default search action
Xiaosong Zhang 0001
Person information
- affiliation: University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
Other persons with the same name
- Xiaosong Zhang — disambiguation page
- Xiaosong Zhang 0002 — Tangshan University, Tangshan, China
- Xiaosong Zhang 0003 — Changchun University of Technology, School of Mechatronic Engineering, Changchun, China
- Xiaosong Zhang 0004 — University of Chinese Academy of Sciences, Beijing, China
- Xiaosong Zhang 0005 — Xi'an Highway Institute, Shaanxi, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j120]Junpeng He, Lingfeng Yao, Xiong Li, Muhammad Khurram Khan, Weina Niu, Xiaosong Zhang, Fagen Li:
Model-agnostic generation-enhanced technology for few-shot intrusion detection. Appl. Intell. 54(4): 3181-3204 (2024) - [j119]Weina Niu, Xuhan Liao, Shiping Huang, Yudong Li, Xiaosong Zhang, Beibei Li:
A robust Wide & Deep learning framework for log-based anomaly detection. Appl. Soft Comput. 153: 111314 (2024) - [j118]Yongjian Fu, Yongzhao Zhang, Hao Pan, Yu Lu, Xinyi Li, Lili Chen, Ju Ren, Xiong Li, Xiaosong Zhang, Yaoxue Zhang:
Pushing the Limits of Acoustic Spatial Perception via Incident Angle Encoding. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(2): 52:1-52:28 (2024) - [j117]Weina Niu, Zimu Li, Zhaoxu He, Aduo Wang, Beibei Li, Xiaosong Zhang:
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion. IEEE Internet Things J. 11(3): 4442-4453 (2024) - [j116]Yanping Wang, Xiaosong Zhang, Ruidong Chen, Hong-Ning Dai, Xiaofen Wang, Leo Yu Zhang, Ming Li:
Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing. IEEE Internet Things J. 11(5): 8401-8413 (2024) - [j115]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Xiong Li, Sheng Cao:
Monero With Multi-Grained Redaction. IEEE Trans. Dependable Secur. Comput. 21(1): 241-253 (2024) - [j114]Yuanfei Li, Xiong Li, Xiangyang Luo, Zhetao Li, Hongwei Li, Xiaosong Zhang:
AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation. IEEE Trans. Dependable Secur. Comput. 21(4): 2552-2567 (2024) - [j113]Qi Xia, Isaac Amankona Obiri, Jianbin Gao, Hu Xia, Xiaosong Zhang, Kwame Omono Asamoah, Sandro Amofa:
PRIDN: A Privacy Preserving Data Sharing on Named Data Networking. IEEE Trans. Inf. Forensics Secur. 19: 677-692 (2024) - [j112]Guangyuan Gao, Weina Niu, Jiacheng Gong, Dujuan Gu, Song Li, Mingxue Zhang, Xiaosong Zhang:
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph. IEEE Trans. Inf. Forensics Secur. 19: 7705-7719 (2024) - [j111]Jiacheng Gong, Weina Niu, Song Li, Mingxue Zhang, Xiaosong Zhang:
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics. IEEE Trans. Inf. Forensics Secur. 19: 9216-9229 (2024) - [j110]Shuai Shang, Xiong Li, Ke Gu, Lei Li, Xiaosong Zhang, Pandi Vijayakumar:
A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT. IEEE Trans. Ind. Informatics 20(3): 4305-4316 (2024) - [c69]Hao Zhao, Wenqi Zhang, Xiong Li, Shuai Shang, Ke Huang, Xiaosong Zhang:
Towards Efficient Delegated Private Set Intersection Cardinality Protocol. CSCWD 2024: 729-734 - [c68]Junpeng He, Hanyue Kong, Shihe Zhang, Xiong Li, Weina Niu, Xiaosong Zhang, Fagen Li:
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection. ICC 2024: 2047-2052 - [c67]Lingfeng Yao, Weina Niu, Qingjun Yuan, Beibei Li, Yanfeng Zhang, Xiaosong Zhang:
A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data. ICC 2024: 2719-2724 - [c66]Hengying Xiao, Jingwei Li, Yanjing Ren, Ruijin Wang, Xiaosong Zhang:
CDCache: Space-Efficient Flash Caching via Compression-before-Deduplication. INFOCOM 2024: 861-870 - [c65]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. SP 2024: 2180-2197 - [i14]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. CoRR abs/2406.10687 (2024) - [i13]Sifan Wu, Zhenguang Liu, Beibei Zhang, Roger Zimmermann, Zhongjie Ba, Xiaosong Zhang, Kui Ren:
Do As I Do: Pose Guided Human Motion Copy. CoRR abs/2406.16601 (2024) - [i12]Yuqiao Yang, Zhongjie Wu, Yongzhao Zhang, Ting Chen, Jun Li, Jie Yang, Wenhao Liu, Xiaosong Zhang, Ruicong Shi, Jingwei Li, Yu Jiang, Zhuo Su:
UWBAD: Towards Effective and Imperceptible Jamming Attacks Against UWB Ranging Systems with COTS Chips. CoRR abs/2407.00682 (2024) - 2023
- [j109]Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang, Yanping Wang, Beibei Li:
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning. Comput. J. 66(3): 540-553 (2023) - [j108]Wenjuan Lian, Yichi Zhang, Xin Chen, Bin Jia, Xiaosong Zhang:
