


default search action
Yongzheng Zhang 0002
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation (PhD 2006): Harbin Institute of Technology, China
Other persons with the same name
- Yongzheng Zhang — disambiguation page
- Yongzheng Zhang 0001 — Dalhousie University
- Yongzheng Zhang 0003 — Northeast Normal University, Changchun, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Xiang Li
, Jiang Xie, Qige Song
, Yafei Sang, Yongzheng Zhang, Shuhao Li, Tianning Zang:
Let model keep evolving: Incremental learning for encrypted traffic classification. Comput. Secur. 137: 103624 (2024) - [j20]Qige Song
, Yafei Sang, Yongzheng Zhang, Shuhao Li
, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. IEEE Trans. Inf. Forensics Secur. 19: 1372-1387 (2024) - 2023
- [j19]Yafei Sang, Jisong Yang, Yongzheng Zhang, Shuhao Li, Peng Chang:
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach. Comput. Secur. 131: 103145 (2023) - [j18]Xiaochun Yun
, Yipeng Wang
, Yongzheng Zhang, Chen Zhao
, Zijian Zhao
:
Encrypted TLS Traffic Classification on Cloud Platforms. IEEE/ACM Trans. Netw. 31(1): 164-177 (2023) - [c109]Xiang Li
, Juncheng Guo, Qige Song, Jiang Xie, Yafei Sang, Shuyuan Zhao, Yongzheng Zhang:
Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training. SECON 2023: 447-455 - [i8]Xiang Li, Juncheng Guo, Qige Song, Jiang Xie, Yafei Sang, Shuyuan Zhao, Yongzheng Zhang:
Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training. CoRR abs/2308.16453 (2023) - [i7]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A method based on hierarchical spatiotemporal features for trojan traffic detection. CoRR abs/2309.01174 (2023) - [i6]Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: an HTTP-based Trojan Detection Model via the Hierarchical Spatio-Temporal Features of Traffics. CoRR abs/2309.03724 (2023) - [i5]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. CoRR abs/2309.03739 (2023) - [i4]Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun, Hongbo Xu:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. CoRR abs/2310.10660 (2023) - 2022
- [j17]Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. Comput. Secur. 121: 102834 (2022) - [j16]Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun
, Hongbo Xu
:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. Comput. Secur. 121: 102867 (2022) - [j15]Qige Song
, Yongzheng Zhang
, Binglai Wang, Yige Chen:
Inter-BIN: Interaction-Based Cross-Architecture IoT Binary Similarity Comparison. IEEE Internet Things J. 9(20): 20018-20033 (2022) - [j14]Yipeng Wang
, Xiaochun Yun, Yongzheng Zhang, Chen Zhao, Xin Liu:
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation. IEEE Trans. Netw. Serv. Manag. 19(2): 875-889 (2022) - [c108]Hanwu Sun, Chengwei Peng, Yafei Sang, Shuhao Li, Yongzheng Zhang, Yujia Zhu:
Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic. CollaborateCom (2) 2022: 153-173 - [c107]Jingrun Ma, Yafei Sang, Yongzheng Zhang, Xiaolin Xu, Beibei Feng, Yuwei Zeng
:
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification. CollaborateCom (2) 2022: 214-230 - [c106]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Ruihai Ge, Yong Ding:
A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet. CollaborateCom (2) 2022: 419-436 - [c105]Ruihai Ge, Yongzheng Zhang, Chengxiang Si, Guoqiao Zhou, Wenchang Zhou:
MateGraph: Toward Mobile Malware Detection Through Traffic Behavior Graph. HPCC/DSS/SmartCity/DependSys 2022: 801-809 - [c104]Changbo Tian, Yongzheng Zhang, Tao Yin:
A Framework for Network Self-evolving Based on Distributed Swarm Intelligence. ICCS (1) 2022: 177-183 - [c103]Ruihai Ge
, Yongzheng Zhang
, Shuhao Li
, Guoqiao Zhou
, Guangze Zhao
:
Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network Traffic. ICCNS 2022: 23-29 - [c102]Ruihai Ge, Yongzheng Zhang, Shuhao Li, Guoqiao Zhou:
A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic. IJCNN 2022: 1-8 - [c101]Shuhe Liu, Xiaolin Xu, Yongzheng Zhang, Yipeng Wang:
Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network. IJCNN 2022: 1-8 - [c100]Qige Song, Yongzheng Zhang, Shuhao Li:
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison. SecureComm 2022: 192-211 - [c99]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. TrustCom 2022: 117-122 - [c98]Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen:
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model. SANER 2022: 1023-1033 - [i3]Qige Song, Yongzheng Zhang, Linshu Ouyang, Yige Chen:
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model. CoRR abs/2203.04472 (2022) - [i2]Qige Song, Yongzheng Zhang, Binglai Wang, Yige Chen:
Inter-BIN: Interaction-based Cross-architecture IoT Binary Similarity Comparison. CoRR abs/2206.00219 (2022) - [i1]Qige Song, Yongzheng Zhang, Shuhao Li:
Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison. CoRR abs/2206.12236 (2022) - 2021
- [j13]Yuwei Zeng
, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - [j12]Yu Zhang
, Yani Ge
, Peiran Yu
, Jianzhong Zhang, Yongzheng Zhang, Thar Baker
:
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems. IEEE Trans. Ind. Informatics 17(6): 4210-4218 (2021) - [c97]Yige Chen
, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang:
Mobile Encrypted Traffic Classification Based on Message Type Inference. CollaborateCom (1) 2021: 117-137 - [c96]Yige Chen
, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Peng Yang, Yipeng Wang:
Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. CollaborateCom (1) 2021: 348-367 - [c95]Changbo Tian, Yongzheng Zhang, Tao Yin:
Topology Self-optimization for Anti-tracking Network via Nodes Distributed Computing. CollaborateCom (1) 2021: 405-419 - [c94]Jisong Yang, Yafei Sang, Yongzheng Zhang, Peng Chang, Chengwei Peng:
Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network. CollaborateCom (1) 2021: 575-591 - [c93]Yige Chen
, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Linshu Ouyang, Peng Yang:
Incremental Learning for Mobile Encrypted Traffic Classification. ICC 2021: 1-6 - [c92]Jinbu Geng, Shuhao Li, Yongzheng Zhang, Zhicheng Liu, Zhenyu Cheng:
LIFH: Learning Interactive Features from HTTP Payload using Image Reconstruction. ICC 2021: 1-6 - [c91]Juncheng Guo, Yafei Sang, Peng Chang, Xiaolin Xu, Yongzheng Zhang:
MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features. ICCS (2) 2021: 195-208 - [c90]Ji Huan, Yongzheng Zhang, Peng Chang, Yupeng Tuo:
Detecting Unknown DGAs Using Distances Between Feature Vectors of Domain Names. ICT 2021: 1-7 - [c89]Linshu Ouyang, Yongzheng Zhang:
Phishing Web Page Detection with Semi-Supervised Deep Anomaly Detection. SecureComm (2) 2021: 384-393 - [c88]Qige Song, Yongzheng Zhang, Junliang Yao:
DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding. TrustCom 2021: 802-809 - [c87]Linshu Ouyang, Yongzheng Zhang:
Phishing Web Page Detection with HTML-Level Graph Neural Network. TrustCom 2021: 952-958 - [c86]Changbo Tian, Yongzheng Zhang, Tao Yin:
A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process. TrustCom 2021: 959-966 - 2020
- [j11]Jiang Xie
, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. Comput. Secur. 96: 101923 (2020) - [j10]Xiaochun Yun, Ji Huang
, Yipeng Wang
, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [c85]Hui Liu, Yongzheng Zhang, Yipeng Wang, Zheng Lin
, Yige Chen
:
Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text. AAAI 2020: 8384-8391 - [c84]Tianran Chen, Yongzheng Zhang, Yupeng Tuo, Weiguang Wang:
Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data. APWeb/WAIM (2) 2020: 376-390 - [c83]Tianran Chen, Yongzheng Zhang, Yupeng Tuo, Weiguang Wang:
CgNet: Predicting Urban Congregations from Spatio-Temporal Data Using Deep Neural Networks. GLOBECOM 2020: 1-7 - [c82]Yafei Sang, Mao Tian, Yongzheng Zhang, Peng Chang, Shuyuan Zhao:
IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification. ICA3PP (3) 2020: 494-508 - [c81]Binglai Wang, Yu Dou, Yafei Sang, Yongzheng Zhang, Ji Huang:
