Zhaoxin Zhang

Orcid: 0000-0002-2981-0790

According to our database1, Zhaoxin Zhang authored at least 66 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Radical-attended and Pinyin-attended malicious long-tail keywords detection.
Neural Comput. Appl., August, 2024

Text classification with improved word embedding and adaptive segmentation.
Expert Syst. Appl., March, 2024

Assessing the stability of collaboration networks: A structural cohesion analysis perspective.
J. Informetrics, February, 2024

Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation.
IEEE Trans. Serv. Comput., 2024

Multi-Label Text Classification model integrating Label Attention and Historical Attention.
Knowl. Based Syst., 2024

Adversarial attack on human pose estimation network.
Adv. Math. Commun., 2024

KFFPDet: Android malicious application detection system with assisted detection of adversarial samples.
Expert Syst. Appl., 2024

A QoE-Aware Split Inference Accelerating Algorithm for NOMA-based Edge Intelligence.
CoRR, 2024

6Rover: Leveraging Reinforcement Learning-based Address Pattern Mining Approach for Discovering Active Targets in IPv6 Unseeded Space.
CoRR, 2024

DNS root server resolution anomaly detection.
Comput. Secur., 2024

Censorship data-driven DNS resolution anomaly detection: An ensemble algorithm model with multivariate feature fusion.
Comput. Networks, 2024

Data mining based analysis of online gambling sites and illicit financial flows.
Proceedings of the 2024 International Conference on Cloud Computing and Big Data, 2024

2023
Configuration anormaly detection and resolution risk assessment of authoritative domain name server.
Comput. Secur., December, 2023

CR Loss: Improving Biometric Using ClassRoom Learning Approach.
Comput. J., December, 2023

Contactless palmprint biometrics using DeepNet with dedicated assistant layers.
Vis. Comput., September, 2023

Attention guided domain alignment for conditional face image generation.
Comput. Vis. Image Underst., September, 2023

Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity.
Comput. J., August, 2023

Gambling Domain Name Recognition via Certificate and Textual Analysis.
Comput. J., August, 2023

Secure and High-Quality Watermarking Algorithms for Relational Database Based on Semantic.
IEEE Trans. Knowl. Data Eng., July, 2023

Vascular Enhancement Analysis in Lightweight Deep Feature Space.
Neural Process. Lett., June, 2023

Text-driven Face Image Generation and Manipulation via Multi-level Residual Mapper.
Int. J. Softw. Informatics, 2023

FODT: Fast, Online, Distributed and Temporary Failure Recovery Approach for MEC.
CoRR, 2023

Research on Optimal Selection Measurement of DNS Root Instance.
IEEE Access, 2023

2022
Name Dependency and Domain Name Resolution Risk Assessment.
IEEE Trans. Netw. Serv. Manag., 2022

Efficient Encrypted Range Query on Cloud Platforms.
ACM Trans. Cyber Phys. Syst., 2022

Shape-driven lightweight CNN for finger-vein biometrics.
J. Inf. Secur. Appl., 2022

A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series.
Inf. Sci., 2022

PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis.
Future Gener. Comput. Syst., 2022

CoNet: Borderless and decentralized server cooperation in edge computing.
CoRR, 2022

Adversarial attacks on YOLACT instance segmentation.
Comput. Secur., 2022

FCSCNN: Feature centralized Siamese CNN-based android malware identification.
Comput. Secur., 2022

Adaptive segmented webpage text based malicious website detection.
Comput. Networks, 2022

Research on Unexpected DNS Response from Open DNS Resolvers.
Comput. J., 2022

Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules.
Comput. J., 2022

CoTree: Region-free and Decentralized Edge Server Cooperation.
Proceedings of the FRAME@HPDC 2022: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, 2022

The Variable-Weight MADM Algorithm for Wireless Network.
Proceedings of the SNTA@HPDC 2022, 2022

2021
Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network.
IEEE/ACM Trans. Netw., 2021

An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs.
Comput. Secur., 2021

Different Dimension Issues in Deep Feature Space for Finger-Vein Recognition.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

2020
CovLets: A Second-Order Descriptor for Modeling Multiple Features.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Robust Visual Tracking Using Kernel Sparse Coding on Multiple Covariance Descriptors.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems.
Complex., 2020

Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Search-tree Based SDN Candidate Selection in Hybrid IP/SDN Network.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

Relational Database Watermarking Based on Chinese Word Segmentation and Word Embedding.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Characterizing the Security Threats of Disposable Phone Numbers.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Evaluating the Impact of Name Resolution Dependence on the DNS.
Secur. Commun. Networks, 2019

Geographical and Topology Control based Opportunistic Routing for Ad Hoc Networks.
CoRR, 2019

Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams.
CoRR, 2019

Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing.
CoRR, 2019

Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network.
CoRR, 2019

Anomaly Detection for Container Cluster based on JointCloud Platform.
Proceedings of the 3rd International Conference on Compute and Data Analysis, 2019

An Effective Personnel Detection System Based on Radio Frequency Identification.
Proceedings of the 11th IEEE International Conference on Advanced Infocomm Technology, 2019

2018
Discrete PSO-based workload optimization in virtual machine placement.
Pers. Ubiquitous Comput., 2018

Evaluating "Health Status" for DNS Resolvers.
IEICE Trans. Commun., 2018

I-vector features and deep neural network modeling for language recognition.
Proceedings of the 2018 International Conference on Identification, 2018

Assessment of the impacts of TLS vulnerabilities in the HTTPS ecosystem of China.
Proceedings of the 2018 International Conference on Identification, 2018

Research on Dynamic Discovery Model of User Interest Based on Time and Space Vector.
Proceedings of the Data Science, 2018

2016
DNS recursive server health evaluation model.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
An Asynchronous Periodic Sequential Pattern Mining Algorithm with Multiple Minimum Item Supports for Ad Hoc Networking.
J. Sensors, 2015

2013
Research on the Monitoring and Controlling Model of SIP Network.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Combining prestige and relevance ranking for personalized recommendation.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Personalized Recommendation Based on Co-Ranking and Query-Based Collaborative Diffusion.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Scalable collaborative filtering using incremental update and local link prediction.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Link prediction on evolving network using tensor-based node similarity.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A content delivery strategy based on resource popularity for P4P architecture.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...