IPCADP-Equalizer: An Improved Multibalance Privacy Preservation Scheme against Backdoor Attacks in Federated Learning. Int. J. Intell. Syst. 2023: 1-20 (2023) - [j107]Weina Niu, Yihang Wang, Xingyu Liu, Ran Yan, Xiong Li, Xiaosong Zhang:
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices. IEEE Internet Things J. 10(13): 11343-11356 (2023) - [j106]Yangyang Liu, Qi Xia, Xiong Li, Jianbin Gao, Xiaosong Zhang:
An authentication and signature scheme for UAV-assisted vehicular ad hoc network providing anonymity. J. Syst. Archit. 142: 102935 (2023) - [j105]Shipeng Li, Jingwei Li, Yuxing Tang, Xiapu Luo, Zheyuan He, Zihao Li, Xi Cheng, Yang Bai, Ting Chen, Yuzhe Tang, Zhe Liu, Xiaosong Zhang:
BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing. IEEE Trans. Computers 72(8): 2377-2389 (2023) - [j104]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. IEEE Trans. Inf. Forensics Secur. 18: 1237-1251 (2023) - [j103]Yanping Wang, Xiaofen Wang, Hong-Ning Dai, Xiaosong Zhang, Muhammad Imran:
A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems. IEEE Trans. Ind. Informatics 19(6): 7835-7847 (2023) - [j102]Xiong Li, Shuai Shang, Shanpeng Liu, Ke Gu, Mian Ahmad Jan, Xiaosong Zhang, Fazlullah Khan:
An Identity-Based Data Integrity Auditing Scheme for Cloud-Based Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2556-2567 (2023) - [j101]Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, Xiaosong Zhang:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. ACM Trans. Softw. Eng. Methodol. 32(1): 26:1-26:35 (2023) - [j100]Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. IEEE Trans. Software Eng. 49(2): 777-801 (2023) - [c64]Yubo Peng, Xiong Li, Shuai Shang, Xiaofen Wang, Xiaosong Zhang:
Low-overhead Privacy-preserving Location-based Skyline Query. ISPA/BDCloud/SocialCom/SustainCom 2023: 344-351 - [c63]Tianrui Wang, Weina Niu, Kangyi Ding, Lingfeng Yao, Pengsen Cheng, Xiaosong Zhang:
Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization. CSCWD 2023: 1166-1171 - [c62]Tao Chen, Xiao-Fen Wang, Hong-Ning Dai, Hao-Miao Yang, Rang Zhou, Xiaosong Zhang:
DTPP-DFL: A Dropout-Tolerated Privacy-Preserving Decentralized Federated Learning Framework. GLOBECOM 2023: 2554-2559 - [c61]Youlin Li, Weina Niu, Yukun Zhu, Jiacheng Gong, Beibei Li, Xiaosong Zhang:
Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator. ICC 2023: 753-758 - [c60]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c59]Jia Hu, Weina Niu, Qingjun Yuan, Lingfeng Yao, Junpeng He, Yanfeng Zhang, Xiaosong Zhang:
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection. ICDF2C (1) 2023: 212-226 - [c58]Xiyang Liu, Xiong Li, Baojin Wang, Xiaosong Zhang:
Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things. ICPADS 2023: 944-949 - [c57]Jingwei Li, Yanjing Ren, Patrick P. C. Lee, Yuyu Wang, Ting Chen, Xiaosong Zhang:
FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage. INFOCOM 2023: 1-10 - [i11]Zhenguang Liu, Peng Qian, Jiaxu Yang, Lingfeng Liu, Xiaojun Xu, Qinming He, Xiaosong Zhang:
Rethinking Smart Contract Fuzzing: Fuzzing With Invocation Ordering and Important Branch Revisiting. CoRR abs/2301.03943 (2023) - [i10]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. CoRR abs/2305.07067 (2023) - [i9]Jiaxi Yang, Sheng Cao, Peng Xiangli, Xiong Li, Xiaosong Zhang:
Multi-dimensional Data Quick Query for Blockchain-based Federated Learning. CoRR abs/2309.15348 (2023) - [i8]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 672 (2023) - 2022
- [j99]Zhenfei Zhao, Weina Niu, Xiaosong Zhang, Runzi Zhang, Zhenqi Yu, Cheng Huang:
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Appl. Intell. 52(8): 8810-8819 (2022) - [j98]Weina Niu, Jie Zhou, Yibin Zhao, Xiaosong Zhang, Yujie Peng, Cheng Huang:
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis. Comput. Secur. 120: 102809 (2022) - [j97]Zhangjie Fu, Yan Wang, Xingming Sun, Xiaosong Zhang:
Semantic and secure search over encrypted outsourcing cloud based on BERT. Frontiers Comput. Sci. 16(2): 162802 (2022) - [j96]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. IET Inf. Secur. 16(6): 401-416 (2022) - [j95]Sixuan Dang, Sheng Cao, Jingwei Li, Xiaosong Zhang:
Dynamic incentive mechanism design for regulation-aware systems. Int. J. Intell. Syst. 37(2): 1299-1321 (2022) - [j94]Yang Zhang, Yongquan Liang, Bin Jia, Pinxiang Wang, Xiaosong Zhang:
A blockchain-enabled learning model based on distributed deep learning architecture. Int. J. Intell. Syst. 37(9): 6577-6604 (2022) - [j93]Shuai Shang, Xiong Li, Rongxing Lu, Jianwei Niu, Xiaosong Zhang, Mohsen Guizani:
