Xiaosong Zhang

Orcid: 0000-0001-9886-1412

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China


According to our database1, Xiaosong Zhang authored at least 179 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT.
IEEE Trans. Ind. Informatics, March, 2024

FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024

PRIDN: A Privacy Preserving Data Sharing on Named Data Networking.
IEEE Trans. Inf. Forensics Secur., 2024

Monero With Multi-Grained Redaction.
IEEE Trans. Dependable Secur. Comput., 2024

Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing.
IEEE Internet Things J., 2024

Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024

2023
An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023

BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing.
IEEE Trans. Computers, August, 2023

GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023

A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems.
IEEE Trans. Ind. Informatics, June, 2023

A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023

Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023

An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023

Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting.
IEEE Trans. Inf. Forensics Secur., 2023

IPCADP-Equalizer: An Improved Multibalance Privacy Preservation Scheme against Backdoor Attacks in Federated Learning.
Int. J. Intell. Syst., 2023

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
Proceedings of the IEEE INFOCOM 2023, 2023

Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023

Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IEEE Trans. Software Eng., 2022

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022

A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022

Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT.
IEEE Trans. Ind. Informatics, 2022

Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication.
IEEE Trans. Computers, 2022

A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022

Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022

Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022

A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022

A blockchain-enabled learning model based on distributed deep learning architecture.
Int. J. Intell. Syst., 2022

Dynamic incentive mechanism design for regulation-aware systems.
Int. J. Intell. Syst., 2022

Blockchain-based deduplication with arbitration and incentives.
IET Inf. Secur., 2022

Semantic and secure search over encrypted outsourcing cloud based on BERT.
Frontiers Comput. Sci., 2022

Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022

Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022

Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Multi-dimensional Data Quick Query for Blockchain-Based Federated Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

An intrusion detection system based on multiple interpretation methods.
Proceedings of the IEEE Smartworld, 2022

IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution.
Proceedings of the IEEE INFOCOM 2022, 2022

TSHN: A Trajectory Similarity Hybrid Networks for Dummy Trajectory Identification.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism.
Proceedings of the IEEE International Conference on Communications, 2022

Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle.
Proceedings of the IEEE International Conference on Communications, 2022

A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication.
Proceedings of the IEEE Global Communications Conference, 2022

LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Compiler-Based Efficient CNN Model Construction for 5G Edge Devices.
IEEE Trans. Intell. Transp. Syst., 2021

GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts.
IEEE Trans. Emerg. Top. Comput., 2021

On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021

Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021

A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021

Scalable and redactable blockchain with update and anonymity.
Inf. Sci., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities.
IEEE Internet Things J., 2021

Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021

Long short-term memory on abstract syntax tree for SQL injection detection.
IET Softw., 2021

Accelerating Encrypted Deduplication via SGX.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

Enabling Auction-based Cross-Blockchain Protocol for Online Anonymous Payment.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism.
Proceedings of the ICC 2021, 2021

2020
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses.
ACM Trans. Storage, 2020

Understanding Ethereum via Graph Analysis.
ACM Trans. Internet Techn., 2020

Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020

HUCDO: A Hybrid User-centric Data Outsourcing Scheme.
ACM Trans. Cyber Phys. Syst., 2020

OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020

Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.
Sensors, 2020

A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.
Secur. Commun. Networks, 2020

Toward Secure Storage in Cloud-based eHealth Systems: A Blockchain-Assisted Approach.
IEEE Netw., 2020

EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud.
IEEE Internet Things J., 2020

An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020

A new lower bound on the second-order nonlinearity of a class of monomial bent functions.
Cryptogr. Commun., 2020

SODA: A Generic Online Detection Framework for Smart Contracts.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

CEPS: A Cross-Blockchain based Electronic Health Records Privacy-Preserving Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Electric Vehicle Charging Reservation Approach Based on Blockchain.
Proceedings of the IEEE Global Communications Conference, 2020

Balancing storage efficiency and data confidentiality with tunable encrypted deduplication.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Weighted-Sampling Audio Adversarial Example Attack.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019

Analysis of ResNet and GoogleNet models for malware detection.
J. Comput. Virol. Hacking Tech., 2019

A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019

Building Redactable Consortium Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems.
Sensors, 2019

Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
Secur. Commun. Networks, 2019

