Chi Zhang

Orcid: 0000-0002-3162-6271

Affiliations:
  • Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China


According to our database1, Chi Zhang authored at least 15 papers between 2020 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A novel combinatorial testing approach with fuzzing strategy.
J. Softw. Evol. Process., December, 2023

A memory-related vulnerability detection approach based on vulnerability model with Petri Net.
J. Log. Algebraic Methods Program., April, 2023

Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
Comput. J., January, 2023

2022
Malware recognition approach based on self-similarity and an improved clustering algorithm.
IET Softw., 2022

A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter.
Secur. Commun. Networks, 2021

An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints.
Inf. Sci., 2021

An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints.
Inf. Sci., 2021

A new semantic annotation approach for software vulnerability source code.
Int. J. Simul. Process. Model., 2021

Dirmap: Web Application Vulnerability Detection Platform Based on Script Code.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Fuzzing Methods Recommendation Based on Feature Vectors.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Proceedings of the 19th IEEE International Conference on Trust, 2020


  Loading...