Deqing Zou
Orcid: 0000-0001-8534-5048
According to our database1,
Deqing Zou
authored at least 230 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024
IEEE Trans. Netw. Serv. Manag., August, 2024
IEEE Trans. Reliab., June, 2024
IEEE Trans. Netw. Serv. Manag., June, 2024
IEEE Trans. Reliab., March, 2024
IEEE Trans. Computers, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
J. Netw. Comput. Appl., 2024
DT-Block: Adaptive vertical federated reinforcement learning scheme for secure and efficient communication in 6G.
Comput. Networks, 2024
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
UniEmbedding: Learning Universal Multi-Modal Multi-Domain Item Embeddings via User-View Contrastive Learning.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Comput. Secur., December, 2023
IEEE Trans. Software Eng., September, 2023
J. Comput. Sci. Technol., April, 2023
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G.
Future Gener. Comput. Syst., April, 2023
An Efficient Cryptographic Scheme for Securing Time-Sensitive Microgrid Communications Under Key Leakage and Dishonest Insiders.
IEEE Trans. Smart Grid, March, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
ACM Trans. Web, 2022
IEEE Trans. Software Eng., 2022
Differentially Private Tripartite Intelligent Matching Against Inference Attacks in Ride-Sharing Services.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
A Fuzzing-Based Method for Testing Rules in Intrusion Detection Systems in 6G Networks.
IEEE Netw., 2022
J. Circuits Syst. Comput., 2022
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.
IEEE Internet Things J., 2022
Effective network intrusion detection via representation learning: A Denoising AutoEncoder approach.
Comput. Commun., 2022
SAND: semi-automated adaptive network defense via programmable rule generation and deployment.
Sci. China Inf. Sci., 2022
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Interpreting Deep Learning-based Vulnerability Detector Predictions Based on Heuristic Searching.
ACM Trans. Softw. Eng. Methodol., 2021
ACM Trans. Softw. Eng. Methodol., 2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Deployment of Robust Security Scheme in SDN Based 5G Network over NFV Enabled Cloud Environment.
IEEE Trans. Emerg. Top. Comput., 2021
$\mu$μVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection.
IEEE Trans. Dependable Secur. Comput., 2021
DSEOM: A Framework for Dynamic Security Evaluation and Optimization of MTD in Container-Based Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Cloud Comput., 2021
J. Parallel Distributed Comput., 2021
Frontiers Comput. Sci., 2021
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Exploring New Opportunities to Defeat Low-Rate DDoS Attack in Container-Based Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2020
Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Inf. Forensics Secur., 2020
J. Netw. Comput. Appl., 2020
Secure Data Transportation With Software-Defined Networking and k-n Secret Sharing for High-Confidence IoT Services.
IEEE Internet Things J., 2020
HostWatcher: Protecting hosts in cloud data centers through software-defined networking.
Future Gener. Comput. Syst., 2020
CoRR, 2020
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
Proceedings of the Green, Pervasive, and Cloud Computing - 15th International Conference, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
IEEE Trans. Serv. Comput., 2019
A domain-divided configurable security model for cloud computing-based telecommunication services.
J. Supercomput., 2019
A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment.
IEEE Trans. Big Data, 2019
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019
IEEE Access, 2019
IEEE Access, 2019
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process.
Proceedings of the Green, Pervasive, and Cloud Computing - 14th International Conference, 2019
2018
Dataset, November, 2018
A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
J. Supercomput., 2018
Secur. Commun. Networks, 2018
IEEE Internet Things J., 2018
Int. J. Parallel Program., 2018
CoRR, 2018
IEEE Access, 2018
Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network.
IEEE Access, 2018
IEEE Access, 2018
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation.
IEEE Access, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Efficient privacy-preserving motion detection for HEVC compressed video in cloud video surveillance.
Proceedings of the IEEE INFOCOM 2018, 2018
Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Cloud Comput., 2017
Int. J. Auton. Adapt. Commun. Syst., 2017
IEEE Access, 2017
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017
Reducing LDPC Soft Sensing Latency by Lightweight Data Refresh for Flash Read Performance Improvement.
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IEEE Trans. Parallel Distributed Syst., 2016
IEEE Trans. Emerg. Top. Comput., 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
计算机科学, 2016
J. Comput. Sci. Technol., 2016
PerfDoc: Automatic Performance Bug Diagnosis in Production Cloud Computing Infrastructures.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Robust scheme to protect authentication code of message/image documents in cloud computing.
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Towards Efficient Authentication Scheme with Biometric Key Management in Cloud Environment.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
An Efficient Public Verifiability and Data Integrity Using Multiple TPAs in Cloud Data Storage.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
VulPecker: an automated vulnerability detection system based on code similarity analysis.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
A privacy-preserving location tracking system for smartphones based on cloud storage.
Secur. Commun. Networks, 2015
Future Gener. Comput. Syst., 2015
Concurr. Comput. Pract. Exp., 2015
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Evaluating Latency-Sensitive Applications: Performance Degradation in Datacenters with Restricted Power Budget.
Proceedings of the 44th International Conference on Parallel Processing, 2015
CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems.
Proceedings of the 25. International Conference on Electronics, 2015
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015
Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015
2014
J. Supercomput., 2014
Secur. Commun. Networks, 2014
Developing resource consolidation frameworks for moldable virtual machines in clouds.
Future Gener. Comput. Syst., 2014
Comput. J., 2014
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Network and Parallel Computing, 2014
StrongUpdate: An Immediate Dynamic Software Update System for Multi-threaded Applications.
Proceedings of the Human Centered Computing - First International Conference, 2014
Proceedings of the International C* Conference on Computer Science & Software Engineering, 2014
2013
J. Supercomput., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
IET Inf. Secur., 2013
Future Gener. Comput. Syst., 2013
Comput. Math. Appl., 2013
2012
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas.
Secur. Commun. Networks, 2012
J. Netw. Comput. Appl., 2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
2011
J. Supercomput., 2011
Proceedings of the 12th IEEE/ACM International Conference on Grid Computing, 2011
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
Future Gener. Comput. Syst., 2010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurr. Comput. Pract. Exp., 2010
Comput. Math. Appl., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
SHelp: Automatic Self-Healing for Multiple Application Instances in a Virtual Machine Environment.
Proceedings of the 2010 IEEE International Conference on Cluster Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
CRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment.
J. Netw. Comput. Appl., 2009
SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009
Proceedings of the Systems and Virtualization Management. Standards and the Cloud, 2009
VMFence: a customized intrusion prevention system in distributed virtual computing environment.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
DVM-MAC: A Mandatory Access Control System in Distributed Virtual Computing Environment.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009
Proceedings of the Advances in Computer Science, 2009
2008
IET Commun., 2008
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008
A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of ICEBE 2007, 2007
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
A Digital Signature Mechanism and Authentication Scheme for Group Communication in Grid.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
An Authentication and Access Control Framework for Group Communication Systems in Grid Environment.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Computational Science, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Int. J. Web Grid Serv., 2005
Int. J. Grid Util. Comput., 2005
Int. J. Grid Util. Comput., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Computer and Information Sciences, 2005
Aeneas: Real-Time Performance Evaluation Approach for Distributed Programs with Reliability-Constrains.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the Advanced Web Technologies and Applications, 2004
2003
Proceedings of the Intelligent Data Engineering and Automated Learning, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003