Xiaosong Zhang
Orcid: 0000-0001-9886-1412Affiliations:
- University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
According to our database1,
Xiaosong Zhang
authored at least 195 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., May, 2024
IEEE Trans. Ind. Informatics, March, 2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Internet Things J., 2024
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips.
CoRR, 2024
Appl. Soft Comput., 2024
Appl. Intell., 2024
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity.
J. Syst. Archit., September, 2023
IEEE Trans. Computers, August, 2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023
A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems.
IEEE Trans. Ind. Informatics, June, 2023
Comput. J., March, 2023
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023
An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting.
IEEE Trans. Inf. Forensics Secur., 2023
IPCADP-Equalizer: An Improved Multibalance Privacy Preservation Scheme against Backdoor Attacks in Federated Learning.
Int. J. Intell. Syst., 2023
FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage.
Proceedings of the IEEE INFOCOM 2023, 2023
Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the IEEE International Conference on Communications, 2023
DTPP-DFL: A Dropout-Tolerated Privacy-Preserving Decentralized Federated Learning Framework.
Proceedings of the IEEE Global Communications Conference, 2023
Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Software Eng., 2022
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022
A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
IEEE Trans. Ind. Informatics, 2022
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022
Secur. Commun. Networks, 2022
Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022
A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022
A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT.
IEEE Internet Things J., 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
IET Inf. Secur., 2022
Frontiers Comput. Sci., 2022
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the IEEE Smartworld, 2022
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022
Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication.
Proceedings of the IEEE Global Communications Conference, 2022
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022
2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Emerg. Top. Comput., 2021
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021
Secur. Commun. Networks, 2021
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
IEEE Netw., 2021
Knowl. Based Syst., 2021
Inf. Process. Manag., 2021
Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities.
IEEE Internet Things J., 2021
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021
IET Softw., 2021
Proceedings of the 2021 USENIX Annual Technical Conference, 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the ICC 2021, 2021
2020
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses.
ACM Trans. Storage, 2020
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
IEEE Trans. Ind. Informatics, 2020
ACM Trans. Cyber Phys. Syst., 2020
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020
Sensors, 2020
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques.
Secur. Commun. Networks, 2020
Toward Secure Storage in Cloud-based eHealth Systems: A Blockchain-Assisted Approach.
IEEE Netw., 2020
IEEE Internet Things J., 2020
An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020
A new lower bound on the second-order nonlinearity of a class of monomial bent functions.
Cryptogr. Commun., 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Wirel. Commun., 2019
J. Comput. Virol. Hacking Tech., 2019
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Ind. Informatics, 2019
Sensors, 2019
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
J. Intell. Fuzzy Syst., 2019
An efficient multiple-user location-based query authentication approach for social networking.
J. Inf. Secur. Appl., 2019
Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things.
Inf. Sci., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
Int. J. Pattern Recognit. Artif. Intell., 2019
Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019
CoRR, 2019
Cogn. Syst. Res., 2019
Clust. Comput., 2019
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment.
Comput. Electr. Eng., 2019
A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features.
IEEE Access, 2019
Proceedings of the 35th Symposium on Mass Storage Systems and Technologies, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019
2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model.
IEEE Trans. Inf. Forensics Secur., 2018
Softw. Qual. J., 2018
Sensors, 2018
Peer-to-Peer Netw. Appl., 2018
具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018
Int. J. Netw. Secur., 2018
IEICE Trans. Inf. Syst., 2018
Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Commun. Mag., 2018
IEEE Access, 2018
Computational Complexity of Outer-Independent Total and Total Roman Domination Numbers in Trees.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees.
IEEE Trans. Inf. Theory, 2017
J. Inf. Sci. Eng., 2017
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments.
Inf., 2017
The convergence and termination criterion of quantum-inspired evolutionary neural networks.
Neurocomputing, 2017
IEICE Trans. Inf. Syst., 2017
Fast backup and recovery for web protectiuon using trigger and block hash approach.
Comput. Syst. Sci. Eng., 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2016
A multi-granularity heuristic-combining approach for censorship circumvention activity identification.
Secur. Commun. Networks, 2016
Pattern Recognit. Lett., 2016
J. Comput. Sci. Technol., 2016
Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2016
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem.
IACR Cryptol. ePrint Arch., 2016
SDIVIP<sup>2</sup>: shared data integrity verification with identity privacy preserving in mobile clouds.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
IEEE Trans. Very Large Scale Integr. Syst., 2015
IEEE Trans. Software Eng., 2015
Test Generation for Embedded Executables via Concolic Execution in a Real Environment.
IEEE Trans. Reliab., 2015
Secur. Commun. Networks, 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
2014
Future Gener. Comput. Syst., 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
2013
Design and implementation of a dynamic symbolic execution tool for windows executables.
J. Softw. Evol. Process., 2013
J. Netw. Comput. Appl., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Future Gener. Comput. Syst., 2013
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2011
J. Networks, 2011
J. Netw. Comput. Appl., 2011
2010
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks.
J. Zhejiang Univ. Sci. C, 2010
2009
Comput. Math. Appl., 2009
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009