Lidong Zhai

According to our database1, Lidong Zhai authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack.
Proceedings of the 32nd USENIX Security Symposium, 2023

Event-Based Threat Intelligence Ontology Model.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

2022
Shock Trap: An active defense architecture based on trap vulnerabilities.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A method of network traffic anomaly detection based on Packet Window Transformer.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2019
Analysis of WeChat Subscription Influence Based on Topic Diffusion.
Int. J. Digit. Crime Forensics, 2019

2018
<i>Research Notes</i>: User Influence in Microblog Based on Interest Graph.
Int. J. Softw. Eng. Knowl. Eng., 2018

Botnet homology method based on symbolic approximation algorithm of communication characteristic curve.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2016
Design of Mobile Botnet Based on Open Service.
Int. J. Digit. Crime Forensics, 2016

2015
Worms Propagation Modeling and Analysis in Big Data Environment.
Int. J. Distributed Sens. Networks, 2015

Network Intrusion Detection Based on Neural Networks and D-S Evidence.
Proceedings of the Image and Video Technology - PSIVT 2015 Workshops, 2015

2014
Digraph Spectral Clustering with Applications in Distributed Sensor Validation.
Int. J. Distributed Sens. Networks, 2014

Detection of Android Malicious Apps Based on the Sensitive Behaviors.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

RayDroid: A Framework for Discovering Anomaly in Android.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

A Game Model for Predicting the Attack Path of APT.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

2013
Research of Intrusion Detection System on Android.
Proceedings of the IEEE Ninth World Congress on Services, 2013

2012
Research on Redundant Channel Model Based on Spatial Correlation in IOT.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Analysis of Public Sentiment Based on SMS Content.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Control Method of Twitter- and SMS-Based Mobile Botnet.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Worm Propagation Model for Heterogeneous Network.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network.
Proceedings of the Web Technologies and Applications, 2012

2011
Research on Real-time Publish/Subscribe System supported by Data-Integration.
J. Softw., 2011

A Word Position-Related LDA Model.
Int. J. Pattern Recognit. Artif. Intell., 2011


  Loading...