A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT. IEEE Internet Things J. 9(16): 15285-15296 (2022) - [j92]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Hong-Ning Dai, Mingzhe Liu:
Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT. IEEE Internet Things J. 9(18): 17098-17109 (2022) - [j91]Xiong Li, Tian Liu, Chaoyang Chen, Qingfeng Cheng, Xiaosong Zhang, Neeraj Kumar:
A Lightweight and Verifiable Access Control Scheme With Constant Size Ciphertext in Edge-Computing-Assisted IoT. IEEE Internet Things J. 9(19): 19227-19237 (2022) - [j90]Hang Zhu, Weina Niu, Xuhan Liao, Xiaosong Zhang, Xiaofen Wang, Beibei Li, Zheyuan He:
Attacker Traceability on Ethereum through Graph Analysis. Secur. Commun. Networks 2022: 3448950:1-3448950:12 (2022) - [j89]Kangyi Ding, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin, Xiaosong Zhang:
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. Sensors 22(17): 6497 (2022) - [j88]Jingwei Li, Suyu Huang, Yanjing Ren, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang, Yao Hao:
Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication. IEEE Trans. Computers 71(4): 959-970 (2022) - [j87]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Bidirectional and Malleable Proof-of-Ownership for Large File in Cloud Storage. IEEE Trans. Cloud Comput. 10(4): 2351-2365 (2022) - [j86]Bin Jia, Xiaosong Zhang, Jiewen Liu, Yang Zhang, Ke Huang, Yongquan Liang:
Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT. IEEE Trans. Ind. Informatics 18(6): 4049-4058 (2022) - [j85]Xiong Li, Jiabei He, Pandi Vijayakumar, Xiaosong Zhang, Victor Chang:
A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs. IEEE Trans. Ind. Informatics 18(8): 5494-5503 (2022) - [j84]Xiong Li, Shanpeng Liu, Rongxing Lu, Muhammad Khurram Khan, Ke Gu, Xiaosong Zhang:
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System. IEEE J. Biomed. Health Informatics 26(5): 2020-2031 (2022) - [j83]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Trans. Software Eng. 48(8): 3066-3086 (2022) - [c56]Yan-Ping Wang, Xiao-Fen Wang, Hong-Ning Dai, Xiaosong Zhang, Yu Su, Muhammad Imran, Nidal Nasser:
A Cloud-based IoMT Data Sharing Scheme with Conditional Anonymous Source Authentication. GLOBECOM 2022: 2915-2920 - [c55]Weina Niu, Zhenqi Yu, Zimu Li, Beibei Li, Runzi Zhang, Xiaosong Zhang:
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph. GLOBECOM 2022: 3356-3361 - [c54]Qian Zhang, Sheng Cao, Yi Ni, Ting Chen, Xiaosong Zhang:
Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism. ICC 2022: 13-18 - [c53]Mingyuan Huang, Sheng Cao, Xiong Li, Ke Huang, Xiaosong Zhang:
Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle. ICC 2022: 1245-1250 - [c52]Kangyi Ding, Teng Hu, Xiaolei Liu, Weina Niu, Yanping Wang, Xiaosong Zhang:
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models. ICME 2022: 1-6 - [c51]Yuanfei Li, Xiong Li, Shuai Shang, Xiaosong Zhang:
TSHN: A Trajectory Similarity Hybrid Networks for Dummy Trajectory Identification. ICPADS 2022: 338-345 - [c50]Jingwei Li, Guoli Wei, Jiacheng Liang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang:
Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution. INFOCOM 2022: 290-299 - [c49]Xiaoxiao Zhou, Weina Niu, Xiaosong Zhang, Ruidong Chen, Yan Wang:
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures. KSEM (3) 2022: 27-38 - [c48]Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang:
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. TrustCom 2022: 167-174 - [c47]Dongwen Chai, Xiaofen Wang, Xiaosong Zhang, Haomiao Yang, Tao Chen:
An intrusion detection system based on multiple interpretation methods. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1304-1309 - [c46]Jiaxi Yang, Sheng Cao, Peng Xiangli, Xiong Li, Xiaosong Zhang:
Multi-dimensional Data Quick Query for Blockchain-Based Federated Learning. WASA (3) 2022: 529-540 - [c45]Sheng Cao, Qian Zhang, Dongdong Wang, Peng Xiangli, Xiaosong Zhang:
Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation. WCNC 2022: 1533-1538 - 2021
- [j82]Zhongliu Zhuo, T. Cai, Xiaosong Zhang, Fengmao Lv:
Long short-term memory on abstract syntax tree for SQL injection detection. IET Softw. 15(2): 188-197 (2021) - [j81]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Nadra Guizani, Xiaojiang Du:
Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities. IEEE Internet Things J. 8(8): 6425-6436 (2021) - [j80]Weina Niu, Jian'An Xiao, Xiyue Zhang, Xiaosong Zhang, Xiaojiang Du, Xiaoming Huang, Mohsen Guizani:
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation. IEEE Internet Things J. 8(12): 9905-9919 (2021) - [j79]Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu, Kun Zhou, Yuan Liu:
Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manag. 58(2): 102462 (2021) - [j78]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du:
Scalable and redactable blockchain with update and anonymity. Inf. Sci. 546: 25-41 (2021) - [j77]Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, Xiaosong Zhang:
A low-query black-box adversarial attack based on transferability. Knowl. Based Syst. 226: 107102 (2021) - [j76]Ke Huang, Yi Mu, Fatemeh Rezaeibagha, Xiaosong Zhang, Ting Chen:
Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example. IEEE Netw. 35(6): 240-246 (2021) - [j75]Weina Niu, Jiao Xie, Xiaosong Zhang, Chong Wang, Xin-Qiang Li, Ruidong Chen, Xiao-Lei Liu:
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis. Secur. Commun. Networks 2021: 6653386:1-6653386:12 (2021) - [j74]Xiong Li, Shanpeng Liu, Rongxing Lu, Xiaosong Zhang:
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage. IEEE Trans. Big Data 7(6): 975-977 (2021) - [j73]Ting Chen, Youzheng Feng, Zihao Li, Hao Zhou, Xiapu Luo, Xiaoqi Li, Xiuzhuo Xiao, Jiachi Chen, Xiaosong Zhang:
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts. IEEE Trans. Emerg. Top. Comput. 9(3): 1433-1448 (2021) - [j72]Kun Wan, Xiaolei Liu, Jianyu Yu, Xiaosong Zhang, Xiaojiang Du, Nadra Guizani:
Compiler-Based Efficient CNN Model Construction for 5G Edge Devices. IEEE Trans. Intell. Transp. Syst. 22(8): 5261-5274 (2021) - [c44]Sheng Cao, Yashuang Mei, Xiangli Peng, Xiaoming Huang, Xiaosong Zhang:
AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism. ICC 2021: 1-6 - [c43]Qian Zhang, Sheng Cao, Xiaosong Zhang:
Enabling Auction-based Cross-Blockchain Protocol for Online Anonymous Payment. ICPADS 2021: 715-722 - [c42]Yanjing Ren, Jingwei Li, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang:
Accelerating Encrypted Deduplication via SGX. USENIX ATC 2021: 957-971 - 2020
- [j71]Deng Tang, Haode Yan, Zhengchun Zhou, Xiaosong Zhang:
A new lower bound on the second-order nonlinearity of a class of monomial bent functions. Cryptogr. Commun. 12(1): 77-83 (2020) - [j70]Jiazhong Lu, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Yu Cao:
An equalisation control method for network big data transmission based on parallel computing. Int. J. Internet Protoc. Technol. 13(1): 32-38 (2020) - [j69]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j68]Sheng Cao, Xiaosong Zhang, Rixin Xu:
Toward Secure Storage in Cloud-based eHealth Systems: A Blockchain-Assisted Approach. IEEE Netw. 34(2): 64-70 (2020) - [j67]Isaac Amankona Obiri, Qi Xia, Hu Xia, Kwame Opuni-Boachie Obour Agyekum, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Xiaosong Zhang, Jianbin Gao:
A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques. Secur. Commun. Networks 2020: 8869057:1-8869057:18 (2020) - [j66]Weina Niu, Rong Cao, Xiaosong Zhang, Kangyi Ding, Kaimeng Zhang, Ting Li:
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning. Sensors 20(13): 3645 (2020) - [j65]Teng Hu, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, Xiaosong Zhang:
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats. Sensors 20(18): 5297 (2020) - [j64]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [j63]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaojiang Du, Nadra Guizani:
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain. IEEE Trans. Ind. Informatics 16(4): 2677-2686 (2020) - [j62]Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. ACM Trans. Internet Techn. 20(2): 18:1-18:32 (2020) - [j61]Jingwei Li, Patrick P. C. Lee, Chufeng Tan, Chuan Qin, Xiaosong Zhang:
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses. ACM Trans. Storage 16(1): 4:1-4:30 (2020) - [c41]Xiaolei Liu, Kun Wan, Yufei Ding, Xiaosong Zhang, Qingxin Zhu:
Weighted-Sampling Audio Adversarial Example Attack. AAAI 2020: 4908-4915 - [c40]Yanping Wang, Xiaofen Wang, Pan Wen, Teng Hu, Xiaosong Zhang:
A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities. CSoNet 2020: 283-294 - [c39]Jingwei Li, Zuoru Yang, Yanjing Ren, Patrick P. C. Lee, Xiaosong Zhang:
Balancing storage efficiency and data confidentiality with tunable encrypted deduplication. EuroSys 2020: 22:1-22:15 - [c38]Sheng Cao, Sixuan Dang, Xiaojiang Du, Mohsen Guizani, Xiaosong Zhang, Xiaoming Huang:
