Ziming Zhao
Orcid: 0000-0003-1455-4330Affiliations:
- Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
According to our database1,
Ziming Zhao
authored at least 20 papers
between 2022 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024
Comput. Secur., March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024
Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection.
Proceedings of the ACM on Web Conference 2024, 2024
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network.
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Minerva: Enhancing Quantum Network Performance for High-Fidelity Multimedia Transmission.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches.
Proceedings of the IEEE INFOCOM 2024, 2024
Moirai: Optimizing Quantum Serverless Function Orchestration via Device Allocation and Circuit Deployment.
Proceedings of the IEEE International Conference on Web Services, 2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Empir. Softw. Eng., 2022