Bing Zhang

Orcid: 0000-0002-9867-8439

Affiliations:
  • Yanshan University, College of Information Science and Engineering, Qinhuangdao, China (PhD 2018)


According to our database1, Bing Zhang authored at least 26 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective.
ACM Comput. Surv., August, 2024

SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections.
IEEE Trans. Software Eng., July, 2024

Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm.
Int. J. Softw. Eng. Knowl. Eng., July, 2024

An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network.
Expert Syst. Appl., 2024

2023
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.
Int. J. Softw. Eng. Knowl. Eng., September, 2023

A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network.
Inf. Softw. Technol., August, 2023

An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network.
Comput. Secur., March, 2023

Software defect prediction method based on the heterogeneous integration algorithm.
J. Intell. Fuzzy Syst., 2023

Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks.
Comput. Commun., 2023

An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
Biomed. Signal Process. Control., 2023

2022
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning.
Int. J. Softw. Eng. Knowl. Eng., 2022

Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine.
Int. J. Softw. Eng. Knowl. Eng., 2022

Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
ACM Comput. Surv., 2022

An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm.
Comput. Secur., 2022

Identifying Influential Spreaders in Complex Networks Based on Degree Centrality.
Proceedings of the Web Information Systems and Applications, 2022

2021
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel.
J. Netw. Comput. Appl., 2021

Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2020

2019
Predicting blood pressure from physiological index data using the SVR algorithm.
BMC Bioinform., 2019

Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm.
IEEE Access, 2019

Modeling Air Pollution Transmission Behavior as Complex Network and Mining Key Monitoring Station.
IEEE Access, 2019

2018
Network Intrusion Detection Method Based on PCA and Bayes Algorithm.
Secur. Commun. Networks, 2018

An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees.
IEEE Access, 2018

Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes.
IEEE Access, 2018

CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network.
IEEE Access, 2018

2017
Approach to mine influential functions based on software execution sequence.
IET Softw., 2017


  Loading...