An Electric Vehicle Charging Reservation Approach Based on Blockchain. GLOBECOM 2020: 1-6 - [c37]Sheng Cao, Jing Wang, Xiaojiang Du, Xiaosong Zhang, Xiaolin Qin:
CEPS: A Cross-Blockchain based Electronic Health Records Privacy-Preserving Scheme. ICC 2020: 1-6 - [c36]Sheng Cao, Jiecheng Zou, Xiaojiang Du, Xiaosong Zhang:
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid. ICC 2020: 1-6 - [c35]Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts. NDSS 2020
2010 – 2019
- 2019
- [j60]Rajesh Kumar, Xiaosong Zhang, Wenyong Wang, Riaz Ullah Khan, Jay Kumar, Abubaker Sharif:
A Multimodal Malware Detection Technique for Android IoT Devices Using Various Features. IEEE Access 7: 64411-64430 (2019) - [j59]Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani:
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment. Comput. Electr. Eng. 80 (2019) - [j58]Jiazhong Lu, Kai Chen, Zhongliu Zhuo, Xiaosong Zhang:
A temporal correlation and traffic analysis approach for APT attacks detection. Clust. Comput. 22(Supplement): 7347-7358 (2019) - [j57]Xiaolei Liu, Zhongliu Zhuo, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani:
Adversarial attacks against profile HMM website fingerprinting detection model. Cogn. Syst. Res. 54: 83-89 (2019) - [j56]Zehui Shao, Huiqin Jiang, Pu Wu, Shaohui Wang, Janez Zerovnik, Xiaosong Zhang, Jia-Bao Liu:
On 2-rainbow domination of generalized Petersen graphs. Discret. Appl. Math. 257: 370-384 (2019) - [j55]Jiazhong Lu, Weina Niu, Xiaolei Liu, Teng Hu, Xiaosong Zhang:
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm. Int. J. Pattern Recognit. Artif. Intell. 33(13): 1958009:1-1958009:17 (2019) - [j54]Jiazhong Lu, Xiaolei Liu, Teng Hu, Jianwei Zhang, Xiaosong Zhang:
Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus. Int. J. Pattern Recognit. Artif. Intell. 33(14): 1955015:1-1955015:15 (2019) - [j53]Haomiao Yang, Qixian Zhou, Mingxuan Yao, Rongxing Lu, Hongwei Li, Xiaosong Zhang:
A Practical and Compatible Cryptographic Solution to ADS-B Security. IEEE Internet Things J. 6(2): 3322-3334 (2019) - [j52]Sheng Cao, Gexiang Zhang, Pengfei Liu, Xiaosong Zhang, Ferrante Neri:
Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain. Inf. Sci. 485: 427-440 (2019) - [j51]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Hao Wang, Yulei Wu:
Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things. Inf. Sci. 491: 251-264 (2019) - [j50]Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaosong Zhang:
An efficient multiple-user location-based query authentication approach for social networking. J. Inf. Secur. Appl. 47: 284-294 (2019) - [j49]Zehui Shao, Zepeng Li, Pu Wu, Lanxiang Chen, Xiaosong Zhang:
Multi-factor combination authentication using fuzzy graph domination model. J. Intell. Fuzzy Syst. 37(4): 4979-4985 (2019) - [j48]Hong Yang, Pu Wu, Sakineh Nazari-Moghaddam, Seyed Mahmoud Sheikholeslami, Xiaosong Zhang, Zehui Shao, Yuan Yan Tang:
Bounds for signed double Roman k-domination in trees. RAIRO Oper. Res. 53(2): 627-643 (2019) - [j47]Weina Niu, Ting Li, Xiaosong Zhang, Teng Hu, Tianyu Jiang, Heng Wu:
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. Secur. Commun. Networks 2019: 2182615:1-2182615:11 (2019) - [j46]Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. Secur. Commun. Networks 2019: 3898951:1-3898951:12 (2019) - [j45]Dong Wang, Xiaosong Zhang, Ting Chen, Jingwei Li:
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface. Secur. Commun. Networks 2019: 5076324:1-5076324:19 (2019) - [j44]Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Wei Deng:
Integrating Traffics with Network Device Logs for Anomaly Detection. Secur. Commun. Networks 2019: 5695021:1-5695021:10 (2019) - [j43]Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, Mohsen Guizani:
Adversarial Samples on Android Malware Detection Systems for IoT Systems. Sensors 19(4): 974 (2019) - [j42]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [j41]Weina Niu, Zhongliu Zhuo, Xiaosong Zhang, Xiaojiang Du, Guowu Yang, Mohsen Guizani:
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification. IEEE Trans. Veh. Technol. 68(4): 3843-3853 (2019) - [j40]Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar:
Analysis of ResNet and GoogleNet models for malware detection. J. Comput. Virol. Hacking Tech. 15(1): 29-37 (2019) - [j39]Weina Niu, Xiaosong Zhang, Xiaojiang Du, Teng Hu, Xin Xie, Nadra Guizani:
