Zhaoxin Zhang
Orcid: 0000-0002-2981-0790
According to our database1,
Zhaoxin Zhang
authored at least 66 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Neural Comput. Appl., August, 2024
Expert Syst. Appl., March, 2024
Assessing the stability of collaboration networks: A structural cohesion analysis perspective.
J. Informetrics, February, 2024
IEEE Trans. Serv. Comput., 2024
Multi-Label Text Classification model integrating Label Attention and Historical Attention.
Knowl. Based Syst., 2024
KFFPDet: Android malicious application detection system with assisted detection of adversarial samples.
Expert Syst. Appl., 2024
CoRR, 2024
6Rover: Leveraging Reinforcement Learning-based Address Pattern Mining Approach for Discovering Active Targets in IPv6 Unseeded Space.
CoRR, 2024
Censorship data-driven DNS resolution anomaly detection: An ensemble algorithm model with multivariate feature fusion.
Comput. Networks, 2024
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024
2023
Configuration anormaly detection and resolution risk assessment of authoritative domain name server.
Comput. Secur., December, 2023
Comput. J., December, 2023
Vis. Comput., September, 2023
Comput. Vis. Image Underst., September, 2023
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity.
Comput. J., August, 2023
Comput. J., August, 2023
Secure and High-Quality Watermarking Algorithms for Relational Database Based on Semantic.
IEEE Trans. Knowl. Data Eng., July, 2023
Neural Process. Lett., June, 2023
Int. J. Softw. Informatics, 2023
CoRR, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
ACM Trans. Cyber Phys. Syst., 2022
A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series.
Inf. Sci., 2022
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis.
Future Gener. Comput. Syst., 2022
Comput. Secur., 2022
Comput. Networks, 2022
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.
Comput. J., 2022
Proceedings of the FRAME@HPDC 2022: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, 2022
Proceedings of the SNTA@HPDC 2022, 2022
2021
IEEE/ACM Trans. Netw., 2021
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs.
Comput. Secur., 2021
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021
2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
Robust Visual Tracking Using Kernel Sparse Coding on Multiple Covariance Descriptors.
ACM Trans. Multim. Comput. Commun. Appl., 2020
Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems.
Complex., 2020
Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020
Relational Database Watermarking Based on Chinese Word Segmentation and Word Embedding.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Secur. Commun. Networks, 2019
CoRR, 2019
CoRR, 2019
Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing.
CoRR, 2019
CoRR, 2019
Proceedings of the 3rd International Conference on Compute and Data Analysis, 2019
Proceedings of the 11th IEEE International Conference on Advanced Infocomm Technology, 2019
2018
Pers. Ubiquitous Comput., 2018
Proceedings of the 2018 International Conference on Identification, 2018
Proceedings of the 2018 International Conference on Identification, 2018
Proceedings of the Data Science, 2018
2016
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016
2015
An Asynchronous Periodic Sequential Pattern Mining Algorithm with Multiple Minimum Item Supports for Ad Hoc Networking.
J. Sensors, 2015
2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Personalized Recommendation Based on Co-Ranking and Query-Based Collaborative Diffusion.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013
2012
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012