Ming Xu

Affiliations:
  • Hangzhou Dianzi University, School of Cyberspace, School of Computer Science and Technology, Internet and Network Security Laboratory, China
  • Zhejiang University, China (PhD 2004)


According to our database1, Ming Xu authored at least 96 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Adaptive Resilient Consensus for Multiagent Systems Under Cyberattacks.
IEEE Trans. Ind. Informatics, February, 2024

Robust Adversarial Watermark Defending Against GAN Synthesization Attack.
IEEE Signal Process. Lett., 2024

2023
Robust steganography in practical communication: a comparative study.
EURASIP J. Image Video Process., December, 2023

Image quality comparison of lower extremity CTA between CT routine reconstruction algorithms and deep learning reconstruction.
BMC Medical Imaging, December, 2023

A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks.
J. Inf. Secur. Appl., August, 2023

A DNN Architecture Generation Method for DDoS Detection via Genetic Alogrithm.
Future Internet, April, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

Unsupervised Learning-Based Framework for Deepfake Video Detection.
IEEE Trans. Multim., 2023

FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing.
IEEE Trans. Multim., 2023

2022
Deepfake Video Detection Based on MesoNet with Preprocessing Module.
Symmetry, 2022

Detecting Compressed Deepfake Images Using Two-Branch Convolutional Networks with Similarity and Classifier.
Symmetry, 2022

Sign steganography revisited with robust domain selection.
Signal Process., 2022

Towards DeepFake video forensics based on facial textural disparities in multi-color channels.
Inf. Sci., 2022

Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear Correlation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

A Compression Resistant Steganography Based on Differential Manchester Code.
Symmetry, 2021

Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling.
Signal Process., 2021

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.
Secur. Commun. Networks, 2021

Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks.
Mob. Inf. Syst., 2021

Distinguishing between natural and recolored images via lateral chromatic aberration.
J. Vis. Commun. Image Represent., 2021

Geographical position spoofing detection based on camera sensor fingerprint.
J. Vis. Commun. Image Represent., 2021

Deep Model Poisoning Attack on Federated Learning.
Future Internet, 2021

A novel file carving algorithm for docker container logs recorded by json-file logging driver.
Digit. Investig., 2021

Source Identification of Asymptomatic Spread on Networks.
IEEE Access, 2021

2020
Personalized top-n influential community search over large social networks.
World Wide Web, 2020

Image Forgery Detection and Localization via a Reliability Fusion Map.
Sensors, 2020

Identifying WeChat Message Types without Using Traditional Traffic.
Inf., 2020

Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks.
IEEE Access, 2020

PRPOIR: Exploiting the Region-Level Interest for POI Recommendation.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

An Adaptive Aggregation Method Based on Movie Genre for Group Recommendation.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks.
Proceedings of the 16th International Conference on Control, 2020

Fine-Grained Urban Flow Prediction via a Spatio-Temporal Super-Resolution Scheme.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
Sensors, 2019

Source camera identification via low dimensional PRNU features.
Multim. Tools Appl., 2019

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019

Robust Steganography by Modifying Sign of DCT Coefficients.
IEEE Access, 2019

Fuzzy Localization of Steganographic Flipped Bits via Modification Map.
IEEE Access, 2019

Resilient Consensus-Based Time Synchronization in Asynchronous Sensor Networks.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Passenger Searching from Taxi Traces Using HITS-Based Inference Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

2018
Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

An Improved User Identification Method Across Social Networks Via Tagging Behaviors.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Resilient Consensus for Multi-agent Networks with Mobile Detectors.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Personalized Top-n Influential Community Search over Large Social Networks.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2017
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

Towards Optimal Free-of-Charge Trip Planning in Bike-Sharing Systems.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

A Novel File Carving Algorithm for EVTX Logs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Attack tolerant finite-time consensus for multi-agent networks.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017

Trajectory Query Based on Trajectory Segments with Activities.
Proceedings of the 3rd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2017

Android App Classification and Permission Usage Risk Assessment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

An Efficient Black-Box Vulnerability Scanning Method for Web Application.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Adaptive Carving Method for Live FLV Streaming.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Privacy Settings Prediction Model for Textual Posts on Social Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
SQLite Forensic Analysis Based on WAL.
Proceedings of the Security and Privacy in Communication Networks, 2016

Topic Detection in Group Chat Based on Implicit Reply.
Proceedings of the PRICAI 2016: Trends in Artificial Intelligence, 2016

Finding Most Frequent Path based on Stratified Urban Roads.
Proceedings of the GISTAM 2016, 2016

A feature-based method for traffic anomaly detection.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016

Route planning for locations based on trajectory segments.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016

MCSS: A Model for Car-Sharing System.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

A Method of Recovering HBase Records from HDFS Based on Checksum File.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A MapReduce-Based Distributed SVM for Scalable Data Type Classification.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
An Improved Content-Based Music Recommending Method with Weighted Tags.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Probabilistic Group Nearest Neighbors query based on Voronoi diagram.
Proceedings of the 1st International ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2015

Towards selecting optimal features for flow statistical based network traffic classification.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

A Fragment Classification Method Depending on Data Type.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite.
J. Comput., 2014

A Forensic Analysis Method for Redis Database based on RDB and AOF File.
J. Comput., 2014

A File Fragment Classification Method Based on Grayscale Image.
J. Comput., 2014

A Location Inferring Model Based on Tweets and Bilateral Follow Friends.
J. Comput., 2014

Predicting next location using a variable order Markov model.
Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, 2014

2013
A similarity metric method of obfuscated malware using function-call graph.
J. Comput. Virol. Hacking Tech., 2013

A Malware Variant Detection Method Based on Byte Randomness Test.
J. Comput., 2013

A Multipopulation Firefly Algorithm for Correlated Data Routing in Underwater Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Real-Time Localization Algorithm for Maritime Search and Rescue Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

A metadata-based method for recovering files and file traces from YAFFS2.
Digit. Investig., 2013

A LBP-Based Method for Detecting Copy-Move Forgery with Rotation.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Webmail Reconstructing Method from Windows XP Memory Dumps.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Recovery Approach for SQLite History Recorders from YAFFS2.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

EHSTC: an enhanced method for semantic trajectory compression.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on GeoStreaming, 2013

2012
An ACOA-AFSA Fusion Routing Algorithm for Underwater Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2012

An Improved Method to Building a Score Lexicon for Chinese Sentiment Analysis.
Proceedings of the Eighth International Conference on Semantics, Knowledge and Grids, 2012

2011
Fault tolerant routing in three-dimensional underwater acoustic sensor networks.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

Detecting bursts in P2P based semi-autonomous underwater acoustic sensor networks.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

Design of a P2P based collaboration platform for underwater acoustic sensor network.
Proceedings of the 11th International Symposium on Communications and Information Technologies, 2011

An Enhanced Vector-Based Update Algorithm for Network-Constrained Moving Clients.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
An adaptive method to identify disk cluster size based on block content.
Digit. Investig., 2010

Detecting malware variants via function-call graph similarity.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Mobile-Aware Anonymous Peer Selecting Algorithm for Enhancing Privacy and Connectivity in Location-Based Service.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

2008
An Improved Method for Ranking of Search Results Based on User Interest.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Unknown Malicious Executables Detection Based on Run-Time Behavior.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...