Detecting Malware on X86-Based IoT Devices in Autonomous Driving. IEEE Wirel. Commun. 26(4): 80-87 (2019) - [c34]Xin Xie, Weina Niu, Xiaosong Zhang, Zhongwei Ren, Yuheng Luo, Jiangchao Li:
Co-Clustering Host-Domain Graphs to Discover Malware Infection. AIAM (ACM) 2019: 49:1-49:6 - [c33]Riaz Ullah Khan, Xiaosong Zhang, Mamoun Alazab, Rajesh Kumar:
An Improved Convolutional Neural Network Model for Intrusion Detection in Networks. CCC 2019: 74-77 - [c32]Riaz Ullah Khan, Rajesh Kumar, Mamoun Alazab, Xiaosong Zhang:
A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity. CCC 2019: 136-142 - [c31]Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. CCS 2019: 1503-1520 - [c30]Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ting Wang, Teng Hu, Xiuzhuo Xiao, Dong Wang, Jin Huang, Xiaosong Zhang:
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts. ESEM 2019: 1-11 - [c29]Ting Chen, Teng Hu, Jiachi Chen, Xiaosong Zhang, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng:
DataEther: Data Exploration Framework For Ethereum. ICDCS 2019: 1369-1380 - [c28]Jingwei Li, Patrick P. C. Lee, Yanjing Ren, Xiaosong Zhang:
Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection. MSST 2019: 269-281 - [i7]Xiaolei Liu, Yuheng Luo, Xiaosong Zhang, Qingxin Zhu:
A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. CoRR abs/1901.09892 (2019) - [i6]Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani:
Adversarial Samples on Android Malware Detection Systems for IoT Systems. CoRR abs/1902.04238 (2019) - [i5]Jingwei Li, Patrick P. C. Lee, Chufeng Tan, Chuan Qin, Xiaosong Zhang:
Information Leakage in Encrypted Deduplication via Frequency Analysis: Attacks and Defenses. CoRR abs/1904.05736 (2019) - 2018
- [j38]Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiaosong Zhang, Guishan Dong:
GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access 6: 9917-9925 (2018) - [j37]Zepeng Li, Zehui Shao, Fangnian Lang, Xiaosong Zhang, Jia-Bao Liu:
Computational Complexity of Outer-Independent Total and Total Roman Domination Numbers in Trees. IEEE Access 6: 35544-35550 (2018) - [j36]Yong Wang, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang:
Interactive Multiple-User Location-Based Keyword Queries on Road Networks. IEEE Access 6: 51401-51418 (2018) - [j35]Zhitao Guan, Guanlin Si, Xiaosong Zhang, Longfei Wu, Nadra Guizani, Xiaojiang Du, Yinglong Ma:
Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities. IEEE Commun. Mag. 56(7): 82-88 (2018) - [j34]Yong Wang, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang:
Processing Multiple-User Location-Based Keyword Queries. IEICE Trans. Inf. Syst. 101-D(6): 1552-1561 (2018) - [j33]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model. Int. J. Netw. Secur. 20(2): 345-358 (2018) - [j32]Weina Niu, Xiaosong Zhang, Guowu Yang, Zhongliu Zhuo, Jiazhong Lu:
具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate). 计算机科学 45(7): 135-138 (2018) - [j31]Zhihong Rao, Weina Niu, Xiaosong Zhang, Hongwei Li:
Tor anonymous traffic identification based on gravitational clustering. Peer-to-Peer Netw. Appl. 11(3): 592-601 (2018) - [j30]Xiaolei Liu, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, Xiaojiang Du:
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems. Sensors 18(8): 2630 (2018) - [j29]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
System-level attacks against android by exploiting asynchronous programming. Softw. Qual. J. 26(3): 1037-1062 (2018) - [j28]Zhongliu Zhuo, Yang Zhang, Zhi-Li Zhang, Xiaosong Zhang, Jingzhong Zhang:
Website Fingerprinting Attack on Anonymity Networks Based on Profile Hidden Markov Model. IEEE Trans. Inf. Forensics Secur. 13(5): 1081-1095 (2018) - [j27]Rang Zhou, Xiaosong Zhang, Xiaojiang Du, Xiaofen Wang, Guowu Yang, Mohsen Guizani:
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3648-3658 (2018) - [j26]Dong Wang, Xiaosong Zhang, Jiang Ming, Ting Chen, Chao Wang, Weina Niu:
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device. Wirel. Commun. Mob. Comput. 2018: 7849065:1-7849065:15 (2018) - [c27]Binlin Cheng, Jiang Ming, Jianming Fu, Guojun Peng, Ting Chen, Xiaosong Zhang, Jean-Yves Marion:
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost. CCS 2018: 395-411 - [c26]Fengguo Wei, Xingwei Lin, Xinming Ou, Ting Chen, Xiaosong Zhang:
JN-SAF: Precise and Efficient NDK/JNI-aware Inter-language Static Analysis Framework for Security Vetting of Android Applications with Native Code. CCS 2018: 1137-1150 - [c25]Ting Chen, Wanyu Huang, Muhui Jiang, Xiapu Luo, Lei Xue, Ying Wang, Xiaosong Zhang:
