Zhi Xue
Orcid: 0000-0003-2875-304X
According to our database1,
Zhi Xue
authored at least 73 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification.
IEEE/ACM Trans. Netw., June, 2024
IEEE Trans. Dependable Secur. Comput., 2024
PeerJ Comput. Sci., 2024
Proceedings of the ACM on Web Conference 2024, 2024
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
A Novel Traffic Classifier With Attention Mechanism for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023
Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things.
IEEE Internet Things J., May, 2023
Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email Security.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023
Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection.
J. Inf. Secur. Appl., 2022
A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things.
IEEE Internet Things J., 2022
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022
MT-FlowFormer: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022
3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2022
A Lightweight Semi-Supervised Learning Method Based on Consistency Regularization for Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Wirel. Commun. Lett., 2021
SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls.
CoRR, 2021
CoRR, 2021
IEEE Consumer Electron. Mag., 2021
RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles.
IEEE Access, 2021
A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
An Efficient and Lightweight Approach for Intrusion Detection based on Knowledge Distillation.
Proceedings of the ICC 2021, 2021
2020
Intelligent intrusion detection based on federated learning aided long short-term memory.
Phys. Commun., 2020
IEEE Access, 2020
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
ACM Comput. Surv., 2019
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel.
Clust. Comput., 2019
IEEE Consumer Electron. Mag., 2019
IEEE Consumer Electron. Mag., 2019
2018
IEEE Access, 2018
Energy-Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud-Based 5G Networks.
IEEE Access, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
2017
Int. J. Distributed Sens. Networks, 2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm.
Proceedings of the Data Science, 2017
A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer.
Proceedings of the 4th International Conference on Systems and Informatics, 2017
2016
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System.
Wirel. Pers. Commun., 2016
Personalised content recommendation based on field authorities in transparent computing.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Proceedings of the International Conference on Security of Smart Cities, 2016
Proceedings of the Communications and Networking, 2016
2015
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015
2014
Wirel. Pers. Commun., 2014
Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization.
IEEE Signal Process. Lett., 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014
An inner bound on the capacity region of multiple-access channel with side information.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014
Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
IEEE Signal Process. Lett., 2013
Proceedings of the IEEE 11th International Conference on Dependable, 2013
A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
IEEE Commun. Lett., 2011
2010
An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007