Zhen Xu

Affiliations:
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China


According to our database1, Zhen Xu authored at least 92 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services.
IEEE Trans. Mob. Comput., 2023

Perspectively Equivariant Keypoint Learning for Omnidirectional Images.
IEEE Trans. Image Process., 2023

Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems.
Proc. VLDB Endow., 2023

Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

The malicious resource consumption detection in permissioned blockchain based on traffic analysis.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Building Efficient Parallel Endorsement Node on Blockchain Systems.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

CP Decomposition and Set Theory based Root Cause Analysis in Online Service Systems.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

Satellite Anomaly Detection based on Improved Transformer Method.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Job Completion Time Under Migration-Based Dynamic Platform Technique.
IEEE Trans. Serv. Comput., 2022

A flexible approach for cyber threat hunting based on kernel audit records.
Cybersecur., 2022

Exploring Graph-aware Multi-View Fusion for Rumor Detection on Social Media.
CoRR, 2022

On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.
Comput. J., 2022

LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence.
Proceedings of the IEEE Smartworld, 2022

An atomic member addition mechanism for permissioned blockchain based on autonomous rollback.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN Websites.
Proceedings of the IEEE INFOCOM 2022, 2022

Six-to-one: Cubemap-guided Feature Calibration for Panorama Object Detection.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Variational Depth Estimation on Hypersphere for Panorama.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.
Proceedings of the IEEE International Conference on Acoustics, 2022

RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

360-Attack: Distortion-Aware Perturbations from Perspective-Views.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Detection of Hardware-Assisted Virtualization Based on Low-Level Feature.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

A Byte-level Autoencoder-based Method to Detect Malicious Open Resolver.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Rendering-Aware VR Video Caching Over Multi-Cell MEC Networks.
IEEE Trans. Veh. Technol., 2021

360-Degree VR Video Watermarking Based on Spherical Wavelet Transform.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021

VAECGAN: a generating framework for long-term prediction in multivariate time series.
Cybersecur., 2021

Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction.
IEEE Access, 2021

SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs.
Proceedings of the WWW '21: The Web Conference 2021, 2021

SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Secure and Efficient Allocation of Virtual Machines in Cloud Data Center.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Improved Face Detector on Fisheye Images via Spherical-Domain Attention.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Distributed Capability Based Dynamic Path Authorization Scheme for SDSIN.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Message-Based Malicious Detection Scheme of Public DNS Services.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Novel Trojan Attack against Co-learning Based ASR DNN System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Multimodal Fusion with Co-Attention Networks for Fake News Detection.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Empowering Adaptive Early-Exit Inference with Latency Awareness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020

Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security".
IEEE Trans. Inf. Forensics Secur., 2020

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign.
EAI Endorsed Trans. Security Safety, 2020

An enhanced saturation attack and its mitigation mechanism in software-defined networking.
Comput. Networks, 2020

End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A novel network traffic classification approach via discriminative feature learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Comput. Secur., 2019

EFastLane: Toward Bandwidth-Efficient Flow Setup in Software-Defined Networking.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Global Orchestration of Cooperative Defense against DDoS Attacks for MEC.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

An Effective Load Balanced Controller Placement Approach in Software-Defined WANs.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

An Effective Table-Overflow Attack and Defense in Software-Defined Networking.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Minimizing Multi-Controller Deployment Cost in Software-Defined Networking.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Adaptive SDN Master Controller Assignment for Maximizing Network Throughput.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Towards Scalable and Flexible Path Control Schema in Software Defined Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Proactive Mitigation to Table-Overflow in Software-Defined Networking.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

T-Tracker: Compressing System Audit Log by Taint Tracking.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Large Scale Analysis of DNS Water Torture Attack.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Understanding User Behavior in Online Banking System.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
DC<sup>2</sup>-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium, 2017

A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

DGASensor: Fast Detection for DGA-Based Malwares.
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017

A game theoretical framework for improving the quality of service in cooperative RAN caching.
Proceedings of the IEEE International Conference on Communications, 2017

What should we do? A structured review of SCADA system cyber security standards.
Proceedings of the 4th International Conference on Control, 2017

Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
Towards reliable virtual data center embedding in software defined networking.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Improving revenue for reliability-aware VDC embedding in a software-defined data center.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Choquet integral based QoS-to-QoE mapping for mobile VoD applications.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Cross-network and cross-layer optimized video streaming over LTE and WCDMA downlink.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

An Energy-Aware Algorithm for Optimizing Resource Allocation in Software Defined Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

SMPA: An Energy-Aware Service Migration Strategy in Cloud Networks.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A cost-effective scheme supporting adaptive service migration in cloud data center.
Frontiers Comput. Sci., 2015

An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014


  Loading...