Yongzheng Zhang
Orcid: 0000-0001-7353-7712Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Harbin Institute of Technology, China (PhD 2006)
According to our database1,
Yongzheng Zhang
authored at least 130 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Secur., February, 2024
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification.
IEEE Trans. Inf. Forensics Secur., 2024
2023
IEEE/ACM Trans. Netw., February, 2023
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach.
Comput. Secur., 2023
Listen to Minority: Encrypted Traffic Classification for Class Imbalance with Contrastive Pre-Training.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
2022
A Multi-Scale Feature Attention Approach to Network Traffic Classification and Its Model Explanation.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Internet Things J., 2022
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features.
Comput. Secur., 2022
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute.
Comput. Secur., 2022
BinMLM: Binary Authorship Verification with Flow-aware Mixture-of-Shared Language Model.
Proceedings of the IEEE International Conference on Software Analysis, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Multi-relational Instruction Association Graph for Cross-Architecture Binary Similarity Comparison.
Proceedings of the Security and Privacy in Communication Networks, 2022
Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2022
A Dual-Branch Self-attention Method for Mobile Malware Detection via Network Traffic.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 12th International Conference on Communication and Network Security, 2022
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems.
IEEE Trans. Ind. Informatics, 2021
Comput. Networks, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 28th International Conference on Telecommunications, 2021
MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features.
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Exploiting Heterogeneous Information for IoT Device Identification Using Graph Convolutional Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Topology Self-optimization for Anti-tracking Network via Nodes Distributed Computing.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics.
Comput. Secur., 2020
FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature Extraction.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network.
Proceedings of the Computational Science - ICCS 2020, 2020
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network.
Proceedings of the Computational Science - ICCS 2020, 2020
TDAE: Autoencoder-based Automatic Feature Learning Method for the Detection of DNS tunnel.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
CgNet: Predicting Urban Congregations from Spatio-Temporal Data Using Deep Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2020
Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020
Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 26th International Conference on Telecommunications, 2019
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019
Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018
2017
J. Netw. Comput. Appl., 2017
Comput. Networks, 2017
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
NSIM: A robust method to discover similar trajectories on cellular network location data.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017
Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
2016
IEEE/ACM Trans. Netw., 2016
Secur. Commun. Networks, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering.
Neurocomputing, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
Text localization in natural scene images with stroke width histogram and superpixel.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2014
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014
2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
Proceedings of the Trustworthy Computing and Services, 2013
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Comput. Commun., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
2010
Sci. China Inf. Sci., 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A New Vulnerability Taxonomy Based on Privilege Escalation.
Proceedings of the ICEIS 2004, 2004