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions. COMPSAC (1) 2018: 276-285 - [c24]Yong Wang, Abdelrhman Hassan, Xiaoran Duan, Xiaodong Yang, Yiquan Zhang, Xiaosong Zhang:
An Authentication Approach for Multiple-User Location-Based Queries. FCS 2018: 256-270 - [c23]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Wanpeng Li:
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data. ICA3PP (4) 2018: 288-302 - [c22]Rajesh Kumar, Xiaosong Zhang, Riaz Ullah Khan, Jay Kumar, Ijaz Ahad:
Effective and Explainable Detection of Android Malware Based on Machine Learning Algorithms. ICCAI 2018: 35-40 - [c21]Rajesh Kumar, Xiaosong Zhang, Riaz Ullah Khan, Ijaz Ahad, Jay Kumar:
Malicious Code Detection based on Image Processing Using Deep Learning. ICCAI 2018: 81-85 - [c20]Riaz Ullah Khan, Xiaosong Zhang, Rajesh Kumar, Emelia Opoku Aboagye:
Evaluating the Performance of ResNet Model Based on Image Recognition. ICCAI 2018: 86-90 - [c19]Jiazhong Lu, Fengmao Lv, Quan-Hui Liu, Malu Zhang, Xiaosong Zhang:
Botnet Detection based on Fuzzy Association Rules. ICPR 2018: 578-584 - [c18]Ting Chen, Zihao Li, Hao Zhou, Jiachi Chen, Xiapu Luo, Xiaoqi Li, Xiaosong Zhang:
Towards saving money in using smart contracts. ICSE (NIER) 2018: 81-84 - [c17]Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. INFOCOM 2018: 1484-1492 - [c16]Ting Chen, Youzheng Feng, Xingwei Lin, Zihao Li, Xiaosong Zhang:
DBAF: Dynamic Binary Analysis Framework and Its Applications. NSS 2018: 361-375 - [e1]Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents] - [i4]Zhitao Guan, Guanlin Si, Xiaosong Zhang, Longfei Wu, Nadra Guizani, Xiaojiang Du, Yinglong Ma:
Privacy-preserving and Efficient Aggregation based on Blockchain for Power Grid Communications in Smart Communities. CoRR abs/1806.01056 (2018) - 2017
- [j25]Qian He, Ning Zhang, Jinshu Su, Xiaosong Zhang:
Fast backup and recovery for web protectiuon using trigger and block hash approach. Comput. Syst. Sci. Eng. 32(2) (2017) - [j24]Weina Niu, Xiaosong Zhang, Guowu Yang, Ruidong Chen, Dong Wang:
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution. IEICE Trans. Inf. Syst. 100-D(10): 2275-2286 (2017) - [j23]Fengmao Lv, Guowu Yang, Wenjing Yang, Xiaosong Zhang, Kenli Li:
The convergence and termination criterion of quantum-inspired evolutionary neural networks. Neurocomputing 238: 157-167 (2017) - [j22]Qi Xia, Emmanuel Boateng Sifah, Abla Smahi, Sandro Amofa, Xiaosong Zhang:
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments. Inf. 8(2): 44 (2017) - [j21]Zehui Shao, Xiaosong Zhang, Huiqin Jiang, Bo Wang, Juanjuan He:
On the L(2, 1)-labeling conjecture for brick product graphs. J. Comb. Optim. 34(3): 706-724 (2017) - [j20]Ke Huang, Xiaosong Zhang, Xiao-Fen Wang:
Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data. J. Inf. Sci. Eng. 33(4): 891-905 (2017) - [j19]Chunming Tang, Zhengchun Zhou, Yanfeng Qi, Xiaosong Zhang, Cuiling Fan, Tor Helleseth:
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees. IEEE Trans. Inf. Theory 63(10): 6149-6157 (2017) - [c15]Jingwei Li, Chuan Qin, Patrick P. C. Lee, Xiaosong Zhang:
Information Leakage in Encrypted Deduplication via Frequency Analysis. DSN 2017: 1-12 - [c14]Weina Niu, Xiaosong Zhang, Guowu Yang, Zhiyuan Ma, Zhongliu Zhuo:
Phishing Emails Detection Using CS-SVM. ISPA/IUCC 2017: 1054-1059 - [c13]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Xiaojiang Du, Ruonan Zhang:
EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data. ISPA/IUCC 2017: 1281-1288 - [c12]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. ISPEC 2017: 3-24 - [c11]Haomiao Yang, Yunfan Huang, Yong Yu, Mingxuan Yao, Xiaosong Zhang:
Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. ISPEC 2017: 102-117 - [c10]Ting Chen, Yang Xu, Xiaosong Zhang:
A Program Manipulation Middleware and Its Applications on System Security. SecureComm 2017: 606-626 - [c9]Ting Chen, Youzheng Feng, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Cloud-based parallel concolic execution. SANER 2017: 437-441 - [c8]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
Under-optimized smart contracts devour your money. SANER 2017: 442-446 - [i3]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
Under-Optimized Smart Contracts Devour Your Money. CoRR abs/1703.03994 (2017) - [i2]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. CoRR abs/1712.06438 (2017) - 2016
