Zhi Xue

Orcid: 0000-0003-2875-304X

According to our database1, Zhi Xue authored at least 73 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification.
IEEE/ACM Trans. Netw., June, 2024

SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2024

YOLOv8-Coal: a coal-rock image recognition method based on improved YOLOv8.
PeerJ Comput. Sci., 2024

AN-Net: an Anti-Noise Network for Anonymous Traffic Classification.
Proceedings of the ACM on Web Conference 2024, 2024

Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Vulnerability-oriented Testing for RESTful APIs.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A Novel Traffic Classifier With Attention Mechanism for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things.
IEEE Internet Things J., May, 2023

Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email Security.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SAWD: Structural-Aware Webshell Detection System with Control Flow Graph.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection.
J. Inf. Secur. Appl., 2022

A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things.
IEEE Internet Things J., 2022

IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

MT-FlowFormer: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2022

A Lightweight Semi-Supervised Learning Method Based on Consistency Regularization for Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2022

SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
An Efficient Intrusion Detection Method Based on Dynamic Autoencoder.
IEEE Wirel. Commun. Lett., 2021

SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls.
CoRR, 2021

A Fuzzy Post-project Evaluation Approach for Security Video Surveillance System.
CoRR, 2021

Two-Tier Intrusion Detection Framework for Embedded Systems.
IEEE Consumer Electron. Mag., 2021

RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles.
IEEE Access, 2021

A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

An Efficient and Lightweight Approach for Intrusion Detection based on Knowledge Distillation.
Proceedings of the ICC 2021, 2021

2020
Intelligent intrusion detection based on federated learning aided long short-term memory.
Phys. Commun., 2020

RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things.
IEEE Access, 2020

A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Unified Host-based Intrusion Detection Framework using Spark in Cloud.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Host-Based Intrusion Detection System with System Calls: Review and Future Trends.
ACM Comput. Surv., 2019

New upper degree of freedom in transmission system based on wireless G-MIMO communication channel.
Clust. Comput., 2019

Cyberthreat-Intelligence Information Sharing: Enhancing Collaborative Security.
IEEE Consumer Electron. Mag., 2019

MultiScan: A Private Online Virus Detection System.
IEEE Consumer Electron. Mag., 2019

2018
Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT.
IEEE Access, 2018

Energy-Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud-Based 5G Networks.
IEEE Access, 2018

Character-Level Intrusion Detection Based On Convolutional Neural Networks.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Localization of multiple jamming attackers in vehicular ad hoc network.
Int. J. Distributed Sens. Networks, 2017

Tracking the Mobile Jammer Continuously in Time by Using Moving Vector.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm.
Proceedings of the Data Science, 2017

A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

2016
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System.
Wirel. Pers. Commun., 2016

Personalised content recommendation based on field authorities in transparent computing.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Improved task partition based fault-tolerant rate-monotonic scheduling algorithm.
Proceedings of the International Conference on Security of Smart Cities, 2016

Real-Time Fault-Tolerant Scheduling Algorithm in Virtualized Clouds.
Proceedings of the Communications and Networking, 2016

2015
Security in MIMO wireless hybrid channel with artificial noise.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay.
Wirel. Pers. Commun., 2014

Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization.
IEEE Signal Process. Lett., 2014

Wiretap Channel with Information Embedding on Actions.
Entropy, 2014

The role of feedback in channels with information embedding on actions.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Information embedding on actions in wiretap channel.
Proceedings of the IEEE International Conference on Communications, 2014

Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios.
Proceedings of the IEEE Global Communications Conference, 2014

Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

An inner bound on the capacity region of multiple-access channel with side information.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Artificial Noise Generated in MIMO Scenario: Optimal Power Design.
IEEE Signal Process. Lett., 2013

Integrated Network Service to Enhance Multicast Communication.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Contribution-Based User Reputation Modeling in Collaborative Recommender Systems.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Research on security evaluation of cloud computing based on attack graph.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
An Improved Efficient Secret Handshakes Scheme with Unlinkability.
IEEE Commun. Lett., 2011

2010
An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

2008
Two Stochastic Models for Security Evaluation Based on Attack Graph.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Feature Analysis and Classification for Filtering Junk Information in Animation.
Proceedings of the Third International Conference on Natural Computation, 2007

Mining Privilege Escalation Paths for Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...