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware. ICC 2020: 1-7 - [c80]Kemeng Wu, Yongzheng Zhang, Tao Yin:
TDAE: Autoencoder-based Automatic Feature Learning Method for the Detection of DNS tunnel. ICC 2020: 1-7 - [c79]Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. ICCS (3) 2020: 282-296 - [c78]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng:
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. ICCS (3) 2020: 379-398 - [c77]Changbo Tian, Yongzheng Zhang, Tao Yin:
Modeling of Anti-tracking Network Based on Convex-Polytope Topology. ICCS (2) 2020: 425-438 - [c76]Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen
, Yipeng Wang:
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. ICT 2020: 1-5 - [c75]Linshu Ouyang, Yongzheng Zhang, Hui Liu, Yige Chen
, Yipeng Wang:
Gated POS-Level Language Model for Authorship Verification. IJCAI 2020: 4025-4031 - [c74]Linshu Ouyang, Yongzheng Zhang, Yipeng Wang:
Unified Graph Embedding-Based Anomalous Edge Detection. IJCNN 2020: 1-8 - [c73]Chen Zhao, Yongzheng Zhang, Yipeng Wang:
A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses. IJCNN 2020: 1-7 - [c72]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. ISCC 2020: 1-7 - [c71]Yafei Sang, Yan Xu, Yongzheng Zhang, Peng Chang, Shuyuan Zhao, Yijing Wang:
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic. ISPA/BDCloud/SocialCom/SustainCom 2020: 353-362 - [c70]Kemeng Wu, Yongzheng Zhang, Tao Yin:
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction. TrustCom 2020: 250-258 - [c69]Xiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang:
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model. TrustCom 2020: 927-934
2010 – 2019
- 2019
- [c68]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network. CollaborateCom 2019: 439-454 - [c67]Fei Du, Xiuguo Bao, Yongzheng Zhang, Huanhuan Yang:
GeoCET: Accurate IP Geolocation via Constraint-Based Elliptical Trajectories. CollaborateCom 2019: 603-622 - [c66]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
Achieving Dynamic Communication Path for Anti-Tracking Network. GLOBECOM 2019: 1-6 - [c65]Fei Du, Xiuguo Bao, Yongzheng Zhang:
FENet/IP: Uncovering the Fine-Grained Structure in IP Addresses. HPCC/SmartCity/DSS 2019: 921-928 - [c64]Yuwei Zeng
, Tianning Zang, Yongzheng Zhang, Xunxun Chen
, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c63]Yongzheng Zhang, Shuyuan Zhao, Yafei Sang:
Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering. ICCS (1) 2019: 309-322 - [c62]Yige Chen
, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. ICNP 2019: 1-11 - [c61]Yuwei Zeng
, Yongzheng Zhang, Tianning Zang, Xunxun Chen
, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c60]Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li:
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features. ICT 2019: 73-79 - [c59]Shuyuan Zhao, Yongzheng Zhang, Yafei Sang:
Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders. ICT 2019: 85-89 - [c58]Bowei Li, Yongzheng Zhang, Junliang Yao, Tao Yin:
MDBA: Detecting Malware based on Bytes N-Gram with Association Mining. ICT 2019: 227-232 - [c57]Kemeng Wu, Yongzheng Zhang, Tao Yin:
CLR: A Classification of DNS Tunnel Based on Logistic Regression. IPCCC 2019: 1 - [c56]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. IPCCC 2019: 1-8 - [c55]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network. SecureComm (1) 2019: 490-508 - [c54]Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. TrustCom/BigDataSE 2019: 136-143 - [c53]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. TrustCom/BigDataSE 2019: 232-239 - [c52]Jia Li, Xiaochun Yun, Mao Tian, Jiang Xie, Shuhao Li, Yongzheng Zhang, Yu Zhou:
A Method of HTTP Malicious Traffic Detection on Mobile Networks. WCNC 2019: 1-8 - 2018
- [j9]Miao Yu
, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. Secur. Commun. Networks 2018: 7024842:1-7024842:7 (2018) - [c51]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper). CollaborateCom 2018: 222-232 - [c50]Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). CollaborateCom 2018: 284-294 - [c49]Fei Du, Xiuguo Bao, Yongzheng Zhang, Yu Wang:
GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression. CollaborateCom 2018: 310-328 - [c48]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. CollaborateCom 2018: 329-345 - [c47]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. CollaborateCom 2018: 488-503 - [c46]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yongji Liu, Dahui Li:
Modeling for Traffic Replay in Virtual Network. HPCC/SmartCity/DSS 2018: 495-502 - [c45]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Community Discovery of Attribution Trace Based on Deep Learning Approach. ICICS 2018: 342-357 - [c44]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. ICICS 2018: 685-695 - [c43]Tianran Chen, Yongzheng Zhang, Yupeng Tuo, Weiguang Wang:
Online Discovery of Congregate Groups on Sparse Spatio-temporal Data. PIMRC 2018: 1-7 - 2017
- [j8]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - [j7]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Guangjun Wu:
A nonparametric approach to the automated protocol fingerprint inference. J. Netw. Comput. Appl. 99: 1-9 (2017) - [c42]Yafei Sang, Yongzheng Zhang, Chengwei Peng:
ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings. CollaborateCom 2017: 519-529 - [c41]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Mining Users' Important Locations and Semantics on Cellular Network Data. DSC 2017: 283-291 - [c40]Yafei Sang, Yongzheng Zhang:
Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding. ICPADS 2017: 266-275 - [c39]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c38]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches. NAS 2017: 1-10 - [c37]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
NSIM: A robust method to discover similar trajectories on cellular network location data. PIMRC 2017: 1-7 - [c36]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
MSTM: A novel map matching approach for low-sampling-rate trajectories. PIMRC 2017: 1-7 - [c35]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. TrustCom/BigDataSE/ICESS 2017: 225-232 - [c34]Shuyuan Zhao, Yongzheng Zhang, Peng Chang:
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics. TrustCom/BigDataSE/ICESS 2017: 323-330 - [c33]Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. TrustCom/BigDataSE/ICESS 2017: 339-346 - [c32]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. TrustCom/BigDataSE/ICESS 2017: 691-698 - 2016
- [j6]Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang:
Quantitative threat situation assessment based on alert verification. Secur. Commun. Networks 9(13): 2135-2142 (2016) - [j5]Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou
:
A Semantics-Aware Approach to the Automated Network Protocol Identification. IEEE/ACM Trans. Netw. 24(1): 583-595 (2016) - [c31]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yaqiong Peng, Xin Deng, Zhenxi Sun:
DMNS: A Framework to Dynamically Monitor Simulated Network. ICPADS 2016: 192-199 - [c30]Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. Trustcom/BigDataSE/ISPA 2016: 284-291 - [c29]Tao Yin, Yongzheng Zhang, Jia Li:
AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking. Trustcom/BigDataSE/ISPA 2016: 615-622 - [c28]Yanchen Qiao
, Xiaochun Yun, Yongzheng Zhang:
How to Automatically Identify the Homology of Different Malware. Trustcom/BigDataSE/ISPA 2016: 929-936 - [c27]Yanchen Qiao
, Xiaochun Yun, Yongzheng Zhang:
Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. Trustcom/BigDataSE/ISPA 2016: 937-944 - 2015
- [j4]Yu Zhou
, Xiaokang Yang, Yongzheng Zhang, Xiang Xu, Yipeng Wang, Xiujuan Chai, Weiyao Lin
:
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering. Neurocomputing 149: 1604-1612 (2015) - [j3]Xiao-chun Yun, Shuhao Li
, Yongzheng Zhang:
