Ping Zhang

Orcid: 0000-0001-5064-2624

Affiliations:
  • State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China


According to our database1, Ping Zhang authored at least 19 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity.
Inf. Softw. Technol., 2021

2020
A Survey of Exploitation Techniques and Defenses for Program Data Attacks.
J. Netw. Comput. Appl., 2020

Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks.
Comput. Secur., 2020

Reverse Engineering of Intel Microcode Update Structure.
IEEE Access, 2020

Unpaired Domain Transfer for Data Augment in Face Recognition.
IEEE Access, 2020

PA-GAN: A Patch-Attention Based Aggregation Network for Face Recognition in Surveillance.
IEEE Access, 2020

Refined CNNs for Face Recognition Applications on Embedded Devices.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

An Information Intelligent Search Method for Computer Forensics Based on Text Similarity.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

Efficient Cache Strategy for Face Recognition System.
Proceedings of the ICBDC 2020: 5th International Conference on Big Data and Computing, 2020

2019
DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton.
Comput. Secur., 2019

A Firmware Code Gene Extraction Technology for IoT Terminal.
IEEE Access, 2019

DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software.
IEEE Access, 2019

Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications.
IEEE Access, 2019

LEFV: A Lightweight and Efficient System for Face Verification with Deep Convolution Neural Networks.
Proceedings of the ICVIP 2019: The 3rd International Conference on Video and Image Processing, 2019

Malware Detection Method based on Control Flow Analysis.
Proceedings of the ICIT 2019, 2019

Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Defending Non-control-data Attacks using Influence Domain Monitoring.
KSII Trans. Internet Inf. Syst., 2018

Logical acquisition method based on data migration for Android mobile devices.
Digit. Investig., 2018

2015
一种基于完整性保护的终端计算机安全防护方法 (Integrity Based Security Protection Method for Terminal Computer).
计算机科学, 2015


  Loading...