Xingsi Zhong

According to our database1, Xingsi Zhong authored at least 11 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Protocol Proxy: An FTE-based covert channel.
Comput. Secur., 2020

2017
Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR, 2017

Stealthy Malware Traffic - Not as Innocent as It Looks.
CoRR, 2017

2016
Fast arithmetic in algorithmic self-assembly.
Nat. Comput., 2016

A covert data transport protocol.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

2015
Exponential replication of patterns in the signal tile assembly model.
Nat. Comput., 2015

Stealthy malware traffic - Not as innocent as it looks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Side-Channels in Electric Power Synchrophasor Network Data Traffic.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Asynchronous signal Passing for Tile Self-assembly: Fuel Efficient Computation and Efficient assembly of Shapes.
Int. J. Found. Comput. Sci., 2014

2013
Asynchronous Signal Passing for Tile Self-assembly: Fuel Efficient Computation and Efficient Assembly of Shapes.
Proceedings of the Unconventional Computation and Natural Computation, 2013


  Loading...