Zhiyu Hao

Orcid: 0000-0003-3946-5094

According to our database1, Zhiyu Hao authored at least 59 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng., August, 2024

CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization.
CoRR, 2024

VDTriplet: Vulnerability detection with graph semantics using triplet model.
Comput. Secur., 2024

APIBeh: Learning Behavior Inclination of APIs for Malware Classification.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
eHotSnap: An Efficient and Hot Distributed Snapshots System for Virtual Machine Cluster.
IEEE Trans. Parallel Distributed Syst., August, 2023

HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation.
Int. J. Inf. Comput. Secur., 2023

Software Vulnerability Detection Using an Enhanced Generalization Strategy.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2023

API2Vec: Learning Representations of API Sequences for Malware Detection.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines.
IEEE Trans. Serv. Comput., 2022

CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Black box attack and network intrusion detection using machine learning for malicious traffic.
Comput. Secur., 2022

An empirical study of vulnerability discovery methods over the past ten years.
Comput. Secur., 2022

Optimizing genomic control in mixed model associations with binary diseases.
Briefings Bioinform., 2022

CodeDiff: A Malware Vulnerability Detection Tool Based on Binary File Similarity for Edge Computing Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

ClusterRR: a record and replay framework for virtual machine cluster.
Proceedings of the VEE '22: 18th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2022

Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching.
Proceedings of the IEEE Smartworld, 2022

Mal-Bert-GCN: Malware Detection by Combining Bert and GCN.
Proceedings of the IEEE International Conference on Trust, 2022

Malware Detection Using Automated Generation of Yara Rules on Dynamic Features.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

MalPro: Learning on Process-Aware Behaviors for Malware Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

SeqTrace: API Call Tracing Based on Intel PT and VMI for Malware Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison.
IEEE Trans. Inf. Forensics Secur., 2021

VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches.
Comput. Secur., 2021

Genome-wide hierarchical mixed model association analysis.
Briefings Bioinform., 2021

EmuIoTNet: An Emulated IoT Network for Dynamic Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data.
IEEE Trans. Parallel Distributed Syst., 2020

pRnR: A Parallel Record-Replay Framework for Virtual Machines.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

CHEAPS2AGA: Bounding Space Usage in Variance-Reduced Stochastic Gradient Descent over Streaming Data and Its Asynchronous Parallel Variants.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

A High-Efficiency and Comprehensive Dynamic Behavior Analysis System for Malware based on Hardware Virtualization.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example.
IEEE Trans. Parallel Distributed Syst., 2019

HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
EAI Endorsed Trans. Security Safety, 2019

Framework for risk assessment in cyber situational awareness.
IET Inf. Secur., 2019

Quick approximation of threshold values for genome-wide association studies.
Briefings Bioinform., 2019

DunDi: Improving Robustness of Neural Networks Using Distance Metric Learning.
Proceedings of the Computational Science - ICCS 2019, 2019

2018
FA-Stack: A Fast Array-Based Stack with Wait-Free Progress Guarantee.
IEEE Trans. Parallel Distributed Syst., 2018

SnapFiner: A Page-Aware Snapshot System for Virtual Machines.
IEEE Trans. Parallel Distributed Syst., 2018

ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Modeling for Traffic Replay in Virtual Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters.
IEEE Trans. Parallel Distributed Syst., 2017

Introspection-Based Memory Pruning for Live VM Migration.
Int. J. Parallel Program., 2017

A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware.
Proceedings of the Security and Privacy in Communication Networks, 2017

SA-PFRS: Semantics-Aware Page Frame Reclamation System in Virtualized Environments.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Quantitative threat situation assessment based on alert verification.
Secur. Commun. Networks, 2016

A Hybrid Monitoring Mechanism in Virtualized Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters.
Proceedings of the 45th International Conference on Parallel Processing, 2016

DMNS: A Framework to Dynamically Monitor Simulated Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Study on Address Blocks with Inaccurate Geolocations of China's Internet.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Botnet spoofing: fighting botnet with itself.
Secur. Commun. Networks, 2015

Exploring Efficient and Robust Virtual Machine Introspection Techniques.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Traffic Replay in Virtual Network Based on IP-Mapping.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

Counting sort for the live migration of virtual machines.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks.
Proceedings of the Information Security and Privacy Research, 2012

2011
A Propagation Model for Social Engineering Botnets in Social Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

2008
An Efficient Routing Mechanism in Network Simulation.
Simul., 2008


  Loading...