Yongzheng Zhang
Affiliations:- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Harbin Institute of Technology, China (PhD 2006)
According to our database1,
Yongzheng Zhang
authored at least 101 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model.
CoRR, 2022
2021
Comput. Networks, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 28th International Conference on Telecommunications, 2021
MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features.
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
CgNet: Predicting Urban Congregations from Spatio-Temporal Data Using Deep Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2020
Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020
Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
J. Netw. Comput. Appl., 2017
Comput. Networks, 2017
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
2016
IEEE/ACM Trans. Netw., 2016
Secur. Commun. Networks, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014
2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
Proceedings of the Trustworthy Computing and Services, 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Comput. Commun., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004