Yongzheng Zhang

Orcid: 0000-0001-7353-7712

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Harbin Institute of Technology, China (PhD 2006)


According to our database1, Yongzheng Zhang authored at least 130 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Let model keep evolving: Incremental learning for encrypted traffic classification.
Comput. Secur., February, 2024

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Encrypted TLS Traffic Classification on Cloud Platforms.
IEEE/ACM Trans. Netw., February, 2023

Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach.
Comput. Secur., 2023

Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

2022
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation.
IEEE Trans. Netw. Serv. Manag., 2022

Inter-BIN: Interaction-Based Cross-Architecture IoT Binary Similarity Comparison.
IEEE Internet Things J., 2022

Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022

Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur., 2022

BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model.
Proceedings of the IEEE International Conference on Software Analysis, 2022

A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet.
Proceedings of the IEEE International Conference on Trust, 2022

Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
Proceedings of the Security and Privacy in Communication Networks, 2022

Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2022

A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2022

Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A Framework for Network Self-evolving Based on Distributed Swarm Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022

MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems.
IEEE Trans. Ind. Informatics, 2021

Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process.
Proceedings of the 20th IEEE International Conference on Trust, 2021

DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Phishing Web Page Detection with HTML-Level Graph Neural Network.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2021

Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names.
Proceedings of the 28th International Conference on Telecommunications, 2021

MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features.
Proceedings of the Computational Science - ICCS 2021, 2021

LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction.
Proceedings of the ICC 2021, 2021

Incremental Learning for Mobile Encrypted Traffic Classification.
Proceedings of the ICC 2021, 2021

Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Topology Self-optimization for Anti-tracking Network via Nodes Distributed Computing.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Mobile Encrypted Traffic Classification Based on Message Type Inference.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020

FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Unified Graph Embedding-Based Anomalous Edge Detection.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Gated POS-Level Language Model for Authorship Verification.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

Modeling of Anti-tracking Network Based on Convex-Polytope Topology.
Proceedings of the Computational Science - ICCS 2020, 2020

Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020

Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020

TDAE: Autoencoder-based Automatic Feature Learning Method for the Detection of DNS tunnel.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

CgNet: Predicting Urban Congregations from Spatio-Temporal Data Using Deep Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Method of HTTP Malicious Traffic Detection on Mobile Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network.
Proceedings of the Security and Privacy in Communication Networks, 2019

A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

CLR: A Classification of DNS Tunnel Based on Logistic Regression.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders.
Proceedings of the 26th International Conference on Telecommunications, 2019

Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features.
Proceedings of the 26th International Conference on Telecommunications, 2019

MDBA: Detecting Malware based on Bytes N-Gram with Association Mining.
Proceedings of the 26th International Conference on Telecommunications, 2019

A Linguistics-based Stacking Approach to Disposable Domains Detection.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering.
Proceedings of the Computational Science - ICCS 2019, 2019

A Comprehensive Measurement Study of Domain-Squatting Abuse.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

FENet/IP: Uncovering the Fine-Grained Structure in IP Addresses.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Achieving Dynamic Communication Path for Anti-Tracking Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

GeoCET: Accurate IP Geolocation via Constraint-Based Elliptical Trajectories.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018

Online Discovery of Congregate Groups on Sparse Spatio-temporal Data.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018

Community Discovery of Attribution Trace Based on Deep Learning Approach.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Modeling for Traffic Replay in Virtual Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
A nonparametric approach to the automated protocol fingerprint inference.
J. Netw. Comput. Appl., 2017

Rethinking robust and accurate application protocol identification.
Comput. Networks, 2017

Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Discovering Malicious Domains through Alias-Canonical Graph.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

MSTM: A novel map matching approach for low-sampling-rate trajectories.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Detecting Information Theft Based on Mobile Network Flows for Android Users.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Mining Users' Important Locations and Semantics on Cellular Network Data.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
A Semantics-Aware Approach to the Automated Network Protocol Identification.
IEEE/ACM Trans. Netw., 2016

Quantitative threat situation assessment based on alert verification.
Secur. Commun. Networks, 2016

AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Reused Function Retrieval Method Based on Simhash and Inverted Index.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

How to Automatically Identify the Homology of Different Malware.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

DMNS: A Framework to Dynamically Monitor Simulated Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation.
IEEE Trans. Inf. Forensics Secur., 2015

Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015

A Markov Random Field Approach to Automated Protocol Signature Inference.
Proceedings of the Security and Privacy in Communication Networks, 2015

Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

Traffic Replay in Virtual Network Based on IP-Mapping.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Segmentation Pattern Based Approach to Automated Protocol Identification.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014

Perspective Scene Text Recognition with Feature Compression and Ranking.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Detecting the DGA-Based Malicious Domain Names.
Proceedings of the Trustworthy Computing and Services, 2013

Counting sort for the live migration of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

A General Framework of Trojan Communication Detection Based on Network Traces.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Modeling of Hierarchical Index System for Network Operation Security.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A semantics aware approach to automated reverse engineering unknown protocols.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Parallelizing weighted frequency counting in high-speed network monitoring.
Comput. Commun., 2011

CNSSA: A Comprehensive Network Security Situation Awareness System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Network Threat Assessment Based on Alert Verification.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

2010
Identifying heavy hitters in high-speed network monitoring.
Sci. China Inf. Sci., 2010

Cooperative Work Systems for the Security of Digital Computing Infrastructure.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2008
A Survey of Alert Fusion Techniques for Security Incident.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2005
Computer Vulnerability Evaluation Using Fault Tree Analysis.
Proceedings of the Information Security Practice and Experience, 2005

Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004


  Loading...