Xiaosong Zhang

According to our database1, Xiaosong Zhang authored at least 82 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A sensitive network jitter measurement for covert timing channels over interactive traffic.
Multimedia Tools Appl., 2019

A packet-reordering covert channel over VoLTE voice and video traffics.
J. Network and Computer Applications, 2019

Adversarial attacks against profile HMM website fingerprinting detection model.
Cognitive Systems Research, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wireless Communications and Mobile Computing, 2018

Covert Timing Channels for IoT over Mobile Networks.
IEEE Wireless Commun., 2018

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model.
IEEE Trans. Information Forensics and Security, 2018

System-level attacks against android by exploiting asynchronous programming.
Software Quality Journal, 2018

TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Networking and Applications, 2018

A code protection scheme by process memory relocation for android devices.
Multimedia Tools Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Network and Computer Applications, 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

A payload-dependent packet rearranging covert channel for mobile VoIP traffic.
Inf. Sci., 2018

Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model.
I. J. Network Security, 2018

Processing Multiple-User Location-Based Keyword Queries.
IEICE Transactions, 2018

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Communications Magazine, 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
SCIENCE CHINA Information Sciences, 2018

A Covert Channel Over VoLTE via Adjusting Silence Periods.
IEEE Access, 2018

Interactive Multiple-User Location-Based Keyword Queries on Road Networks.
IEEE Access, 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

DBAF: Dynamic Binary Analysis Framework and Its Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Towards saving money in using smart contracts.
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018

Botnet Detection based on Fuzzy Association Rules.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees.
IEEE Trans. Information Theory, 2017

Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data.
J. Inf. Sci. Eng., 2017

On the L(2, 1)-labeling conjecture for brick product graphs.
J. Comb. Optim., 2017

BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments.
Information, 2017

The convergence and termination criterion of quantum-inspired evolutionary neural networks.
Neurocomputing, 2017

Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Transactions, 2017

Botnet Detection Technology Based on DNS.
Future Internet, 2017

A round-optimal lattice-based blind signature scheme for cloud services.
Future Generation Comp. Syst., 2017

Cryptographic key protection against FROST for mobile devices.
Cluster Computing, 2017

Under-optimized smart contracts devour your money.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

A Program Manipulation Middleware and Its Applications on System Security.
Proceedings of the Security and Privacy in Communication Networks, 2017

Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Phishing Emails Detection Using CS-SVM.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Information Leakage in Encrypted Deduplication via Frequency Analysis.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

An Anti-Forensics Method against Memory Acquiring for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel Extension.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Security and Communication Networks, 2016

Improving data field hierarchical clustering using Barnes-Hut algorithm.
Pattern Recognition Letters, 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group.
J. Comput. Sci. Technol., 2016

Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks.
IEICE Transactions, 2016

Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem.
IACR Cryptology ePrint Archive, 2016

SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurrency and Computation: Practice and Experience, 2016

Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
An I/O Efficient Model Checking Algorithm for Large-Scale Systems.
IEEE Trans. VLSI Syst., 2015

An I/O Efficient Approach for Detecting All Accepting Cycles.
IEEE Trans. Software Eng., 2015

Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliability, 2015

An empirical investigation into path divergences for concolic execution using CREST.
Security and Communication Networks, 2015

Multi-source transfer learning based on label shared subspace.
Pattern Recognition Letters, 2015

Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
FPM: Four-factors Propagation Model for passive P2P worms.
Future Generation Comp. Syst., 2014

Conpy: Concolic Execution Engine for Python Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
Journal of Software: Evolution and Process, 2013

Propagation modeling of active P2P worms based on ternary matrix.
J. Network and Computer Applications, 2013

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model.
IEICE Transactions, 2013

State of the art: Dynamic symbolic execution for automated test generation.
Future Generation Comp. Syst., 2013

An improved multiple-attractor cellular automata classifier with a tree frame based on CART.
Computers & Mathematics with Applications, 2013

ADS-B Data Authentication Based on AH Protocol.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
A Heuristic Reinforcement Learning Based on State Backtracking Method.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Research on the classifier with the tree frame based on multiple attractor cellular automaton.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Performance and Profits Sharing between Two-level Building Supply Chain.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network.
JNW, 2011

Fast quarantining of proactive worms in unstructured P2P networks.
J. Network and Computer Applications, 2011

2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
Journal of Zhejiang University - Science C, 2010

An instances sampling approach based on cellular automata for ensemble learning.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Designated verifier proxy signature scheme without random oracles.
Computers & Mathematics with Applications, 2009

Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
A Novel Approach to Malicious Executables Detection and Containment Based on Distributed System Architecture.
Proceedings of the Fourth International Conference on Natural Computation, 2008

1997
On Meta Levels of an Organized Society of KDD Agents.
Proceedings of the Principles of Data Mining and Knowledge Discovery, 1997


  Loading...