Chao Zheng

Affiliations:
  • Geedge Networks, Beijing, China
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (PhD)


According to our database1, Chao Zheng authored at least 22 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Scrutinizing Code Signing: A Study of in-Depth Threat Modeling and Defense Mechanism.
IEEE Internet Things J., December, 2024

A Semantics-Based Approach on Binary Function Similarity Detection.
IEEE Internet Things J., 2024

2023
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Proceedings of the IEEE International Conference on Trust, 2022

Accelerate State Sharing of Network Function with RDMA.
Proceedings of the IEEE Global Communications Conference, 2022

2021
CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification.
Proceedings of the Security and Privacy in Communication Networks, 2020

Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively.
Proceedings of the 27th International Conference on Telecommunications, 2020

DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic.
Proceedings of the Computational Science - ICCS 2019, 2019

Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A flexible and efficient container-based NFV platform for middlebox networking.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Hashing Incomplete and Unordered Network Streams.
Proceedings of the Advances in Digital Forensics XIV, 2018

Janus: A User-Level TCP Stack for Processing 40 Million Concurrent TCP Connections.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2016
CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
GuidedTracker: Track the victims with access logs to finding malicious web pages.
Proceedings of the IEEE Global Communications Conference, 2014

2013
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013


  Loading...