Ziming Zhao

Orcid: 0000-0003-1455-4330

Affiliations:
  • Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China


According to our database1, Ziming Zhao authored at least 19 papers between 2022 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024

CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024

DDoS family: A novel perspective for massive types of DDoS attacks.
Comput. Secur., March, 2024

Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping.
IEEE Trans. Dependable Secur. Comput., 2024

metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024

Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection.
Proceedings of the ACM on Web Conference 2024, 2024

Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024

RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches.
Proceedings of the IEEE INFOCOM 2024, 2024

Moirai: Optimizing Quantum Serverless Function Orchestration via Device Allocation and Circuit Deployment.
Proceedings of the IEEE International Conference on Web Services, 2024

An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023

SAGE: Steering the Adversarial Generation of Examples With Accelerations.
IEEE Trans. Inf. Forensics Secur., 2023

Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts.
Empir. Softw. Eng., 2022


  Loading...