Zhen Xu
Orcid: 0009-0006-8579-5544Affiliations:
- University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
According to our database1,
Zhen Xu
authored at least 112 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Reinforcement Learning Based Online Request Scheduling Framework for Workload-Adaptive Edge Deep Learning Inference.
IEEE Trans. Mob. Comput., December, 2024
Runtime Anomaly Detection for MEC Services with Multi-Timescale and Dimensional Feature.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024
Unveiling the Lexical Sensitivity of LLMs: Combinatorial Optimization for Prompt Enhancement.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024
2023
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services.
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Image Process., 2023
Proc. VLDB Endow., 2023
Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
NadGPT: Semi-Supervised Network Anomaly Detection via Auto-Regressive Auxiliary Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media.
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Proceedings of the 2023 3rd International Conference on Big Data, 2023
The malicious resource consumption detection in permissioned blockchain based on traffic analysis.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
MK-FLFHNN: A Privacy-Preserving Vertical Federated Learning Framework For Heterogeneous Neural Network Via Multi-Key Homomorphic Encryption.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
2022
IEEE Trans. Serv. Comput., 2022
Cybersecur., 2022
CoRR, 2022
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.
Comput. J., 2022
LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence.
Proceedings of the IEEE Smartworld, 2022
An atomic member addition mechanism for permissioned blockchain based on autonomous rollback.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Switching Gaussian Mixture Variational RNN for Anomaly Detection of Diverse CDN Websites.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.
Proceedings of the IEEE International Conference on Acoustics, 2022
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
IEEE Trans. Veh. Technol., 2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!
J. Syst. Archit., 2021
VAECGAN: a generating framework for long-term prediction in multivariate time series.
Cybersecur., 2021
Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction.
IEEE Access, 2021
SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security".
IEEE Trans. Inf. Forensics Secur., 2020
EAI Endorsed Trans. Security Safety, 2020
An enhanced saturation attack and its mitigation mechanism in software-defined networking.
Comput. Networks, 2020
End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Prihook: Differentiated context-aware hook placement for different owners' smartphones.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Comput. Secur., 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks.
Sci. China Inf. Sci., 2017
DC<sup>2</sup>-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017
A game theoretical framework for improving the quality of service in cooperative RAN caching.
Proceedings of the IEEE International Conference on Communications, 2017
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Proceedings of the 4th International Conference on Control, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017
2016
Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission.
Sci. China Inf. Sci., 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Improving revenue for reliability-aware VDC embedding in a software-defined data center.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the IEEE Symposium on Computers and Communication, 2016
Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
An Energy-Aware Algorithm for Optimizing Resource Allocation in Software Defined Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Frontiers Comput. Sci., 2015
Comput. Networks, 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Improving TCP performance in data center networks with Adaptive Complementary Coding.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014