Yujia Zhu

Orcid: 0000-0001-7887-1787

According to our database1, Yujia Zhu authored at least 49 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Backdoor Richer Watermarks Using Dynamic Mask Covering for Dual Identity Verification.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Measuring Encrypted DNS Service with TLS1.3 Support over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

Meta Structure Search for Link Weight Prediction in Heterogeneous Graphs.
Proceedings of the IEEE International Conference on Acoustics, 2024

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024

6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
A framework for deep neural network multiuser authorization based on channel pruning.
Concurr. Comput. Pract. Exp., 2023

Measuring DNS-over-Encryption Performance Over IPv6.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

SeeStar: An Efficient Starlink Asset Detection Framework.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023

MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HIN.
Proceedings of the IFIP Networking Conference, 2023

Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DRDoSHunter: A Novel Approach Based on FDA and Inter-flow Features for DRDoS Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Time Series Clustering Method for Network Big Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Automatic Anomaly Detection Using Unlabelled Log Data.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking.
Proceedings of the IEEE Global Communications Conference, 2023

SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
A Review of Three-Dimensional Facial Asymmetry Analysis Methods.
Symmetry, 2022

Detection of DoH Tunnels with Dual-Tier Classifier.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Active Authorization Control of Deep Models Using Channel Pruning.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2022

2021
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively.
Proceedings of the 27th International Conference on Telecommunications, 2020

How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Predicting duration of traffic accidents based on cost-sensitive Bayesian network and weighted K-nearest neighbor.
J. Intell. Transp. Syst., 2019

IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation.
Proceedings of the 26th International Conference on Telecommunications, 2019

MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic.
Proceedings of the Computational Science - ICCS 2019, 2019

Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
A Personalized QoS Prediction Approach for CPS Service Recommendation Based on Reputation and Location-Aware Collaborative Filtering.
Sensors, 2018

A Privacy Protection Model of Data Publication Based on Game Theory.
Secur. Commun. Networks, 2018

An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing.
Proceedings of the 2018 IEEE SmartWorld, 2018

VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

SASD: A Self-Adaptive Stateful Decompression Architecture.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Evaluation of regularized multi-task leaning algorithms for single/multi-view human action recognition.
Multim. Tools Appl., 2017

Collaborative sparse representation leaning model for RGBD action recognition.
J. Vis. Commun. Image Represent., 2017

WiFi fingerprint releasing for indoor localization based on differential privacy.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Semantics and locality preserving correlation projections.
Proceedings of the 2017 IEEE International Conference on Multimedia and Expo, 2017

De-anonymous and Anonymous Technologies for Network Traffic Release.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
The Engineering, Economic and Environmental Electricity Simulation Tool (E4ST): Description and an Illustration of Its Capability and Use as a Planning/Policy Analysis Tool.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2014
Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

2013
Sentence length and syntactic complexity in spoken and written English.
Glottometrics, 2013

2012
AP Selection for Indoor Localization Based on Neighborhood Rough Sets.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

2011
Research on an Anti-Perturbation Kalman Filter Algorithm.
J. Networks, 2011

Incremental nonparametric discriminant analysis for robust object tracking.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Robust head pose estimation via semi-supervised manifold learning with ℓ<sup>1</sup>-graph regularization.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2001
A Novel Probabilistic Model for Link Unification Grammar.
Proceedings of the Seventh International Workshop on Parsing Technologies (IWPT-2001), 2001


  Loading...