Yu Zhang

Orcid: 0000-0003-2040-5059

Affiliations:
  • Harbin Institute of Technology, School of Computer Science and Technology, China (PhD 2009)


According to our database1, Yu Zhang authored at least 54 papers between 2001 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Accelerating Automatic Program Repair with Dual Retrieval-Augmented Fine-Tuning and Patch Generation on Large Language Models.
CoRR, July, 2025

Paths in the cloud: Geolocation mapping of Amazon's cross-border connectivity.
Peer Peer Netw. Appl., June, 2025

Unity is Strength: Enhancing Precision in Reentrancy Vulnerability Detection of Smart Contract Analysis Tools.
IEEE Trans. Software Eng., January, 2025

EigenObfu: A Novel Network Topology Obfuscation Defense Method.
IEEE Trans. Netw. Sci. Eng., 2025

Copy-and-Paste? Identifying EVM-Inequivalent Code Smells in Multi-chain Reuse Contracts.
Proc. ACM Softw. Eng., 2025

Smartreco: Detecting Read-Only Reentrancy via Fine-Grained Cross-DApp Analysis.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

2024
ASOD: an adaptive stream outlier detection method using online strategy.
J. Cloud Comput., December, 2024

An IoT Device Identification Method Using Extracted Fingerprint From Sequence of Traffic Grayscale Images.
IEEE Trans. Dependable Secur. Comput., 2024

Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts.
Proc. ACM Softw. Eng., 2024

An efficient cheating-detectable secret image sharing scheme with smaller share sizes.
J. Inf. Secur. Appl., 2024

A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts.
IET Blockchain, 2024

MCGMark: An Encodable and Robust Online Watermark for LLM-Generated Malicious Code.
CoRR, 2024

A Distributed Scalable Cross-chain State Channel Scheme Based on Recursive State Synchronization.
CoRR, 2024

CodeFuse-Query: A Data-Centric Static Code Analysis System for Large-Scale Organizations.
CoRR, 2024

MoonBit: Explore the Design of an AI-Friendly Programming Language.
LLM4CODE@ICSE, 2024

CodeFuse-13B: A Pretrained Multi-lingual Code Large Language Model.
Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice, 2024

Escape Cache Traps by Rate Feedback for Ndn Real-Time Video Streaming.
Proceedings of the 32nd IEEE International Conference on Network Protocols, 2024

2023
A Collaborative Stealthy DDoS Detection Method Based on Reinforcement Learning at the Edge of Internet of Things.
IEEE Internet Things J., October, 2023

PCLive: Bringing Named Data Networking to Internet Livestreaming.
Proceedings of the 10th ACM Conference on Information-Centric Networking, 2023

2022
Exploiting Knowledge for Better Mobility Support in the Future Internet.
Mob. Networks Appl., 2022

DWBFT: A Weighted Byzantine Fault Tolerant Protocol with Decentralized Trust.
Proceedings of the IEEE International Conference on Communications, 2022

Low latency internet livestreaming in named data networking.
Proceedings of the 9th ACM Conference on Information-Centric Networking, 2022

2021
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things.
Wirel. Commun. Mob. Comput., 2021

Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks.
Proceedings of the MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 22, 2021

NDN in large LEO satellite constellations: a case of consumer mobility support.
Proceedings of the ICN '21: 8th ACM Conference on Information-Centric Networking, Paris, France, September 22, 2021

2020
A secure domain name resolution and management architecture based on blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things.
IEEE Access, 2019

Bitcoin Network Size Estimation Based on Coupon Collection Model.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Modeling, Measuring, and Analyzing the Resolution Process of Popular Domains.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Note on Routing Scalability in Named Data Networking.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

2018
Towards decentralized IoT security enhancement: A blockchain approach.
Comput. Electr. Eng., 2018

The social negative mood index for social networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

KITE: producer mobility support in named data networking.
Proceedings of the 5th ACM Conference on Information-Centric Networking, 2018

2017
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017

MBSA: a lightweight and flexible storage architecture for virtual machines.
Concurr. Comput. Pract. Exp., 2017

Succinct and practical greedy embedding for geometric routing.
Comput. Commun., 2017

Similar Yet Different: Protocol Design Choices in IS-IS and OSPF.
Proceedings of the Asian Internet Engineering Conference, 2017

2016
SNGR: Scalable Name-Based Geometric Routing for ICN.
IEICE Trans. Commun., 2016

A survey of mobility support in Named Data Networking.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
An ICN-Oriented Name-Based Routing Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Kite: a mobility support scheme for NDN.
Proceedings of the 1st International Conference on Information-Centric Networking, 2014

2013
Refining IP-to-AS Mappings for AS-Level Traceroute.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Feature selection for optimizing traffic classification.
Comput. Commun., 2012

2011
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement.
IEEE J. Sel. Areas Commun., 2011

Parallelizing weighted frequency counting in high-speed network monitoring.
Comput. Commun., 2011

Revisiting IP-to-AS mapping for AS-level traceroute.
Proceedings of The ACM CoNEXT Student Workshop, 2011

2010
Identifying High-Rate Flows Based on Sequential Sampling.
IEICE Trans. Inf. Syst., 2010

Identifying heavy hitters in high-speed network monitoring.
Sci. China Inf. Sci., 2010

Quantifying the Pitfalls of Traceroute in AS Connectivity Inference.
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010

2009
A Novel Approach to Scan Detection on the Backbone.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
On Destination Set in IP-Level Topology Measurement.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2001
Understanding end-to-end performance: testbed and primary results.
Proceedings of the Global Telecommunications Conference, 2001


  Loading...