- [j18]Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang, Xiaosong Zhang:
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds. Concurr. Comput. Pract. Exp. 28(10): 2877-2888 (2016) - [j17]Xiaolei Liu, Xiaosong Zhang, Yiqi Jiang, Qingxin Zhu:
Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks. IEICE Trans. Inf. Syst. 99-D(6): 1595-1602 (2016) - [j16]Xiaofen Wang, Yi Mu, Rongmao Chen, Xiaosong Zhang:
Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31(5): 1012-1027 (2016) - [j15]Zhongliu Zhuo, Xiaosong Zhang, Weina Niu, Guowu Yang, Jingzhong Zhang:
Improving data field hierarchical clustering using Barnes-Hut algorithm. Pattern Recognit. Lett. 80: 113-120 (2016) - [j14]Zhongliu Zhuo, Xiaosong Zhang, Ruixing Li, Ting Chen, Jingzhong Zhang:
A multi-granularity heuristic-combining approach for censorship circumvention activity identification. Secur. Commun. Networks 9(16): 3178-3189 (2016) - [c7]Ting Chen, Haiyang Tang, Xiaodong Lin, Kuang Zhou, Xiaosong Zhang:
Silent Battery Draining Attack against Android Systems by Subverting Doze Mode. GLOBECOM 2016: 1-6 - [c6]Weina Niu, Xiaosong Zhang, Kenli Li, Guowu Yang, Ruidong Chen:
Modeling Attack Process of Advanced Persistent Threat. SpaCCS 2016: 383-391 - [i1]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem. IACR Cryptol. ePrint Arch. 2016: 388 (2016) - 2015
- [j13]Ting Chen, Xiaodong Lin, Jin Huang, Abel Bacchus, Xiaosong Zhang:
An empirical investigation into path divergences for concolic execution using CREST. Secur. Commun. Networks 8(18): 3667-3681 (2015) - [j12]Ting Chen, Xiaosong Zhang, Xiao-li Ji, Cong Zhu, Yang Bai, Yue Wu:
Test Generation for Embedded Executables via Concolic Execution in a Real Environment. IEEE Trans. Reliab. 64(1): 284-296 (2015) - [j11]Lijun Wu, Kaile Su, Shaowei Cai, Xiaosong Zhang, Chenyi Zhang, Shupeng Wang:
An I/O Efficient Approach for Detecting All Accepting Cycles. IEEE Trans. Software Eng. 41(8): 730-744 (2015) - [j10]Lijun Wu, Huijia Huang, Kaile Su, Shaowei Cai, Xiaosong Zhang:
An I/O Efficient Model Checking Algorithm for Large-Scale Systems. IEEE Trans. Very Large Scale Integr. Syst. 23(5): 905-915 (2015) - [c5]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem. CollaborateCom 2015: 243-256 - [c4]Xiaofen Wang, Xiaosong Zhang, Yi Mu:
Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud. SmartCity 2015: 1024-1031 - 2014
- [j9]Ting Chen, Xiaosong Zhang, Yue Wu:
FPM: Four-factors Propagation Model for passive P2P worms. Future Gener. Comput. Syst. 36: 133-141 (2014) - [c3]Ting Chen, Xiaosong Zhang, Rui-dong Chen, Bo Yang, Yang Bai:
Conpy: Concolic Execution Engine for Python Applications. ICA3PP (2) 2014: 150-163 - 2013
- [j8]Ting Chen, Xiaosong Zhang, Shi-ze Guo, Hong-yuan Li, Yue Wu:
State of the art: Dynamic symbolic execution for automated test generation. Future Gener. Comput. Syst. 29(7): 1758-1773 (2013) - [j7]Ying Sun, Yong Yu, Xiaosong Zhang, Jiwen Chai:
On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(3): 721-723 (2013) - [j6]Ting Chen, Xiaosong Zhang, Hong-yuan Li, Dong Wang, Yue Wu:
Propagation modeling of active P2P worms based on ternary matrix. J. Netw. Comput. Appl. 36(5): 1387-1394 (2013) - [j5]Ting Chen, Xiaosong Zhang, Cong Zhu, Xiao-li Ji, Shi-ze Guo, Yue Wu:
Design and implementation of a dynamic symbolic execution tool for windows executables. J. Softw. Evol. Process. 25(12): 1249-1272 (2013) - [c2]Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang:
ADS-B Data Authentication Based on AH Protocol. DASC 2013: 21-24 - 2011
- [j4]Ting Chen, Xiaosong Zhang, Hua Li, Xiong-da Li, Yue Wu:
Fast quarantining of proactive worms in unstructured P2P networks. J. Netw. Comput. Appl. 34(5): 1648-1659 (2011) - [j3]Xiaosong Zhang, Ting Chen, Xiao-lin Wang, Yong Huang, Hou-bin Bao:
CRBA: A Capacity Restricted Model Evolved from BA Model for Complex Network. J. Networks 6(8): 1163-1170 (2011) - 2010
- [j2]Xiaosong Zhang, Ting Chen, Jiong Zheng, Hua Li:
Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. J. Zhejiang Univ. Sci. C 11(2): 119-129 (2010)
2000 – 2009
- 2009
- [j1]Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao:
Designated verifier proxy signature scheme without random oracles. Comput. Math. Appl. 57(8): 1352-1364 (2009) - [c1]Xiaosong Zhang, Fei Liu, Ting Chen, Hua Li:
Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention. CIS (2) 2009: 376-379
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint