Zhaoxuan Li
Orcid: 0000-0002-2195-0799
According to our database1,
Zhaoxuan Li
authored at least 33 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
TPE-Det: A Tamper-Proof External Detector via Hardware Traces Analysis Against IoT Malware.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024
Comput. Secur., March, 2024
Not Just Summing: The Identifier Leakage of Private-Join-and-Compute and its Improvement.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection.
Proceedings of the ACM on Web Conference 2024, 2024
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
PIWS: Private Intersection Weighted Sum Protocol for Privacy-Preserving Score-Based Voting With Perfect Ballot Secrecy.
IEEE Trans. Comput. Soc. Syst., 2023
Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Spatio-Temporal Neural Dynamics of Observing Non-Tool Manipulable Objects and Interactions.
Sensors, 2022
Empir. Softw. Eng., 2022
A Glimpse of the Whole: Detecting Few-shot Android Malware Encrypted Network Traffic.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Prediction and analysis of ship traffic flow based on a space-time graph traffic computing framework.
Proceedings of the 20th IEEE International Conference on Embedded and Ubiquitous Computing, 2022
2021
Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
2020
Proceedings of the Web Services - ICWS 2020, 2020
2019
2018
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Impact of Occupancy-Based Buildings-to-Grid Integration on Frequency Regulation in Smart Grids.
Proceedings of the 2018 Annual American Control Conference, 2018