Jun Zhang

According to our database1, Jun Zhang authored at least 83 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Data-Driven Cybersecurity Incident Prediction: A Survey.
IEEE Communications Surveys and Tutorials, 2019

Predicting the Impact of Android Malicious Samples via Machine Learning.
IEEE Access, 2019

Data-Driven Android Malware Intelligence: A Survey.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Industrial Informatics, 2018

Exploring Feature Coupling and Model Coupling for Image Source Identification.
IEEE Trans. Information Forensics and Security, 2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Information Processing, 2018

Big network traffic data visualization.
Multimedia Tools Appl., 2018

Comprehensive analysis of network traffic data.
Concurrency and Computation: Practice and Experience, 2018

Detecting and Preventing Cyber Insider Threats: A Survey.
IEEE Communications Surveys and Tutorials, 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Computers & Security, 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
SCIENCE CHINA Information Sciences, 2018

Deep-learnt features for Twitter spam detection.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

Anomaly-Based Insider Threat Detection Using Deep Autoencoders.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Information Forensics and Security, 2017

Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning.
IEEE Trans. Fuzzy Systems, 2017

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016.
J. Sensors, 2017

Investigating the deceptive information in Twitter spam.
Future Generation Comp. Syst., 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurrency and Computation: Practice and Experience, 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Computers & Security, 2017

Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Noisy Smoothing Image Source Identification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Twitter spam detection based on deep learning.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Comments and Corrections.
IEEE Trans. Comput. Social Systems, 2016

Spammers Are Becoming "Smarter" on Twitter.
IT Professional, 2016

Security and reliability in big data.
Concurrency and Computation: Practice and Experience, 2016

Flow-based traffic retrieval using statistical features.
Proceedings of the International Workshop on Big Data and Information Security, 2016

Statistical Detection of Online Drifting Twitter Spam: Invited Paper.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Fuzzy-Based Feature and Instance Recovery.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Robust Network Traffic Classification.
IEEE/ACM Trans. Netw., 2015

Camera Model Identification With Unknown Models.
IEEE Trans. Information Forensics and Security, 2015

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection.
IEEE Trans. Comput. Social Systems, 2015

Recent Advances in Security and Privacy for Wireless Sensor Networks.
J. Sensors, 2015

Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Asymmetric self-learning for tackling Twitter Spam Drift.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Robust Traffic Classification with Mislabelled Training Samples.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

6 million spam tweets: A large ground truth for timely Twitter spam detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distrib. Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Sec. Comput., 2014

The maximum imputation framework for neighborhood-based collaborative filtering.
Social Netw. Analys. Mining, 2014

Medical image retrieval based on unclean image bags.
Multimedia Tools Appl., 2014

A noisy-smoothing relevance feedback method for content-based medical image retrieval.
Multimedia Tools Appl., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distrib. Syst., 2013

An Effective Network Traffic Classification Method with Unknown Flow Detection.
IEEE Trans. Network and Service Management, 2013

Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions.
IEEE Trans. Information Forensics and Security, 2013

Lazy Collaborative Filtering for Data Sets With Missing Values.
IEEE Trans. Cybernetics, 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

Robust image retrieval with hidden classes.
Computer Vision and Image Understanding, 2013

Clonewise - Detecting Package-Level Clones Using Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2013

Network traffic clustering using Random Forest proximities.
Proceedings of IEEE International Conference on Communications, 2013

Zero-Day Traffic Identification.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Traffic Identification in Semi-known Network Environment.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Robust network traffic identification with unknown applications.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
A New Re-Ranking Method Using Enhanced Pseudo-Relevance Feedback for Content-Based Medical Image Retrieval.
IEICE Transactions, 2012

QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval.
IEICE Transactions, 2012

Classification of Correlated Internet Traffic Flows.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Semi-supervised and Compound Classification of Network Traffic.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

The efficient imputation method for neighborhood-based collaborative filtering.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Secure Image Retrieval Based on Visual Content and Watermarking Protocol.
Comput. J., 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010

Real-time gait classification based on fuzzy associative memory.
IJMIC, 2010

Series feature aggregation for content-based image retrieval.
Computers & Electrical Engineering, 2010

Medical Image Retrieval with Query-Dependent Feature Fusion Based on One-Class SVM.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

2009
Content Based Image Retrieval Using Unclean Positive Examples.
IEEE Trans. Image Processing, 2009

Local aggregation function learning based on support vector machines.
Signal Processing, 2009

Watermarking protocol for protecting user's right in content based image retrieval.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Image retrieval using noisy query.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Image retrieval based on bag of images.
Proceedings of the International Conference on Image Processing, 2009

2007
Watermarking protocol of secure verification.
J. Electronic Imaging, 2007

Design of Secure Watermarking Scheme for Watermarking Protocol.
Proceedings of the Advances in Multimedia Information Processing, 2007

An Unified Framework Based on p-Norm for Feature Aggregation in Content-Based Image Retrieval.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007


  Loading...