Yongzheng Zhang

According to our database1, Yongzheng Zhang authored at least 50 papers between 2004 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Security and Communication Networks, 2018

2017
A nonparametric approach to the automated protocol fingerprint inference.
J. Network and Computer Applications, 2017

Rethinking robust and accurate application protocol identification.
Computer Networks, 2017

Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

MSTM: A novel map matching approach for low-sampling-rate trajectories.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Mining Users' Important Locations and Semantics on Cellular Network Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
A Semantics-Aware Approach to the Automated Network Protocol Identification.
IEEE/ACM Trans. Netw., 2016

Quantitative threat situation assessment based on alert verification.
Security and Communication Networks, 2016

AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Reused Function Retrieval Method Based on Simhash and Inverted Index.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

How to Automatically Identify the Homology of Different Malware.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DMNS: A Framework to Dynamically Monitor Simulated Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation.
IEEE Trans. Information Forensics and Security, 2015

Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015

A Markov Random Field Approach to Automated Protocol Signature Inference.
Proceedings of the Security and Privacy in Communication Networks, 2015

Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Traffic Replay in Virtual Network Based on IP-Mapping.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Segmentation Pattern Based Approach to Automated Protocol Identification.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Perspective Scene Text Recognition with Feature Compression and Ranking.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Detecting the DGA-Based Malicious Domain Names.
Proceedings of the Trustworthy Computing and Services, 2013

Counting sort for the live migration of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

A General Framework of Trojan Communication Detection Based on Network Traces.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Modeling of Hierarchical Index System for Network Operation Security.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Parallelizing weighted frequency counting in high-speed network monitoring.
Computer Communications, 2011

CNSSA: A Comprehensive Network Security Situation Awareness System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Network Threat Assessment Based on Alert Verification.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

2010
Identifying heavy hitters in high-speed network monitoring.
SCIENCE CHINA Information Sciences, 2010

Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2008
A Survey of Alert Fusion Techniques for Security Incident.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2005
Computer Vulnerability Evaluation Using Fault Tree Analysis.
Proceedings of the Information Security Practice and Experience, 2005

Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004


  Loading...