Jia Zhang

Orcid: 0000-0001-7896-3382

Affiliations:
  • Tsinghua University, Beijing National Research Center for Information Science and Technology, Department of Computer Science and Technology, China


According to our database1, Jia Zhang authored at least 36 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LordNet: An efficient neural network for learning to solve parametric partial differential equations without simulated data.
Neural Networks, 2024

Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Proceedings of the 33rd USENIX Security Symposium, 2024

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Long-Short-Range Message-Passing: A Physics-Informed Framework to Capture Non-Local Interaction for Scalable Molecular Dynamics Simulation.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

2023
NeuralStagger: Accelerating Physics-constrained Neural PDE Solver with Spatial-temporal Decomposition.
Proceedings of the International Conference on Machine Learning, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Stolen Risks of Models with Security Properties.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Learning Physics-Informed Neural Networks without Stacked Back-propagation.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

2022
LordNet: Learning to Solve Parametric Partial Differential Equations without Simulated Data.
CoRR, 2022

Dynamic Relation Discovery and Utilization in Multi-Entity Time Series Forecasting.
CoRR, 2022

AF<sub>2</sub>: Adaptive Focus Framework for Aerial Imagery Segmentation.
CoRR, 2022

Encrypted Malware Traffic Detection via Graph-based Network Analysis.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G.
Proceedings of the IEEE Global Communications Conference, 2021

Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

Cooperative Policy Learning with Pre-trained Heterogeneous Observation Representations.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021

2020
COSEA: Convolutional Code Search with Layer-wise Attention.
CoRR, 2020

CDN Judo: Breaking the CDN DoS Protection with Itself.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

CDN Backfired: Amplification Attacks Based on HTTP Range Requests.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Light Multi-Segment Activation for Model Compression.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Finding the best answer: measuring the optimization of public and authoritative DNS.
Sci. China Inf. Sci., 2019

DeepGBM: A Deep Learning Framework Distilled by GBDT for Online Prediction Tasks.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
Measuring Privacy Threats in China-Wide Mobile Networks.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Analysis and Measurement of Zone Dependency in the Domain Name System.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Randomized Mechanisms for Selling Reserved Instances in Cloud Computing.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Randomized Mechanisms for Selling Reserved Instances in Cloud.
CoRR, 2016

2011
Anonymity analysis of P2P anonymous communication systems.
Comput. Commun., 2011

2010
Analysis of Anonymity in P2P Anonymous Communication Systems.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network.
IEICE Trans. Commun., 2009

2008
AMCAS: An Automatic Malicious Code Analysis System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...