Ning Zheng

Orcid: 0000-0003-3503-8167

Affiliations:
  • Hangzhou Dianzi University, School of Cyberspace, China


According to our database1, Ning Zheng authored at least 87 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Adaptive Resilient Consensus for Multiagent Systems Under Cyberattacks.
IEEE Trans. Ind. Informatics, February, 2024

Robust Adversarial Watermark Defending Against GAN Synthesization Attack.
IEEE Signal Process. Lett., 2024

A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks.
J. Inf. Secur. Appl., 2024

Determining r- and (r, s)-robustness of multiagent networks based on heuristic algorithm.
Neurocomputing, 2024

2023
Robust steganography in practical communication: a comparative study.
EURASIP J. Image Video Process., December, 2023

A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks.
J. Inf. Secur. Appl., August, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

Unsupervised Learning-Based Framework for Deepfake Video Detection.
IEEE Trans. Multim., 2023

FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing.
IEEE Trans. Multim., 2023

A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.
IEEE Trans. Cloud Comput., 2023

2022
Sign steganography revisited with robust domain selection.
Signal Process., 2022

Towards DeepFake video forensics based on facial textural disparities in multi-color channels.
Inf. Sci., 2022

2021
A Compression Resistant Steganography Based on Differential Manchester Code.
Symmetry, 2021

Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling.
Signal Process., 2021

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.
Secur. Commun. Networks, 2021

Distinguishing between natural and recolored images via lateral chromatic aberration.
J. Vis. Commun. Image Represent., 2021

Geographical position spoofing detection based on camera sensor fingerprint.
J. Vis. Commun. Image Represent., 2021

Deep Model Poisoning Attack on Federated Learning.
Future Internet, 2021

A novel file carving algorithm for docker container logs recorded by json-file logging driver.
Digit. Investig., 2021

2020
Personalized top-n influential community search over large social networks.
World Wide Web, 2020

Image Forgery Detection and Localization via a Reliability Fusion Map.
Sensors, 2020

SBAC: A secure blockchain-based access control framework for information-centric networking.
J. Netw. Comput. Appl., 2020

Identifying WeChat Message Types without Using Traditional Traffic.
Inf., 2020

Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks.
IEEE Access, 2020

Location Spoofing Detection for Social Network Service using Camera Fingerprint.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020

PRPOIR: Exploiting the Region-Level Interest for POI Recommendation.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks.
Proceedings of the 16th International Conference on Control, 2020

2019
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication.
IEEE Trans. Multim., 2019

Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App.
Sensors, 2019

Source camera identification via low dimensional PRNU features.
Multim. Tools Appl., 2019

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019

Robust Steganography by Modifying Sign of DCT Coefficients.
IEEE Access, 2019

Remotely Access "My" Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme.
IEEE Access, 2019

Fuzzy Localization of Steganographic Flipped Bits via Modification Map.
IEEE Access, 2019

Resilient Consensus-Based Time Synchronization in Asynchronous Sensor Networks.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Passenger Searching from Taxi Traces Using HITS-Based Inference Model.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

2018
Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

An Improved User Identification Method Across Social Networks Via Tagging Behaviors.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Improved Affinity Propagation Clustering for Business Districts Mining.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Reverse Collective Spatial Keyword Querying (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Personalized Top-n Influential Community Search over Large Social Networks.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2017
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

Towards Optimal Free-of-Charge Trip Planning in Bike-Sharing Systems.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

A Novel File Carving Algorithm for EVTX Logs.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Attack tolerant finite-time consensus for multi-agent networks.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017

Android App Classification and Permission Usage Risk Assessment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

An Efficient Black-Box Vulnerability Scanning Method for Web Application.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Adaptive Carving Method for Live FLV Streaming.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

A Privacy Settings Prediction Model for Textual Posts on Social Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
SQLite Forensic Analysis Based on WAL.
Proceedings of the Security and Privacy in Communication Networks, 2016

Topic Detection in Group Chat Based on Implicit Reply.
Proceedings of the PRICAI 2016: Trends in Artificial Intelligence, 2016

Finding Most Frequent Path based on Stratified Urban Roads.
Proceedings of the GISTAM 2016, 2016

A feature-based method for traffic anomaly detection.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016

Route planning for locations based on trajectory segments.
Proceedings of the 2nd ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2016

MCSS: A Model for Car-Sharing System.
Proceedings of the Workshops of the EDBT/ICDT 2016 Joint Conference, 2016

A Method of Recovering HBase Records from HDFS Based on Checksum File.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A MapReduce-Based Distributed SVM for Scalable Data Type Classification.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
A Hybrid Heuristic Algorithm for the Intelligent Transportation Scheduling Problem of the BRT System.
J. Intell. Syst., 2015

An Improved Content-Based Music Recommending Method with Weighted Tags.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Probabilistic Group Nearest Neighbors query based on Voronoi diagram.
Proceedings of the 1st International ACM SIGSPATIAL Workshop on Smart Cities and Urban Analytics, 2015

Towards selecting optimal features for flow statistical based network traffic classification.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

A Fragment Classification Method Depending on Data Type.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite.
J. Comput., 2014

A Forensic Analysis Method for Redis Database based on RDB and AOF File.
J. Comput., 2014

A File Fragment Classification Method Based on Grayscale Image.
J. Comput., 2014

A Location Inferring Model Based on Tweets and Bilateral Follow Friends.
J. Comput., 2014

Predicting next location using a variable order Markov model.
Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming, 2014

2013
A similarity metric method of obfuscated malware using function-call graph.
J. Comput. Virol. Hacking Tech., 2013

A Malware Variant Detection Method Based on Byte Randomness Test.
J. Comput., 2013

A metadata-based method for recovering files and file traces from YAFFS2.
Digit. Investig., 2013

A LBP-Based Method for Detecting Copy-Move Forgery with Rotation.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Webmail Reconstructing Method from Windows XP Memory Dumps.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

A Recovery Approach for SQLite History Recorders from YAFFS2.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

EHSTC: an enhanced method for semantic trajectory compression.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on GeoStreaming, 2013

2011
Busy stations recognition of Hangzhou public free-bicycle system based on sixth order polynomial smoothing support vector machine.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

An Enhanced Vector-Based Update Algorithm for Network-Constrained Moving Clients.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
An adaptive method to identify disk cluster size based on block content.
Digit. Investig., 2010

Detecting malware variants via function-call graph similarity.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

Mobile-Aware Anonymous Peer Selecting Algorithm for Enhancing Privacy and Connectivity in Location-Based Service.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

2008
An Improved Method for Ranking of Search Results Based on User Interest.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Unknown Malicious Executables Detection Based on Run-Time Behavior.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008


  Loading...