Xiaosong Zhang

Orcid: 0000-0001-9028-9562

Affiliations:
  • Tangshan University, Tangshan, China


According to our database1, Xiaosong Zhang authored at least 23 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A robust packet-dropping covert channel for mobile intelligent terminals.
Int. J. Intell. Syst., 2022

2021
Building a Covert Timing Channel over VoIP via Packet Length.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A Classic Multi-method Collaborative Obfuscation Strategy.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
A Robust Packet-Dropout Covert Channel over Wireless Networks.
IEEE Wirel. Commun., 2020

A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints.
Future Gener. Comput. Syst., 2020

Building Undetectable Covert Channels Over Mobile Networks with Machine Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
A sensitive network jitter measurement for covert timing channels over interactive traffic.
Multim. Tools Appl., 2019

A packet-reordering covert channel over VoLTE voice and video traffics.
J. Netw. Comput. Appl., 2019

A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment.
IEEE Access, 2019

A Hybrid Covert Channel with Feedback over Mobile Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An RTP Extension for Reliable User-Data Transmission over VoIP Traffic.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

2018
Covert Timing Channels for IoT over Mobile Networks.
IEEE Wirel. Commun., 2018

A code protection scheme by process memory relocation for android devices.
Multim. Tools Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Netw. Comput. Appl., 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

A payload-dependent packet rearranging covert channel for mobile VoIP traffic.
Inf. Sci., 2018

An end-to-end covert channel via packet dropout for mobile networks.
Int. J. Distributed Sens. Networks, 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
Sci. China Inf. Sci., 2018

A Covert Channel Over VoLTE via Adjusting Silence Periods.
IEEE Access, 2018

2017
A round-optimal lattice-based blind signature scheme for cloud services.
Future Gener. Comput. Syst., 2017

Cryptographic key protection against FROST for mobile devices.
Clust. Comput., 2017

An Anti-Forensics Method against Memory Acquiring for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017


  Loading...