Erzhou Zhu
Orcid: 0000-0003-4965-6679
According to our database1,
Erzhou Zhu
authored at least 41 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features.
Comput. Secur., January, 2024
2023
CCBLA: a Lightweight Phishing Detection Model Based on CNN, BiLSTM, and Attention Mechanism.
Cogn. Comput., 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest.
IEEE Trans. Netw. Serv. Manag., December, 2022
DH-Kmeans: An Improved K-means Clustering Algorithm based on Dynamic Initial Cluster Center Determination and Hierarchical Clustering.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2020
DTOF-ANN: An Artificial Neural Network phishing detection model based on Decision Tree and Optimal Features.
Appl. Soft Comput., 2020
2019
A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows.
IEEE Trans. Serv. Comput., 2019
Fast and stable clustering analysis based on Grid-mapping K-means algorithm and new clustering validity index.
Neurocomputing, 2019
Implementation of an effective dynamic concolic execution framework for analyzing binary programs.
Comput. Secur., 2019
OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network.
IEEE Access, 2019
Proceedings of the Advances in Swarm Intelligence - 10th International Conference, 2019
TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
An effective partitional clustering algorithm based on new clustering validity index.
Appl. Soft Comput., 2018
Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Effective Phishing Website Detection Based on Improved BP Neural Network and Dual Feature Evaluation.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Secure and Efficient Collaborative Auction Scheme for Spectrum Resource Reallocation.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018
2017
Study of an Improved Genetic Algorithm for Multiple Paths Automatic Software Test Case Generation.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
2016
A Dynamic Pricing Reverse Auction-Based Resource Allocation Mechanism in Cloud Workflow Systems.
Sci. Program., 2016
基于MapReduce的新型微博用户影响力排名算法研究 (Research on Novel Ranking Algorithm of Microblog User's Influence Based on MapReduce).
计算机科学, 2016
Int. J. Artif. Intell. Tools, 2016
Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs.
Comput. Secur., 2015
Study of a Secret Information Transmission Scheme Based on Invisible ASCII Characters.
Proceedings of the Advances in Swarm and Computational Intelligence, 2015
An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems.
Proceedings of the Asia Pacific Business Process Management, 2015
2014
DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs.
J. Softw., 2014
Constructing a Hybrid Taint Analysis Framework for Diagnosing Attacks on Binary Programs.
J. Comput., 2014
Comput. Electr. Eng., 2014
2013
J. Inf. Sci. Eng., 2013
J. Comput., 2013
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013
2012
J. Syst. Archit., 2012
2011
A Translation Framework for Executing the Sequential Binary Code on CPU/GPU Based Architectures.
J. Softw., 2011
A Dynamic-Static Combined Code Layout Reorganization Approach for Dynamic Binary Translation.
J. Softw., 2011
J. Comput. Sci. Technol., 2011
Comput. Sci. Inf. Syst., 2011
2010
Proceedings of the Third International Symposium on Parallel Architectures, 2010