Zhisong Pan

Orcid: 0000-0001-8615-7313

Affiliations:
  • Army Engineering University of PLA, Nanjing, China


According to our database1, Zhisong Pan authored at least 64 papers between 2014 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
DCMTL network: A double-contrast multi-task learning network for semi-supervised multi-source data classification.
Expert Syst. Appl., 2026

2025
GAME-RL: Generating Adversarial Malware Examples Against API Call Based Detection via Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2025

TSTBench: A Comprehensive Benchmark for Text Style Transfer.
Entropy, 2025

Practical clean-label backdoor attack against static malware detection.
Comput. Secur., 2025

Tailoring naturalistic adversarial examples via text-to-image diffusion models.
Comput. Electr. Eng., 2025

2024
MalPatch: Evading DNN-Based Malware Detection With Adversarial Patches.
IEEE Trans. Inf. Forensics Secur., 2024

GraphMoCo: A graph momentum contrast model for large-scale binary function representation learning.
Neurocomputing, 2024

2023
Token-level disentanglement for unsupervised text style transfer.
Neurocomputing, December, 2023

Semantic Attention and Structured Model for Weakly Supervised Instance Segmentation in Optical and SAR Remote Sensing Imagery.
Remote. Sens., November, 2023

Meta-Knowledge Guided Weakly Supervised Instance Segmentation for Optical and SAR Image Interpretation.
Remote. Sens., May, 2023

AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation.
Comput. Secur., April, 2023

Boosting Adversarial Transferability with Shallow-Feature Attack on SAR Images.
Remote. Sens., 2023

PSP-Mal: Evading Malware Detection via Prioritized Experience-based Reinforcement Learning with Shapley Prior.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient.
Secur. Commun. Networks, 2022

Enhancing transferability of adversarial examples via rotation-invariant attacks.
IET Comput. Vis., 2022

Multiple Domain Cyberspace Attack and Defense Game Based on Reward Randomization Reinforcement Learning.
CoRR, 2022

KGRGRL: A User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning.
CoRR, 2022

Adversarial Attack via Dual-Stage Network Erosion.
CoRR, 2022

Adversarial attack via dual-stage network erosion.
Comput. Secur., 2022

Learning Coated Adversarial Camouflages for Object Detectors.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
Meta-Knowledge Learning and Domain Adaptation for Unseen Background Subtraction.
IEEE Trans. Image Process., 2021

Active Module Identification From Multilayer Weighted Gene Co-Expression Networks: A Continuous Optimization Approach.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

A data independent approach to generate adversarial patches.
Mach. Vis. Appl., 2021

Robust and label efficient bi-filtering graph convolutional networks for node classification.
Knowl. Based Syst., 2021

A fast X-shaped foreground segmentation network with CompactASPP.
Eng. Appl. Artif. Intell., 2021

DPA: Learning Robust Physical Adversarial Camouflages for Object Detectors.
CoRR, 2021

Mask-guided noise restriction adversarial attacks for image classification.
Comput. Secur., 2021

Learning Indistinguishable and Transferable Adversarial Examples.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

2020
The Strength of Nesterov's Extrapolation in the Individual Convergence of Nonsmooth Optimization.
IEEE Trans. Neural Networks Learn. Syst., 2020

Primal Averaging: A New Gradient Evaluation Step to Attain the Optimal Individual Convergence.
IEEE Trans. Cybern., 2020

SLAM: A Malware Detection Method Based on Sliding Local Attention Mechanism.
Secur. Commun. Networks, 2020

An eigendecomposition method based on deep learning and probabilistic graph model.
J. Ambient Intell. Humaniz. Comput., 2020

Multi-scale and multi-branch feature representation for person re-identification.
Neurocomputing, 2020

Cloud Annealing: A Novel Simulated Annealing Algorithm Based on Cloud Model.
IEICE Trans. Inf. Syst., 2020

Community detection in dynamic networks using constraint non-negative matrix factorization.
Intell. Data Anal., 2020

Use of sparse correlations for assessing financial markets.
Frontiers Comput. Sci., 2020

Making Adversarial Examples More Transferable and Indistinguishable.
CoRR, 2020

Regularized shapelet learning for scalable time series classification.
Comput. Networks, 2020

Joint Feature Learning Network for Visible-Infrared Person Re-identification.
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020

Improving the Transferability of Adversarial Examples with Resized-Diverse-Inputs, Diversity-Ensemble and Region Fitting.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
An API Semantics-Aware Malware Detection Method Based on Deep Learning.
Secur. Commun. Networks, 2019

RMMDI: A Novel Framework for Role Mining Based on the Multi-Domain Information.
Secur. Commun. Networks, 2019

A Game-Theoretic Approach for Community Detection in Signed Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Attributed network representation learning via DeepWalk.
Intell. Data Anal., 2019

MDC-Checker: A novel network risk assessment framework for multiple domain configurations.
Comput. Secur., 2019

X-Net: A Binocular Summation Network for Foreground Segmentation.
IEEE Access, 2019

DDoS Traffic Control Using Transfer Learning DQN With Structure Information.
IEEE Access, 2019

A New Smart Router-Throttling Method to Mitigate DDoS Attacks.
IEEE Access, 2019

How to Make Attention Mechanisms More Practical in Malware Classification.
IEEE Access, 2019

Densely Connected Convolutional Networks With Attention LSTM for Crowd Flows Prediction.
IEEE Access, 2019

Joint Attention Mechanism for Person Re-Identification.
IEEE Access, 2019

2018
Community Detection Based on Regularized Semi-Nonnegative Matrix Tri-Factorization in Signed Networks.
Mob. Networks Appl., 2018

可伸缩模块化CNN人群计数方法 (Crowd Counting Method via Scalable Modularized Convolutional Neural Network).
计算机科学, 2018

Community Detection Based on Co-regularized Nonnegative Matrix Tri-Factorization in Multi-view Social Networks.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Community Discovery on Multi-View Social Networks via Joint Regularized Nonnegative Matrix Triple Factorization.
IEICE Trans. Inf. Syst., 2017

Detecting Semantic Communities in Social Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Entropy-based link selection strategy for multidimensional complex networks.
Intell. Data Anal., 2017

Robust and Adaptive Online Time Series Prediction with Long Short-Term Memory.
Comput. Intell. Neurosci., 2017

Active module identification in intracellular networks using a memetic algorithm with a new binary decoding scheme.
BMC Genom., 2017

2016
Generalization Bounds Derived IPM-Based Regularization for Domain Adaptation.
Comput. Intell. Neurosci., 2016

2015
Anomaly detection based on efficient Euclidean projection.
Secur. Commun. Networks, 2015

Anomaly detection in traffic using L1-norm minimization extreme learning machine.
Neurocomputing, 2015

Network traffic classification via non-convex multi-task feature learning.
Neurocomputing, 2015

2014
Multi-task Feature Selection based Anomaly Detection.
CoRR, 2014


  Loading...