Dongyang Zhan

Orcid: 0000-0003-1981-5878

According to our database1, Dongyang Zhan authored at least 17 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers.
IEEE Trans. Computers, March, 2024

2023
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning.
IEEE Trans. Computers, November, 2023

ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis.
IEEE Trans. Software Eng., February, 2023

Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation.
IEEE Trans. Serv. Comput., 2023

Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems.
IEEE Internet Things J., 2023

2022
Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model.
KSII Trans. Internet Inf. Syst., 2022

2021
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2019
SAVM: A practical secure external approach for automated in-VM management.
Concurr. Comput. Pract. Exp., 2019

Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018

Deciding Your Own Anonymity: User-Oriented Node Selection in I2P.
IEEE Access, 2018

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing.
IEEE Access, 2018

2017
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach.
IEICE Trans. Inf. Syst., 2017

2016
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Shrinking the Sentiment Analysis for Signed Network Construction.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016


  Loading...