Xiangzhan Yu

Orcid: 0000-0002-1183-2844

According to our database1, Xiangzhan Yu authored at least 83 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ASOD: an adaptive stream outlier detection method using online strategy.
J. Cloud Comput., December, 2024

pFind: Privacy-preserving lost object finding in vehicular crowdsensing.
World Wide Web (WWW), September, 2024

An effective deep learning adversarial defense method based on spatial structural constraints in embedding space.
Pattern Recognit. Lett., 2024

QDA-SQL: Questions Enhanced Dialogue Augmentation for Multi-Turn Text-to-SQL.
CoRR, 2024

HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection.
Comput. Secur., 2024

2023
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning.
IEEE Trans. Computers, November, 2023

Global Wasserstein Margin maximization for boosting generalization in adversarial training.
Appl. Intell., May, 2023

Higher-Order Community Detection: On Information Degeneration and Its Elimination.
IEEE/ACM Trans. Netw., April, 2023

ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis.
IEEE Trans. Software Eng., February, 2023

Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation.
IEEE Trans. Serv. Comput., 2023

APFed: Anti-Poisoning Attacks in Privacy-Preserving Heterogeneous Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services.
IEEE Trans. Dependable Secur. Comput., 2023

Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems.
IEEE Internet Things J., 2023

BEATs: Audio Pre-Training with Acoustic Tokenizers.
Proceedings of the International Conference on Machine Learning, 2023

2022
WavLM: Large-Scale Self-Supervised Pre-Training for Full Stack Speech Processing.
IEEE J. Sel. Top. Signal Process., 2022

Graph clustering using triangle-aware measures in large networks.
Inf. Sci., 2022

Why does Self-Supervised Learning for Speech Recognition Benefit Speaker Recognition?
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

ENiD: An Encrypted Web Pages Traffic Identification Based on Web Visiting Behavior.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

Unispeech-Sat: Universal Speech Representation Learning With Speaker Aware Pre-Training.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
A New Approach Customizable Distributed Network Service Discovery System.
Wirel. Commun. Mob. Comput., 2021

PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Nowhere to Hide: A Novel Private Protocol Identification Algorithm.
Secur. Commun. Networks, 2021

PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services.
IEEE Internet Things J., 2021

Robot Communication: Network Traffic Classification Based on Deep Neural Network.
Frontiers Neurorobotics, 2021

Overlapping community detection by constrained personalized PageRank.
Expert Syst. Appl., 2021

A collaborative service resource evaluation model based on trust network.
EURASIP J. Wirel. Commun. Netw., 2021

Ultra Fast Speech Separation Model with Teacher Student Learning.
Proceedings of the 22nd Annual Conference of the International Speech Communication Association, Interspeech 2021, Brno, Czechia, August 30, 2021

KCFuzz: Directed Fuzzing Based on Keypoint Coverage.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

Don't Shoot Butterfly with Rifles: Multi-Channel Continuous Speech Separation with Early Exit Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services.
Secur. Commun. Networks, 2020

Uncovering overlapping community structure in static and dynamic networks.
Knowl. Based Syst., 2020

Recall and Learn: Fine-tuning Deep Pretrained Language Models with Less Forgetting.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Early Analysis and Detection of Compressed Traffic.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Design and implementation of web page classification tool based on word vector.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Fuzzing Improving Techniques Applied and Evaluated on a Network Traffic Analysis System.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Survey on Encrypted Traffic Identification.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Webpage visual feature extraction and similarity algorithm.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems.
IEEE Trans. Veh. Technol., 2019

I2P Anonymous Communication Network Measurement and Analysis.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

A Survey on Network Traffic Identification.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

SuperEye: A Distributed Port Scanning System.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Survey of the Software Vulnerability Discovery Using Machine Learning Techniques.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Fast IP Matching Algorithm Under Large Traffic.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Survey of Network Security Situational Awareness Technology.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
An Efficient Security System for Mobile Data Monitoring.
Wirel. Commun. Mob. Comput., 2018

A machine learning approach for feature selection traffic classification using security analysis.
J. Supercomput., 2018

WeChat traffic classification using machine learning algorithms and comparative analysis of datasets.
Int. J. Inf. Comput. Secur., 2018

Deciding Your Own Anonymity: User-Oriented Node Selection in I2P.
IEEE Access, 2018

Checking Function-Level Kernel Control Flow Integrity for Cloud Computing.
IEEE Access, 2018

Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

A Metadata-Based Representation Method of the Internet of Things.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Effective Feature Selection for 5G IM Applications Traffic Classification.
Mob. Inf. Syst., 2017

Effective Packet Number for 5G IM WeChat Application at Early Stage Traffic Classification.
Mob. Inf. Syst., 2017

A Preamble Mining Algorithm Oriented to Binary Protocol Using Random Probes.
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017

Robust Feature Selection for IM Applications at Early Stage Traffic Classification Using Machine Learning Algorithms.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

2016
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense.
IEICE Trans. Inf. Syst., 2016

Multiple Mix-Zones Deployment for Continuous Location Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

LPPS: Location privacy protection for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

WeChat Text and Picture Messages Service Flow Traffic Classification Using Machine Learning Technique.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
An Asynchronous Periodic Sequential Pattern Mining Algorithm with Multiple Minimum Item Supports for Ad Hoc Networking.
J. Sensors, 2015

Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Continuous resource allocation in cloud computing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds.
J. Networks, 2014

An Asynchronous Periodic Sequential Patterns Mining Algorithm with Multiple Minimum Item Supports.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Prometheus: Privacy-aware data retrieval on hybrid cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Practical and privacy-assured data indexes for outsourced cloud data.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A Large Scale Code Resolution Service Network in the Internet of Things.
Sensors, 2012

Feature selection for optimizing traffic classification.
Comput. Commun., 2012

A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Semantic surface representation of physical entity in the WEB of things.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Reliable object rating framework for content sharing system.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
Randomness Testing of Compressed Data
CoRR, 2010

A Pseudo-Random Number Generator Based on LZSS.
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010

Research on Performance Estimation Model of Distributed Network Simulation Based on PDNS Conservative Synchronization Mechanism in Complex Environment.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2007
Survivability and Makespan Driven Scheduling Algorithm for Grid Workflow Applications.
J. Inf. Sci. Eng., 2007

2006
Distributed Group Membership Algorithm in Intrusion-Tolerant System.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Implementation of a Dynamic Failover Technology.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005


  Loading...