 2020
442020
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things
C Dong, J Chen, W Guo, J Zou
International Journal of Distributed Sensor Networks 15 (12), 1550147719888098, 2019
412019
An unsupervised detection approach for hardware trojans
C Dong, Y Liu, J Chen, X Liu, W Guo, Y Chen
IEEE Access 8, 158169-158183, 2020
272020
QSSA: Quantum evolutionary salp swarm algorithm for mechanical design
R Chen, C Dong, Y Ye, Z Chen, Y Liu
Ieee Access 7, 145582-145595, 2019
242019
A survey of DMFBs security: State-of-the-art attack and defense
C Dong, L Liu, H Liu, W Guo, X Huang, S Lian, X Liu, TY Ho
2020 21st International Symposium on Quality Electronic Design (ISQED), 14-20, 2020
222020
A locating method for multi-purposes HTs based on the boundary network
C Dong, F Zhang, X Liu, X Huang, W Guo, Y Yang
IEEE Access 7, 110936-110950, 2019
222019
BotDetector: An extreme learning machine‐based Internet of Things botnet detection model
X Dong, C Dong, Z Chen, Y Cheng, B Chen
Transactions on Emerging Telecommunications Technologies 32 (5), e3999, 2021
172021
Dual-search artificial bee colony algorithm for engineering optimization
C Dong, Z Xiong, X Liu, Y Ye, Y Yang, W Guo
IEEE Access 7, 24571-24584, 2019
172019
The sensitivity design of piezoresistive acceleration sensor in industrial IoT
C Dong, Y Ye, X Liu, Y Yang, W Guo
IEEE Access 7, 16952-16963, 2019
162019
A VLSI routing algorithm based on improved DPSO
C Dong, G Wang, Z Chen, S Sun, D Wang
2009 IEEE International Conference on Intelligent Computing and Intelligent …, 2009
162009
A method for indoor Wi-Fi location based on improved back propagation neuralNetwork
J Chen, C Dong, G He, X Zhang
Turkish Journal of Electrical Engineering and Computer Sciences 27 (4), 2511 …, 2019
152019
A survey on security of digital microfluidic biochips: Technology, attack, and defense
W Guo, S Lian, C Dong, Z Chen, X Huang
ACM Transactions on Design Automation of Electronic Systems (TODAES) 27 (4 …, 2022
142022
Detection of algorithmically generated domain names using the recurrent convolutional neural network with spatial pyramid pooling
Z Liu, Y Zhang, Y Chen, X Fan, C Dong
Entropy 22 (9), 1058, 2020
132020
A Hardware-Trojans detection approach based on eXtreme Gradient Boosting
J Chen, C Dong, F Zhang, G He
2019 IEEE 2nd International Conference on Computer and Communication …, 2019
132019
6g mobile communications for multi-robot smart factory
Z Chen, KC Chen, C Dong, Z Nie
Journal of ICT Standardization 9 (3), 371-404, 2021
92021
Distributed attack modeling approach based on process mining and graph segmentation
Y Chen, Z Liu, Y Liu, C Dong
Entropy 22 (9), 1026, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20