Integrating Traffics with Network Device Logs for Anomaly Detection.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

Bounds for signed double Roman <i>k</i>-domination in trees.
RAIRO Oper. Res., 2019

Multi-factor combination authentication using fuzzy graph domination model.
J. Intell. Fuzzy Syst., 2019

An efficient multiple-user location-based query authentication approach for social networking.
J. Inf. Secur. Appl., 2019

Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things.
Inf. Sci., 2019

Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain.
Inf. Sci., 2019

A Practical and Compatible Cryptographic Solution to ADS-B Security.
IEEE Internet Things J., 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019

On 2-rainbow domination of generalized Petersen graphs.
Discret. Appl. Math., 2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems.
CoRR, 2019

A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
CoRR, 2019

Adversarial attacks against profile HMM website fingerprinting detection model.
Cogn. Syst. Res., 2019

A temporal correlation and traffic analysis approach for APT attacks detection.
Clust. Comput., 2019

Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment.
Comput. Electr. Eng., 2019

A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features.
IEEE Access, 2019

Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection.
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019

DataEther: Data Exploration Framework For Ethereum.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

An Improved Convolutional Neural Network Model for Intrusion Detection in Networks.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Co-Clustering Host-Domain Graphs to Discover Malware Infection.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model.
IEEE Trans. Inf. Forensics Secur., 2018

System-level attacks against android by exploiting asynchronous programming.
Softw. Qual. J., 2018

TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018

具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018

Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model.
Int. J. Netw. Secur., 2018

Processing Multiple-User Location-Based Keyword Queries.
IEICE Trans. Inf. Syst., 2018

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Commun. Mag., 2018

Interactive Multiple-User Location-Based Keyword Queries on Road Networks.
IEEE Access, 2018

Computational Complexity of Outer-Independent Total and Total Roman Domination Numbers in Trees.
IEEE Access, 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

DBAF: Dynamic Binary Analysis Framework and Its Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards saving money in using smart contracts.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Botnet Detection based on Fuzzy Association Rules.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Evaluating the Performance of ResNet Model Based on Image Recognition.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Malicious Code Detection based on Image Processing Using Deep Learning.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

An Authentication Approach for Multiple-User Location-Based Queries.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees.
IEEE Trans. Inf. Theory, 2017

Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data.
J. Inf. Sci. Eng., 2017

On the L(2, 1)-labeling conjecture for brick product graphs.
J. Comb. Optim., 2017

BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments.
Inf., 2017

The convergence and termination criterion of quantum-inspired evolutionary neural networks.
Neurocomputing, 2017

Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017

Fast backup and recovery for web protectiuon using trigger and block hash approach.
Comput. Syst. Sci. Eng., 2017

Under-optimized smart contracts devour your money.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

A Program Manipulation Middleware and Its Applications on System Security.
Proceedings of the Security and Privacy in Communication Networks, 2017

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Phishing Emails Detection Using CS-SVM.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Secur. Commun. Networks, 2016

Improving data field hierarchical clustering using Barnes-Hut algorithm.
Pattern Recognit. Lett., 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2016

Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem.
IACR Cryptol. ePrint Arch., 2016

SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016

Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
An I/O Efficient Model Checking Algorithm for Large-Scale Systems.
IEEE Trans. Very Large Scale Integr. Syst., 2015

An I/O Efficient Approach for Detecting All Accepting Cycles.
IEEE Trans. Software Eng., 2015

Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliab., 2015

An empirical investigation into path divergences for concolic execution using CREST.
Secur. Commun. Networks, 2015

Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
FPM: Four-factors Propagation Model for passive P2P worms.
Future Gener. Comput. Syst., 2014

Conpy: Concolic Execution Engine for Python Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
J. Softw. Evol. Process., 2013

Propagation modeling of active P2P worms based on ternary matrix.
J. Netw. Comput. Appl., 2013

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

State of the art: Dynamic symbolic execution for automated test generation.
Future Gener. Comput. Syst., 2013

ADS-B Data Authentication Based on AH Protocol.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2011
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network.
J. Networks, 2011

Fast quarantining of proactive worms in unstructured P2P networks.
J. Netw. Comput. Appl., 2011

2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
J. Zhejiang Univ. Sci. C, 2010

2009
Designated verifier proxy signature scheme without random oracles.
Comput. Math. Appl., 2009

Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...