
Yongzheng Zhang 0002
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation (PhD 2006): Harbin Institute of Technology, China
Other persons with the same name
- Yongzheng Zhang — disambiguation page
- Yongzheng Zhang 0001 — Dalhousie University
- Yongzheng Zhang 0003 — Northeast Normal University, Changchun, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j12]Yuwei Zeng
, Xiaochun Yun, Xunxun Chen, Boquan Li, Haiwei Tsang, Yipeng Wang, Tianning Zang, Yongzheng Zhang:
Finding disposable domain names: A linguistics-based stacking approach. Comput. Networks 184: 107642 (2021) - 2020
- [j11]Jiang Xie
, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. Comput. Secur. 96: 101923 (2020) - [j10]Xiaochun Yun, Ji Huang
, Yipeng Wang
, Tianning Zang, Yuan Zhou, Yongzheng Zhang:
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE Trans. Inf. Forensics Secur. 15: 2225-2240 (2020) - [c78]Hui Liu, Yongzheng Zhang, Yipeng Wang, Zheng Lin, Yige Chen:
Joint Character-Level Word Embedding and Adversarial Stability Training to Defend Adversarial Text. AAAI 2020: 8384-8391 - [c77]Tianran Chen, Yongzheng Zhang, Yupeng Tuo, Weiguang Wang:
Detecting Abnormal Congregation Through the Analysis of Massive Spatio-Temporal Data. APWeb/WAIM (2) 2020: 376-390 - [c76]Yafei Sang, Mao Tian, Yongzheng Zhang, Peng Chang, Shuyuan Zhao:
IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification. ICA3PP (3) 2020: 494-508 - [c75]Binglai Wang, Yu Dou, Yafei Sang, Yongzheng Zhang, Ji Huang:
IoTCMal: Towards A Hybrid IoT Honeypot for Capturing and Analyzing Malware. ICC 2020: 1-7 - [c74]Xiaolin Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
Challenge Collapsar (CC) Attack Traffic Detection Based on Packet Field Differentiated Preprocessing and Deep Neural Network. ICCS (3) 2020: 282-296 - [c73]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Chengwei Peng:
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. ICCS (3) 2020: 379-398 - [c72]Chen Zhao, Yongzheng Zhang, Tianning Zang, Yige Chen, Yipeng Wang:
A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. ICT 2020: 1-5 - [c71]Linshu Ouyang, Yongzheng Zhang, Hui Liu, Yige Chen, Yipeng Wang:
Gated POS-Level Language Model for Authorship Verification. IJCAI 2020: 4025-4031 - [c70]Linshu Ouyang, Yongzheng Zhang, Yipeng Wang:
Unified Graph Embedding-Based Anomalous Edge Detection. IJCNN 2020: 1-8 - [c69]Chen Zhao, Yongzheng Zhang, Yipeng Wang:
A Feature Ensemble-based Approach to Malicious Domain Name Identification from Valid DNS Responses. IJCNN 2020: 1-7 - [c68]Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Zhenyu Cheng:
Efficient Malware Originated Traffic Classification by Using Generative Adversarial Networks. ISCC 2020: 1-7
2010 – 2019
- 2019
- [c67]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
A Smart Topology Construction Method for Anti-tracking Network Based on the Neural Network. CollaborateCom 2019: 439-454 - [c66]Fei Du, Xiuguo Bao, Yongzheng Zhang, Huanhuan Yang:
GeoCET: Accurate IP Geolocation via Constraint-Based Elliptical Trajectories. CollaborateCom 2019: 603-622 - [c65]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
Achieving Dynamic Communication Path for Anti-Tracking Network. GLOBECOM 2019: 1-6 - [c64]Fei Du, Xiuguo Bao, Yongzheng Zhang:
FENet/IP: Uncovering the Fine-Grained Structure in IP Addresses. HPCC/SmartCity/DSS 2019: 921-928 - [c63]Yuwei Zeng, Tianning Zang, Yongzheng Zhang, Xunxun Chen
, Yipeng Wang:
A Comprehensive Measurement Study of Domain-Squatting Abuse. ICC 2019: 1-6 - [c62]Yongzheng Zhang, Shuyuan Zhao, Yafei Sang:
Towards Unknown Traffic Identification Using Deep Auto-Encoder and Constrained Clustering. ICCS (1) 2019: 309-322 - [c61]Yige Chen, Tianning Zang, Yongzheng Zhang, Yuan Zhou, Yipeng Wang:
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. ICNP 2019: 1-11 - [c60]Yuwei Zeng, Yongzheng Zhang, Tianning Zang, Xunxun Chen
, Yipeng Wang:
A Linguistics-based Stacking Approach to Disposable Domains Detection. ICNP 2019: 1-4 - [c59]Mao Tian, Peng Chang, Yafei Sang, Yongzheng Zhang, Shuhao Li:
Mobile Application Identification Over HTTPS Traffic Based on Multi-view Features. ICT 2019: 73-79 - [c58]Shuyuan Zhao, Yongzheng Zhang, Yafei Sang:
Towards Unknown Traffic Identification via Embeddings and Deep Autoencoders. ICT 2019: 85-89 - [c57]Bowei Li, Yongzheng Zhang, Junliang Yao, Tao Yin:
MDBA: Detecting Malware based on Bytes N-Gram with Association Mining. ICT 2019: 227-232 - [c56]Jiang Xie, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, Jia Li:
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection. IPCCC 2019: 1-8 - [c55]Changbo Tian, Yongzheng Zhang, Tao Yin, Yupeng Tuo, Ruihai Ge:
A Loss-Tolerant Mechanism of Message Segmentation and Reconstruction in Multi-path Communication of Anti-tracking Network. SecureComm (1) 2019: 490-508 - [c54]Zhicheng Liu, Xiaochun Yun, Yongzheng Zhang, Yipeng Wang:
