Zesheng Chen

Orcid: 0000-0003-2771-2756

According to our database1, Zesheng Chen authored at least 50 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems.
IEEE Internet Things J., September, 2023

Improving Workflow Integration with xPath: Design and Evaluation of a Human-AI Diagnosis System in Pathology.
ACM Trans. Comput. Hum. Interact., April, 2023

Inkjet-Printed High-Yield, Reconfigurable, and Recyclable Memristors on Paper.
CoRR, 2023

2022
Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-Adding.
Algorithms, 2022

Human Activity Recognition Based on Convolutional Neural Network via Smart-phone Sensors.
Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, 2022

Statistical Analysis of threatening IP in Universities Based Automated Script.
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022

Detecting IoT Botnets on IoT Edge Devices.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

2021
Defending Against Adversarial Attacks in Speaker Verification Systems.
Proceedings of the IEEE International Performance, 2021

2020
Characterising spatial dependence on epidemic thresholds in networks.
Int. J. Secur. Networks, 2020

2019
Self-stopping strategies for tractable information dissemination in dense mobile sensor networks.
Int. J. Sens. Networks, 2019

Real-Time Bearing Remaining Useful Life Estimation Based on the Frozen Convolutional and Activated Memory Neural Network.
IEEE Access, 2019

Discrete-Time vs. Continuous-Time Epidemic Models in Networks.
IEEE Access, 2019

2018
Epidemic Thresholds in Networks: Impact of Heterogeneous Infection Rates and Recovery Rates.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Modeling the Spread of Influence for Independent Cascade Diffusion Process in Social Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
Characterising heterogeneity in vulnerable hosts on worm propagation.
Int. J. Secur. Networks, 2016

Self-stopping epidemic routing in cooperative wireless mobile sensor networks.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Toward understanding spatial dependence on epidemic thresholds in networks.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2014
Adaptive energy-efficient spectrum probing in cognitive radio networks.
Ad Hoc Networks, 2014

2012
On the Characteristics of the Worm Infection Family Tree.
IEEE Trans. Inf. Forensics Secur., 2012

Heterogeneity in vulnerable hosts slows down worm propagation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Darknet-Based Inference of Internet Worm Temporal Characteristics.
IEEE Trans. Inf. Forensics Secur., 2011

Characterizing Internet Worm Infection Structure.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
Enhancing Intrusion Detection System with proximity information.
Int. J. Secur. Networks, 2010

On the scalability of Delay-Tolerant Botnets.
Int. J. Secur. Networks, 2010

Towards a routing framework in ad hoc space networks.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Characterizing and defending against divide-conquer-scanning worms.
Comput. Networks, 2010

On Spectrum Probing in Cognitive Radio Networks: Does Randomization Matter?
Proceedings of IEEE International Conference on Communications, 2010

On the Robustness of the Botnet Topology Formed by Worm Infection.
Proceedings of the Global Communications Conference, 2010

2009
Exploiting Contact Spatial Dependency for Opportunistic Message Forwarding.
IEEE Trans. Mob. Comput., 2009

An information-theoretic view of network-aware malware attacks.
IEEE Trans. Inf. Forensics Secur., 2009

Deriving a closed-form expression for worm-scanning strategies.
Int. J. Secur. Networks, 2009

Modeling primary user emulation attacks and defenses in cognitive radio networks.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

Delay-Tolerant Botnets.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Packet-Mode Asynchronous Scheduling Algorithm for Partially Buffered Crossbar Switches.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
An Information-Theoretical View of Network-Aware Malware Attacks
CoRR, 2008

Understanding Divide-Conquer-Scanning Worms.
Proceedings of the 2008 IEEE International Performance, 2008

Spatial-Temporal Characteristics of Internet Malicious Sources.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A Closed-Form Expression for Static Worm-Scanning Strategies.
Proceedings of IEEE International Conference on Communications, 2008

Inferring Internet Worm Temporal Characteristics.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Optimal worm-scanning method using vulnerable-host distributions.
Int. J. Secur. Networks, 2007

Misleading and defeating importance-scanning malware propagation.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Evaluating contacts for routing in highly partitioned mobile networks.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

Understanding Localized-Scanning Worms.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Measuring Network-Aware Worm Spreading Ability.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Comments on "modeling TCP reno performance: a simple model and its empirical validation".
IEEE/ACM Trans. Netw., 2006

2005
Spatial-temporal modeling of malware propagation in networks.
IEEE Trans. Neural Networks, 2005

A self-learning worm using importance scanning.
Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005

Importance-scanning worm using vulnerable-host distribution.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2003
Modeling the Spread of Active Worms.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003


  Loading...