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 10(11): 2365-2380 (2015) - [c26]Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, Haiqiang Fei:
Traffic Replay in Virtual Network Based on IP-Mapping. ICA3PP (4) 2015: 697-713 - [c25]Yipeng Wang, Xiao-chun Yun, Yongzheng Zhang:
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. ICNP 2015: 134-144 - [c24]Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:
A Markov Random Field Approach to Automated Protocol Signature Inference. SecureComm 2015: 459-476 - 2014
- [c23]Yu Zhou, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin
:
Perspective Scene Text Recognition with Feature Compression and Ranking. ACCV Workshops (2) 2014: 181-195 - [c22]Yu Zhou
, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin
:
Text localization in natural scene images with stroke width histogram and superpixel. APSIPA 2014: 1-4 - [c21]Tao Yin, Yongzheng Zhang, Shuhao Li:
DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance. NAS 2014: 191-199 - [c20]Shuang Liu, Yu Zhou, Yongzheng Zhang, Yipeng Wang, Weiyao Lin
:
Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel. PCM 2014: 123-132 - [c19]Yafei Sang, Yongzheng Zhang, Yipeng Wang, Yu Zhou
, Xu Tao:
A Segmentation Pattern Based Approach to Automated Protocol Identification. PDCAT 2014: 7-12 - [c18]Lulu Zhang, Yongzheng Zhang, Tianning Zang:
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. SecureComm (1) 2014: 454-462 - [c17]Yu Zhou
, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin
:
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. TrustCom 2014: 189-196 - 2013
- [c16]Qingxin Zou, Zhiyu Hao, Xu Cui, Xiao-chun Yun, Yongzheng Zhang:
Counting sort for the live migration of virtual machines. CLUSTER 2013: 1-5 - [c15]Ying Zhang, Yongzheng Zhang, Jun Xiao:
Detecting the DGA-Based Malicious Domain Names. ISCTCS 2013: 130-137 - [c14]Zhenquan Ding, Zhiyu Hao, Yongzheng Zhang:
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization. PDCAT 2013: 111-116 - 2012
- [c13]Yong Wang, Xiao-chun Yun, Yongzheng Zhang, Shuyuan Jin, Yanchen Qiao:
Research of Network Vulnerability Analysis Based on Attack Capability Transfer. CIT 2012: 38-44 - [c12]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao
, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c11]Yongzheng Zhang, Xiaochun Yun:
Modeling of Hierarchical Index System for Network Operation Security. ISCTCS 2012: 580-590 - [c10]Shicong Li, Xiao-chun Yun, Yongzheng Zhang, Jun Xiao, Yipeng Wang:
A General Framework of Trojan Communication Detection Based on Network Traces. NAS 2012: 49-58 - [c9]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [j2]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Parallelizing weighted frequency counting in high-speed network monitoring. Comput. Commun. 34(4): 536-547 (2011) - [c8]Rongrong Xi, Xiao-chun Yun, Shuyuan Jin, Yongzheng Zhang:
Network Threat Assessment Based on Alert Verification. PDCAT 2011: 30-34 - [c7]Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. TrustCom 2011: 482-487 - 2010
- [j1]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Identifying heavy hitters in high-speed network monitoring. Sci. China Inf. Sci. 53(3): 659-676 (2010) - [c6]Tianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang, Chaoguang Men:
Cooperative Work Systems for the Security of Digital Computing Infrastructure. ICPADS 2010: 676-681
2000 – 2009
- 2008
- [c5]Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. ISCC 2008: 332-339 - [c4]Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481 - 2005
- [c3]Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420 - [c2]Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:
Computer Vulnerability Evaluation Using Fault Tree Analysis. ISPEC 2005: 302-313 - 2004
- [c1]Yongzheng Zhang, Xiao-chun Yun:
A New Vulnerability Taxonomy Based on Privilege Escalation. ICEIS (3) 2004: 596-600
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-28 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint