Bing Zhang
Orcid: 0000-0002-9867-8439Affiliations:
- Yanshan University, College of Information Science and Engineering, Qinhuangdao, China (PhD 2018)
According to our database1,
Bing Zhang
authored at least 26 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective.
ACM Comput. Surv., August, 2024
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections.
IEEE Trans. Software Eng., July, 2024
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm.
Int. J. Softw. Eng. Knowl. Eng., July, 2024
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network.
Expert Syst. Appl., 2024
2023
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation.
Int. J. Softw. Eng. Knowl. Eng., September, 2023
A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network.
Inf. Softw. Technol., August, 2023
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network.
Comput. Secur., March, 2023
J. Intell. Fuzzy Syst., 2023
Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks.
Comput. Commun., 2023
An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
Biomed. Signal Process. Control., 2023
2022
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning.
Int. J. Softw. Eng. Knowl. Eng., 2022
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine.
Int. J. Softw. Eng. Knowl. Eng., 2022
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review.
ACM Comput. Surv., 2022
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm.
Comput. Secur., 2022
Proceedings of the Web Information Systems and Applications, 2022
2021
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel.
J. Netw. Comput. Appl., 2021
Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns.
Int. J. Softw. Eng. Knowl. Eng., 2020
2019
BMC Bioinform., 2019
Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm.
IEEE Access, 2019
Modeling Air Pollution Transmission Behavior as Complex Network and Mining Key Monitoring Station.
IEEE Access, 2019
2018
Secur. Commun. Networks, 2018
An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees.
IEEE Access, 2018
IEEE Access, 2018
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network.
IEEE Access, 2018
2017
IET Softw., 2017