Hongsong Zhu

Orcid: 0000-0003-3720-7403

According to our database1, Hongsong Zhu authored at least 122 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FeaShare: Feature Sharing for Computation Correctness in Edge Preprocessing.
IEEE Trans. Mob. Comput., December, 2024

RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection.
IEEE Internet Things J., April, 2024

Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms.
IEEE Internet Things J., April, 2024

LibAM: An Area Matching Framework for Detecting Third-Party Libraries in Binaries.
ACM Trans. Softw. Eng. Methodol., February, 2024

Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024

When LLMs Meet Cybersecurity: A Systematic Literature Review.
CoRR, 2024

Hybrid Multi-stage Decoding for Few-shot NER with Entity-aware Contrastive Learning.
CoRR, 2024

KnowCTI: Knowledge-based cyber threat intelligence entity and relation extraction.
Comput. Secur., 2024

VDTriplet: Vulnerability detection with graph semantics using triplet model.
Comput. Secur., 2024

Lexicon Graph Adapter Based BERT Model for Chinese Named Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Enhancing Coverage in Stateful Protocol Fuzzing via Value-Based Selection.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024

Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

PG-AID: An Anomaly-based Intrusion Detection Method Using Provenance Graph.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

An Efficient Vehicular Intrusion Detection Method Based on Edge Intelligence.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Hierarchical Aligned Multimodal Learning for NER on Tweet Posts.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Intelligent Connected Vehicle Security: Threats, Attacks and Defenses.
J. Inf. Sci. Eng., November, 2023

Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023

Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023

Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.
Trans. Emerg. Telecommun. Technol., July, 2023

Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023

Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023

A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023

CL-GAN: A GAN-based continual learning model for generating and detecting AGDs.
Comput. Secur., 2023

HackMentor: Fine-Tuning Large Language Models for Cybersecurity.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Software Vulnerability Detection Using an Enhanced Generalization Strategy.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023

LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023

Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation.
Proceedings of the International Neural Network Society Workshop on Deep Learning Innovations and Applications, 2023

User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises.
Proceedings of the International Joint Conference on Neural Networks, 2023

Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023

CSEDesc: CyberSecurity Event Detection with Event Description.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

ip2text: A Reasoning-Aware Dataset for Text Generation of Devices on the Internet.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023

SynCPFL: Synthetic Distribution Aware Clustered Framework for Personalized Federated Learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Privacy-Preserving Online Deep Learning Algorithm Based on Differential Privacy.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques.
CoRR, 2022

An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022

Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Discover the ICS Landmarks Based on Multi-stage Clue Mining.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching.
Proceedings of the IEEE Smartworld, 2022

Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SIFOL: Solving Implicit Flows in Loops for Concolic Execution.
Proceedings of the IEEE International Performance, 2022

Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Finding Vulnerabilities in Internal-binary of Firmware with Clues.
Proceedings of the IEEE International Conference on Communications, 2022

A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Enhancing Chinese Pre-trained Language Model via Heterogeneous Linguistics Graph.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
Cybersecur., 2021

Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021

SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks.
CoRR, 2021

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods.
IEEE Access, 2021

FIUD: A Framework to Identify Users of Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Robust IoT Device Identification Method with Unknown Traffic Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Detecting Internet-Scale Surveillance Devices Using RTSP Recessive Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Maximal Clique Based Non-Autoregressive Open Information Extraction.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Discontinuous Named Entity Recognition as Maximal Clique Discovery.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
XLBoost-Geo: An IP Geolocation System Based on Extreme Landmark Boosting.
CoRR, 2020

Defining Social Engineering in Cybersecurity.
IEEE Access, 2020

EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Malware Classification Using Attention-Based Transductive Learning Network.
Proceedings of the Security and Privacy in Communication Networks, 2020

The Mining of IP Landmarks for Internet Webcams.
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020

TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
Towards IP geolocation with intermediate routers based on topology discovery.
Cybersecur., 2019

IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Side-Channel Information Leakage of Traffic Data in Instant Messaging.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Remote Fingerprinting on Internet-Wide Printers Based on Neural Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow Interaction.
IEEE Access, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.
Sensors, 2017

2016
Learning multi-channel correlation filter bank for eye localization.
Neurocomputing, 2016

A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Active Profiling of Physical Devices at Internet Scale.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Identification of visible industrial control devices at Internet scale.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015

ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks.
IEEE Trans. Mob. Comput., 2015

B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol).
计算机科学, 2015

A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2015

Security and privacy in localization for underwater sensor networks.
IEEE Commun. Mag., 2015

k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Vehicle Anomaly Detection Based on Trajectory Data of ANPR System.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Evolutionary Game Theoretic Modeling and Repetition of Media Distributed Shared in P2P-Based VANET.
Int. J. Distributed Sens. Networks, 2014

Optimization of Sampling Cell Size for Fingerprint Positioning.
Int. J. Distributed Sens. Networks, 2014

LARES: latency-reduced neighbour discovery for contagious diseases prevention.
Int. J. Ad Hoc Ubiquitous Comput., 2014

VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

2013
Distributed Middleware of Large-Scale Wireless Networks.
Int. J. Distributed Sens. Networks, 2013

The RSU Access Problem Based on Evolutionary Game Theory for VANET.
Int. J. Distributed Sens. Networks, 2013

Efficient Deterministic Anchor Deployment for Sensor Network Positioning.
Int. J. Distributed Sens. Networks, 2013

A decentralized adaptive TDMA scheduling strategy for VANET.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

Mo-Fi: Discovering Human Presence Activity with Smartphones Using Non-intrusive Wi-Fi Sniffers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Mo-Fi: Discovering Human Presence Activity with Smartphones using Non-intrusive Wi-Fi Monitors.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
An energy-efficient link quality monitoring scheme for wireless networks.
Wirel. Commun. Mob. Comput., 2012

Exploiting ephemeral link correlation for mobile wireless networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Application of Internet of Things in Power-Line Monitoring.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
Nonidentical Linear Pulse-Coupled Oscillators Model With Application to Time Synchronization in Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2011

Demo: a sensor network time synchronization protocol based on fm radio data system.
Proceedings of the 9th International Conference on Mobile Systems, 2011

Exploiting FM radio data system for adaptive clock calibration in sensor networks.
Proceedings of the 9th International Conference on Mobile Systems, 2011

RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Linear Pulse-Coupled Oscillators Model¬ - A New Approach for Time Synchronization in Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

A mobility model based on traffic flow theory for Vehicular Delay Tolerant Network.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2008
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN.
J. Signal Process. Syst., 2008

2006
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

2005
A Self-adaptive Energy-Aware Data Gathering Mechanism for Wireless Sensor Networks.
Proceedings of the Advances in Intelligent Computing, 2005

Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...