Ming Zhong

Orcid: 0000-0002-9132-3782

Affiliations:
  • Zhejiang Normal University, College of Mathematics and Computer Science, Jinhua, China
  • Zhejiang University, College of Computer Science and Technology, Hangzhou, China


According to our database1, Ming Zhong authored at least 14 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Modeling and analysis of cascading failures in multilayer higher-order networks.
Reliab. Eng. Syst. Saf., 2025

Robustness of multilayer interdependent higher-order network.
J. Netw. Comput. Appl., 2025

2024
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting.
IEEE Trans. Dependable Secur. Comput., 2024

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024

Cascading failures on interdependent hypergraph.
Commun. Nonlinear Sci. Numer. Simul., 2024

2023
Efficient text-based evolution algorithm to hard-label adversarial attacks on text.
J. King Saud Univ. Comput. Inf. Sci., May, 2023

Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023

2022
Disintegrate hypergraph networks by attacking hyperedge.
J. King Saud Univ. Comput. Inf. Sci., 2022

Percolation on simplicial complexes.
Appl. Math. Comput., 2022

EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
Sequential Model Based Intrusion Detection System for IoT Servers Using Deep Learning Methods.
Sensors, 2021

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network.
Secur. Commun. Networks, 2021

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021


  Loading...