Xinran Zheng

Orcid: 0000-0003-1130-7916

According to our database1, Xinran Zheng authored at least 25 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions.
CoRR, July, 2025

Generative AI for Vulnerability Detection in 6G Wireless Networks: Advances, Case Study, and Future Directions.
CoRR, June, 2025

RealFactBench: A Benchmark for Evaluating Large Language Models in Real-World Fact-Checking.
CoRR, June, 2025

Learning Temporal Invariance in Android Malware Detectors.
CoRR, February, 2025

The Power of Personalized Datasets: Advancing Chinese Composition Writing for Elementary School through Targeted Model Fine-Tuning.
Int. J. Asian Lang. Process., 2025

LAMD: Context-Driven Android Malware Detection and Classification with LLMs.
Proceedings of the 2025 IEEE Security and Privacy, 2025

On Benchmarking Code LLMs for Android Malware Analysis.
Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2025

Benchmarking Multimodal Retrieval Augmented Generation with Dynamic VQA Dataset and Self-adaptive Planning Agent.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

2024
An Efficient and Adaptive Content Delivery System Based on Hybrid Network.
ACM Trans. Knowl. Discov. Data, February, 2024

An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm.
IEEE Trans. Inf. Forensics Secur., 2024

Further remarks on absorbing Markov decision processes.
Oper. Res. Lett., 2024

A General Framework for Approximate and Delayed Gradient Descent for Decomposable Cost Functions.
IEEE Control. Syst. Lett., 2024

Benchmarking Multimodal Retrieval Augmented Generation with Dynamic VQA Dataset and Self-adaptive Planning Agent.
CoRR, 2024

STCA: Stacked Token-based Continuous Authentication Protocol for Zero Trust IoT.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

An Efficient (t, n) Threshold Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

ReCDA: Concept Drift Adaptation with Representation Enhancement for Network Intrusion Detection.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

The Power of Personalized Datasets: Advancing Chinese Composition Writing for Elementary School through Targeted Model Fine-Tuning.
Proceedings of the International Conference on Asian Language Processing, 2024

Multi-Scale Contrastive Attention Representation Learning for Encrypted Traffic Classification.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things.
Comput. Commun., February, 2023

Zeroth-Order Non-Convex Optimization for Cooperative Multi-Agent Systems With Diminishing Step Size and Smoothing Radius.
IEEE Control. Syst. Lett., 2023

A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoT.
Proceedings of the NOMS 2023, 2023

SF-IDS: An Imbalanced Semi-Supervised Learning Framework for Fine-Grained Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2023

A Lightweight Approach for Network Intrusion Detection Based on Self-Knowledge Distillation.
Proceedings of the IEEE International Conference on Communications, 2023

Towards Efficient Blockchain-Based Cross-Domain Trust Reputation Management for LS-HetNet.
Proceedings of the IEEE Global Communications Conference, 2023

2018
New benchmark solutions for free vibration of clamped rectangular thick plates and their variants.
Appl. Math. Lett., 2018


  Loading...