Ruyun Zhang

Orcid: 0000-0002-2969-817X

According to our database1, Ruyun Zhang authored at least 23 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture.
Comput. Secur., 2024

CollaSFC: An Intelligent Collaborative Approach for In-network SFC Failure Detection in Data Center for AI Computing.
Proceedings of the 2024 SIGCOMM Workshop on Networks for AI Computing, 2024

2023
Mangling Rules Generation With Density-Based Clustering for Password Guessing.
IEEE Trans. Dependable Secur. Comput., 2023

Fast DDoS Traffic Throttling and Normal Traffic Permitting in SDN-IoT: A Deep Reinforcement Learning Approach.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Boosting training for PDF malware classifier via active learning.
Int. J. Intell. Syst., 2022

An Efficient Soft Analytical Side-Channel Attack on Ascon.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Precise Code Clone Detection with Architecture of Abstract Syntax Trees.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Multi-Agent and Cooperative Deep Reinforcement Learning for Scalable Network Automation in Multi-Domain SD-EONs.
IEEE Trans. Netw. Serv. Manag., 2021

Hybrid sequence-based Android malware detection using natural language processing.
Int. J. Intell. Syst., 2021

Analyzing host security using D-S evidence theory and multisource information fusion.
Int. J. Intell. Syst., 2021

A mimicry defense based algorithm diversification dynamic scheduling mechanism.
Proceedings of the 2021 International Conference on Security, 2021

Value Iteration Algorithm for Nonlinear Continuous-time Nonzero-Sum Games.
Proceedings of the 2021 International Conference on Security, 2021

Optimal design of hybrid renewable energy system considering equipment performance and annual cost.
Proceedings of the 2021 International Conference on Security, 2021

Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue Architecture.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

A Classic Multi-method Collaborative Obfuscation Strategy.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Preliminary Study of Secure-Enhanced Coherent Optical Orthogonal Frequency Division Multiplexing System Based on DNA Encoding.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
A Real-Time Audio and Video Streaming Transmission Scheme for Social Media.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Intelligent File Transfer Optimization for Poor Network Conditions.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

An Adaptive Data Protection Scheme for Optimizing Storage Space.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2018
Location Analysis of Regional Disaster Relief Material Reserve Center: A Case Study in Sichuan Province, China.
Proceedings of the 2018 IEEE International Conference on Industrial Engineering and Engineering Management, 2018

2004
PeerPressure for automatic troubleshooting.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Automatic Misconfiguration Troubleshooting with PeerPressure.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004


  Loading...