Hongsong Zhu
Orcid: 0000-0003-3720-7403
According to our database1,
Hongsong Zhu
authored at least 121 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
RIETD: A Reputation Incentive Scheme Facilitates Personalized Edge Tampering Detection.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
Multi-granularity cross-modal representation learning for named entity recognition on social media.
Inf. Process. Manag., January, 2024
CoRR, 2024
Comput. Secur., 2024
Comput. Secur., 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
A Relation-Aware Heterogeneous Graph Transformer on Dynamic Fusion for Multimodal Classification Tasks.
Proceedings of the IEEE International Conference on Acoustics, 2024
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Fog-Enabled Intrusion Detection Method Integrating Bi-LSTM and Multi-Head Self-Attention for IoT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
J. Inf. Sci. Eng., November, 2023
Owner name entity recognition in websites based on heterogeneous and dynamic graph transformer.
Knowl. Inf. Syst., October, 2023
Owner name entity recognition in websites based on multiscale features and multimodal co-attention.
Expert Syst. Appl., August, 2023
Blockchain-enhanced trust management for mobile edge computing-enabled intelligent vehicular collaboration in the 6G era.
Trans. Emerg. Telecommun. Technol., July, 2023
Internet-Scale Fingerprinting the Reusing and Rebranding IoT Devices in the Cyberspace.
IEEE Trans. Dependable Secur. Comput., 2023
Multiview Embedding with Partial Labels to Recognize Users of Devices Based on Unified Transformer.
Int. J. Intell. Syst., 2023
A Novel Framework for Multimodal Named Entity Recognition with Multi-level Alignments.
CoRR, 2023
Comput. Secur., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
DeviceGPT: A Generative Pre-Training Transformer on the Heterogenous Graph for Internet of Things.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023
LibDI: A Direction Identification Framework for Detecting Complex Reuse Relationships in Binaries.
Proceedings of the IEEE Military Communications Conference, 2023
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Mining Implicit Behavioral Patterns via Attention Networks for Sequential Recommendation.
Proceedings of the International Neural Network Society Workshop on Deep Learning Innovations and Applications, 2023
User Recognition of Devices on the Internet based on Heterogeneous Graph Transformer with Partial Labels.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Improving the Modality Representation with multi-view Contrastive Learning for Multimodal Sentiment Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the Database Systems for Advanced Applications. DASFAA 2023 International Workshops, 2023
SynCPFL: Synthetic Distribution Aware Clustered Framework for Personalized Federated Learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques.
CoRR, 2022
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks.
Comput. Ind., 2022
Joint Classification of IoT Devices and Relations in the Internet with Network Traffic.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching.
Proceedings of the IEEE Smartworld, 2022
Detection and Incentive: A Tampering Detection Mechanism for Object Detection in Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022
An Evolutionary Learning Approach Towards the Open Challenge of IoT Device Identification.
Proceedings of the Security and Privacy in Communication Networks, 2022
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE International Performance, 2022
Multi-features based Semantic Augmentation Networks for Named Entity Recognition in Threat Intelligence.
Proceedings of the 26th International Conference on Pattern Recognition, 2022
ProsegDL: Binary Protocol Format Extraction by Deep Learning-based Field Boundary Identification.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022
Proceedings of the IEEE International Conference on Communications, 2022
A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022
2021
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
Cybersecur., 2021
Finding Taint-Style Vulnerabilities in Linux-based Embedded Firmware with SSE-based Alias Analysis.
CoRR, 2021
SEIGuard: An Authentication-simplified and Deceptive Scheme to Protect Server-side Social Engineering Information Against Brute-force Attacks.
CoRR, 2021
Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods.
IEEE Access, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Science of Cyber Security - Third International Conference, 2021
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021
Asteria: Deep Learning-based AST-Encoding for Cross-platform Binary Code Similarity Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
ICS3Fuzzer: A Framework for Discovering Protocol Implementation Bugs in ICS Supervisory Software by Fuzzing.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Wireless Sensor Networks - 14th China Conference, 2020
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
2019
Cybersecur., 2019
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.
Proceedings of the 28th USENIX Security Symposium, 2019
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow Interaction.
IEEE Access, 2018
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
2017
Sensors, 2017
2016
Neurocomputing, 2016
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks.
IEEE Trans. Veh. Technol., 2015
IEEE Trans. Mob. Comput., 2015
Int. J. Distributed Sens. Networks, 2015
IEEE Commun. Mag., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Evolutionary Game Theoretic Modeling and Repetition of Media Distributed Shared in P2P-Based VANET.
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014
Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013
Mo-Fi: Discovering Human Presence Activity with Smartphones Using Non-intrusive Wi-Fi Sniffers.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Mo-Fi: Discovering Human Presence Activity with Smartphones using Non-intrusive Wi-Fi Monitors.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
2011
Nonidentical Linear Pulse-Coupled Oscillators Model With Application to Time Synchronization in Wireless Sensor Networks.
IEEE Trans. Ind. Electron., 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
Proceedings of the 9th International Conference on Mobile Systems, 2011
RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
2010
Linear Pulse-Coupled Oscillators Model¬ - A New Approach for Time Synchronization in Wireless Sensor Networks.
Wirel. Sens. Netw., 2010
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010
2008
J. Signal Process. Syst., 2008
2006
Proceedings of the Grid and Cooperative Computing Workshops, 2006
2005
Proceedings of the Advances in Intelligent Computing, 2005
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005