Min Zhang

Orcid: 0000-0002-6654-7610

Affiliations:
  • National University of Defense Technology, College of Electronic Engineering, Hefei, China
  • Anhui University, China (PhD)


According to our database1, Min Zhang authored at least 25 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A survey of binary code representation technology.
Frontiers Inf. Technol. Electron. Eng., May, 2025

Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice.
IEEE Trans. Dependable Secur. Comput., 2025

Insvdf: Interface-State-Aware Virtual Device Fuzzing.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2024
An Intelligent Penetration Testing Method Using Human Feedback.
IEEE Trans. Ind. Informatics, 2024

GuessFuse: Hybrid Password Guessing With Multi-View.
IEEE Trans. Inf. Forensics Secur., 2024

DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Proceedings of the 33rd USENIX Security Symposium, 2024

Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking the Security Threats of Stale DNS Glue Records.
Proceedings of the 33rd USENIX Security Symposium, 2024

Enhancing Black-box Compiler Option Fuzzing with LLM through Command Feedback.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
BD-CVSA: A Broadband Direction Finding Method Based on Constructing Virtual Sparse Arrays.
Signal Process., November, 2023

INNES: An intelligent network penetration testing model based on deep reinforcement learning.
Appl. Intell., November, 2023

A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testing.
Comput. Secur., September, 2023

Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration.
Comput. Secur., 2023

AlphaEXP: An Expert System for Identifying Security-Sensitive Kernel Objects.
Proceedings of the 32nd USENIX Security Symposium, 2023

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2021
Mining Centralization of Internet Service Infrastructure in the Wild.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

A Nameserver Importance Ranking Method Based on Heterogeneous Information Network.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Modified Password Guessing Methods Based on TarGuess-I.
Wirel. Commun. Mob. Comput., 2020

Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.
Secur. Commun. Networks, 2020

A Vulnerability Risk Assessment Method Based on Heterogeneous Information Network.
IEEE Access, 2020

A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020

File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification.
IEEE Access, 2020

Classification of Malware Variant Based on Ensemble Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2010
Botnet Traffic Discriminatory Analysis Using Particle Swarm Optimization.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010


  Loading...