Boyun Zhang

According to our database1, Boyun Zhang authored at least 20 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Granularity and Usability in Authorization Policies.
Proceedings of the Emerging Information Security and Applications, 2021

2017
Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2014
Research on virus detection technique based on ensemble neural network and SVM.
Neurocomputing, 2014

2012
Research on Virus Detection Technology Based on Ensemble Neural Network and SVM.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2012

2011
Network Security Situation Assessment Based on Hidden Semi-Markov Model.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

Network Security Situation Assessment Based on HMM.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011

Network Security Situation Assessment Based on Stochastic Game Model.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

2009
DDoS Attack Detection Method Based on Linear Prediction Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.
Proceedings of the Security Technology, 2009

2007
Intelligent Detection Computer Viruses Based on Multiple Classifiers.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Minimization of the Redundant Coverage for Dense Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

Malicious Codes Detection Based on Ensemble Learning.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Using RS and SVM to Detect New Malicious Executable Codes.
Proceedings of the Rough Sets and Knowledge Technology, First International Conference, 2006

Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine.
Proceedings of the International Joint Conference on Neural Networks, 2006

Evolvable Viral Agent Modeling and Exploration.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

SVM-Based Tumor Classification with Gene Expression Data.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

A Computational Model of Computer Worms Based on Persistent Turing Machines.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005


  Loading...