Dandan Zhao

Orcid: 0000-0001-9375-2997

Affiliations:
  • Zhejiang Normal University, Jinhua, China


According to our database1, Dandan Zhao authored at least 26 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Modeling and analysis of cascading failures in multilayer higher-order networks.
Reliab. Eng. Syst. Saf., 2025

Robustness of multilayer interdependent higher-order network.
J. Netw. Comput. Appl., 2025

2024
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting.
IEEE Trans. Dependable Secur. Comput., 2024

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024

Cascading failures on interdependent hypergraph.
Commun. Nonlinear Sci. Numer. Simul., 2024

2023
Efficient text-based evolution algorithm to hard-label adversarial attacks on text.
J. King Saud Univ. Comput. Inf. Sci., May, 2023

Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023

2022
Disintegrate hypergraph networks by attacking hyperedge.
J. King Saud Univ. Comput. Inf. Sci., 2022

Risk Assessment of CPS Composed of Edge Consumer Electronics Under Intentional Attack.
IEEE Consumer Electron. Mag., 2022

Percolation on simplicial complexes.
Appl. Math. Comput., 2022

2021
A Security Scheme Based on Intranal-Adding Links for Integrated Industrial Cyber-Physical Systems.
Sensors, 2021

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems.
Mob. Networks Appl., 2021

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks.
Sensors, 2020

Impact of the heterogeneity of adoption thresholds on behavior spreading in complex networks.
Appl. Math. Comput., 2020

Security Analysis of CPS Systems Under Different Swapping Strategies in IoT Environments.
IEEE Access, 2020

Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack Strategy.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2016
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
Int. J. High Perform. Comput. Netw., 2016

2011
An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

2010
An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010


  Loading...