Yongzheng Zhang

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Harbin Institute of Technology, China (PhD 2006)


According to our database1, Yongzheng Zhang authored at least 101 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model.
CoRR, 2022

2021
Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Phishing Web Page Detection with HTML-Level Graph Neural Network.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2021

Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names.
Proceedings of the 28th International Conference on Telecommunications, 2021

MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features.
Proceedings of the Computational Science - ICCS 2021, 2021

LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction.
Proceedings of the ICC 2021, 2021

Incremental Learning for Mobile Encrypted Traffic Classification.
Proceedings of the ICC 2021, 2021

2020
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020

Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Unified Graph Embedding-Based Anomalous Edge Detection.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Gated POS-Level Language Model for Authorship Verification.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020

Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020

IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

CgNet: Predicting Urban Congregations from Spatio-Temporal Data Using Deep Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Method of HTTP Malicious Traffic Detection on Mobile Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network.
Proceedings of the Security and Privacy in Communication Networks, 2019

A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders.
Proceedings of the 26th International Conference on Telecommunications, 2019

Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features.
Proceedings of the 26th International Conference on Telecommunications, 2019

MDBA: Detecting Malware based on Bytes N-Gram with Association Mining.
Proceedings of the 26th International Conference on Telecommunications, 2019

A Linguistics-based Stacking Approach to Disposable Domains Detection.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering.
Proceedings of the Computational Science - ICCS 2019, 2019

A Comprehensive Measurement Study of Domain-Squatting Abuse.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

FENet/IP: Uncovering the Fine-Grained Structure in IP Addresses.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Achieving Dynamic Communication Path for Anti-Tracking Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

GeoCET: Accurate IP Geolocation via Constraint-Based Elliptical Trajectories.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018

Online Discovery of Congregate Groups on Sparse Spatio-temporal Data.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Community Discovery of Attribution Trace Based on Deep Learning Approach.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Modeling for Traffic Replay in Virtual Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
A nonparametric approach to the automated protocol fingerprint inference.
J. Netw. Comput. Appl., 2017

Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

MSTM: A novel map matching approach for low-sampling-rate trajectories.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Mining Users' Important Locations and Semantics on Cellular Network Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
A Semantics-Aware Approach to the Automated Network Protocol Identification.
IEEE/ACM Trans. Netw., 2016

Quantitative threat situation assessment based on alert verification.
Secur. Commun. Networks, 2016

AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Reused Function Retrieval Method Based on Simhash and Inverted Index.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

How to Automatically Identify the Homology of Different Malware.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DMNS: A Framework to Dynamically Monitor Simulated Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation.
IEEE Trans. Inf. Forensics Secur., 2015

Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015

A Markov Random Field Approach to Automated Protocol Signature Inference.
Proceedings of the Security and Privacy in Communication Networks, 2015

Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Traffic Replay in Virtual Network Based on IP-Mapping.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Segmentation Pattern Based Approach to Automated Protocol Identification.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Perspective Scene Text Recognition with Feature Compression and Ranking.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Detecting the DGA-Based Malicious Domain Names.
Proceedings of the Trustworthy Computing and Services, 2013

Counting sort for the live migration of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

A General Framework of Trojan Communication Detection Based on Network Traces.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Modeling of Hierarchical Index System for Network Operation Security.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Parallelizing weighted frequency counting in high-speed network monitoring.
Comput. Commun., 2011

CNSSA: A Comprehensive Network Security Situation Awareness System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Network Threat Assessment Based on Alert Verification.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

2010
Identifying heavy hitters in high-speed network monitoring.
Sci. China Inf. Sci., 2010

Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2008
A Survey of Alert Fusion Techniques for Security Incident.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2005
Computer Vulnerability Evaluation Using Fault Tree Analysis.
Proceedings of the Information Security Practice and Experience, 2005

Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004


  Loading...