Jingling Zhao

According to our database1, Jingling Zhao authored at least 30 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Vulnerability Detection Method for SDN with Optimized Fuzzing.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Software Control Flow Anomaly Detection Technology Based On Neural Network.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

A Static Method to Discover Deserialization Gadget Chains in Java Programs.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

2021
PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021

2020
A Blockchain Consensus for Message Queue Based on Byzantine Fault Tolerance.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2020

A Universal Defense System Based on Backtrace Canary for ELF Against Vulnerabilities.
Proceedings of the Advanced Information Networking and Applications, 2020

Periodic Mining of Traffic Information in Industrial Control Networks.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Fuzzing method based on field filter and packet repair for GTPv2 protocol.
Internet Things, 2019

Improved SM4 Encryption Algorithm Based on Mixed Congruence Method.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

Prediction of Mobile App Session Time.
Proceedings of the 2019 3rd International Conference on Management Engineering, 2019

2018
Classifying Malicious URLs Using Gated Recurrent Neural Networks.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Fuzzing Test Method Based on Constraint-Conditions Priority for LTE-EPC Protocol.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Malware algorithm classification method based on big data analysis.
Int. J. Web Grid Serv., 2017

Software Abnormal Behavior Detection Based on Hidden Markov Model.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

An energy aware and load balancing routing protocol for mobile ad hoc networks.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

Personalized LBSN Recommendation System.
Proceedings of the 2017 International Conference on Management Engineering, 2017

A High-Speed Network Data Acquisition System Based on Big Data Platform.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
COFFEE-CUP: A cost-efficient routing strategy for delay tolerant networks using time-varying community partitioning.
Proceedings of the International Symposium on Wireless Communication Systems, 2016

Dynamic Taint Tracking of Web Application Based on Static Code Analysis.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

C++ Memory Check tool based on Dynamic Binary Instrumentation Platform.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Improved Recommendation System Using Friend Relationship in SNS.
Trans. Comput. Collect. Intell., 2015

A QoE-Driven Cross-Layer Resource Allocation Scheme for High Traffic Services over Open Wireless Network Downlink.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

A New Framework of Security Vulnerabilities Detection in PHP Web Application.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

An AST-based Code Plagiarism Detection Algorithm.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Sentence Similarity Based on Semantic Vector Model.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

A Security Enhanced IEEE1588 Protocol for Deep-Space Environment.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Implementation of K-Means based on improved storm model.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

RFSM-Fuzzing a Smart Fuzzing Algorithm Based on Regression FSM.
Proceedings of the Eighth International Conference on P2P, 2013

2012
A cross-platform context-aware application developing framework for mobile terminals.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...