Dongdong Zhao

Orcid: 0000-0002-4697-6901

Affiliations:
  • Wuhan University of Technology, School of Computer Science and Technology, China
  • University of Science and Technology of China, Hefei, China (PhD 2016)


According to our database1, Dongdong Zhao authored at least 64 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An effective iris biometric privacy protection scheme with renewability.
J. Inf. Secur. Appl., February, 2024

2023
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition.
IEEE Trans. Emerg. Top. Comput., 2023

Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden.
J. Artif. Intell. Res., 2023

Cancelable Iris Biometrics Based on Transformation Network.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Competitor Attack Model for Privacy-Preserving Deep Learning.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Optimal redundancies of parallel-series systems in irrelevancy coverage model.
Reliab. Eng. Syst. Saf., 2022

GAN-Based Privacy-Preserving Unsupervised Domain Adaptation.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised Oversampling.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

The Impact of Software Aging and Rejuvenation on the User Experience for Android System.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

NegDL: Privacy-preserving Deep Learning Based on Negative Database.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Negative Survey with Aggregate Scores from Multiple Questions.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Quantitative Analysis of the Dynamic Relevance of Systems.
IEEE Trans. Reliab., 2021

<i>k</i>-means clustering and kNN classification based on negative databases.
Appl. Soft Comput., 2021

Reliability-redundancy allocation problem considering imperfect fault coverage.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Within-Project Software Aging Defect Prediction Based on Active Learning.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
Software aging and rejuvenation in android: new models and metrics.
Softw. Qual. J., 2020

Task Allocation for Multi-Agent Systems Based on Distributed Many-Objective Evolutionary Algorithm and Greedy Algorithm.
IEEE Access, 2020

NDBIris with Better Unlinkability.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Cross-Project Aging-Related Bug Prediction Based on Joint Distribution Adaptation and Improved Subclass Discriminant Analysis.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features.
Proceedings of the ICMLT 2020: 5th International Conference on Machine Learning Technologies, 2020

VSFBS: Vulnerability Search in Firmware Based on String.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

Aging-Related Bugs Prediction Via Convolutional Neural Network.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

2019
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph.
Softw. Qual. J., 2019

A Study of the Effects of Stemming Strategies on Arabic Document Classification.
IEEE Access, 2019

A Fine-grained Privacy-preserving k-means Clustering Algorithm Upon Negative Databases.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Vulnerability Detection in Firmware Based on Clonal Selection Algorithm.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Reliability Analysis of Phased-Mission System in Irrelevancy Coverage Model.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Task Allocation in Multi-agent Systems Using Many-objective Evolutionary Algorithm NSGA-III.
Proceedings of the Machine Learning and Intelligent Communications, 2019

VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

2018
A Novel Negative Location Collection Method for Finding Aggregated Locations.
IEEE Trans. Intell. Transp. Syst., 2018

Three Branches of Negative Representation of Information: A Survey.
IEEE Trans. Emerg. Top. Comput. Intell., 2018

Negative Iris Recognition.
IEEE Trans. Dependable Secur. Comput., 2018

Iris Template Protection Based on Local Ranking.
Secur. Commun. Networks, 2018

Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Crane: A Tool for Reliability Analysis with Different Coverage Models.
Proceedings of the 8th Latin-American Symposium on Dependable Computing, 2018

Iris Template Protection Based on Randomized Response Technique and Aggregated Block Information.
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018

A New Software Rejuvenation Model for Android.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Privacy-Preserving K-Means Clustering Upon Negative Databases.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Using machine learning for software aging detection in Android system.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

An Algebraic Binary Decision Diagram for Analysis of Dynamic Fault Tree.
Proceedings of the 5th International Conference on Dependable Systems and Their Applications, 2018

Handling Unreasonable Data in Negative Surveys.
Proceedings of the Database Systems for Advanced Applications, 2018

2017
On Location and Trace Privacy of the Moving Object Using the Negative Survey.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

Rating Credits of Online Merchants Using Negative Ranks.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

Experimental analyses of the K-hidden algorithm.
Eng. Appl. Artif. Intell., 2017

One-time password authentication scheme based on the negative database.
Eng. Appl. Artif. Intell., 2017

An Ontology-based Knowledge Management System for Software Testing.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

A Comparative Study of Knowledge Management on Undergraduate by Questionnaire.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An Ontology-Based Knowledge Sharing Portal for Software Testing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

A Rejuvenation Strategy in Android.
Proceedings of the 2017 IEEE International Symposium on Software Reliability Engineering Workshops, 2017

An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017

CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph.
Proceedings of the International Conference on Dependable Systems and Their Applications, 2017

Negative Survey with Manual Selection: A Case Study in Chinese Universities.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

2016
Analysis of Software Aging in Android.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

Reconstructing Positive Surveys from Negative Surveys with Background Knowledge.
Proceedings of the Data Mining and Big Data, First International Conference, 2016

2013
Real-Valued Negative Databases.
Proceedings of the Twelfth European Conference on the Synthesis and Simulation of Living Systems: Advances in Artificial Life, 2013

A Study of the Private Set Intersection Protocol Based on Negative Databases.
Proceedings of the IEEE 11th International Conference on Dependable, 2013


  Loading...