CCGA: Clustering and Capturing Group Activities for DGA-Based Botnets Detection. TrustCom/BigDataSE 2019: 136-143 - [c53]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MURITE-Detector: Identifying User-Role in Information Theft Events of Mobile Network. TrustCom/BigDataSE 2019: 232-239 - [c52]Jia Li, Xiaochun Yun, Mao Tian, Jiang Xie, Shuhao Li, Yongzheng Zhang, Yu Zhou:
A Method of HTTP Malicious Traffic Detection on Mobile Networks. WCNC 2019: 1-8 - 2018
- [j9]Miao Yu
, Yongzheng Zhang
, Tianning Zang, Yipeng Wang, Yijing Wang:
Information Propagation Prediction Based on Key Users Authentication in Microblogging. Secur. Commun. Networks 2018: 7024842:1-7024842:7 (2018) - [c51]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Important Member Discovery of Attribution Trace Based on Relevant Circle (Short Paper). CollaborateCom 2018: 222-232 - [c50]Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang:
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper). CollaborateCom 2018: 284-294 - [c49]Fei Du, Xiuguo Bao, Yongzheng Zhang, Yu Wang:
GeoBLR: Dynamic IP Geolocation Method Based on Bayesian Linear Regression. CollaborateCom 2018: 310-328 - [c48]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Jian Xu:
MUI-defender: CNN-Driven, Network Flow-Based Information Theft Detection for Mobile Users. CollaborateCom 2018: 329-345 - [c47]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalShoot: Shooting Malicious Domains Through Graph Embedding on Passive DNS Data. CollaborateCom 2018: 488-503 - [c46]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yongji Liu, Dahui Li:
Modeling for Traffic Replay in Virtual Network. HPCC/SmartCity/DSS 2018: 495-502 - [c45]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Zhenyu Cheng:
Community Discovery of Attribution Trace Based on Deep Learning Approach. ICICS 2018: 342-357 - [c44]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li:
MalHunter: Performing a Timely Detection on Malicious Domains via a Single DNS Query. ICICS 2018: 685-695 - [c43]Tianran Chen, Yongzheng Zhang, Yupeng Tuo, Weiguang Wang:
Online Discovery of Congregate Groups on Sparse Spatio-temporal Data. PIMRC 2018: 1-7 - 2017
- [j8]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Tianning Zang:
Rethinking robust and accurate application protocol identification. Comput. Networks 129: 64-78 (2017) - [j7]Yipeng Wang, Xiaochun Yun, Yongzheng Zhang, Liwei Chen, Guangjun Wu:
A nonparametric approach to the automated protocol fingerprint inference. J. Netw. Comput. Appl. 99: 1-9 (2017) - [c42]Yafei Sang, Yongzheng Zhang, Chengwei Peng:
ProNet: Toward Payload-Driven Protocol Fingerprinting via Convolutions and Embeddings. CollaborateCom 2017: 519-529 - [c41]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Mining Users' Important Locations and Semantics on Cellular Network Data. DSC 2017: 283-291 - [c40]Yafei Sang, Yongzheng Zhang:
Fingerprinting Protocol at Bit-Level Granularity: A Graph-Based Approach Using Cell Embedding. ICPADS 2017: 266-275 - [c39]Zhenyu Cheng
, Xunxun Chen
, Yongzheng Zhang, Shuhao Li, Yafei Sang:
Detecting Information Theft Based on Mobile Network Flows for Android Users. NAS 2017: 1-10 - [c38]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
Towards Robust and Accurate Similar Trajectory Discovery: Weak-Parametric Approaches. NAS 2017: 1-10 - [c37]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
NSIM: A robust method to discover similar trajectories on cellular network location data. PIMRC 2017: 1-7 - [c36]Yupeng Tuo, Xiaochun Yun, Yongzheng Zhang:
MSTM: A novel map matching approach for low-sampling-rate trajectories. PIMRC 2017: 1-7 - [c35]Chengwei Peng, Xiaochun Yun, Yongzheng Zhang, Shuhao Li, Jun Xiao:
Discovering Malicious Domains through Alias-Canonical Graph. TrustCom/BigDataSE/ICESS 2017: 225-232 - [c34]Shuyuan Zhao, Yongzheng Zhang, Peng Chang:
Network Traffic Classification Using Tri-training Based on Statistical Flow Characteristics. TrustCom/BigDataSE/ICESS 2017: 323-330 - [c33]Jingkun Liu, Shuhao Li, Yongzheng Zhang, Jun Xiao, Peng Chang, Chengwei Peng:
Detecting DNS Tunnel through Binary-Classification Based on Behavior Features. TrustCom/BigDataSE/ICESS 2017: 339-346 - [c32]Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng:
NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis. TrustCom/BigDataSE/ICESS 2017: 691-698 - 2016
- [j6]Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang:
Quantitative threat situation assessment based on alert verification. Secur. Commun. Networks 9(13): 2135-2142 (2016) - [j5]Xiao-chun Yun, Yipeng Wang, Yongzheng Zhang, Yu Zhou
:
A Semantics-Aware Approach to the Automated Network Protocol Identification. IEEE/ACM Trans. Netw. 24(1): 583-595 (2016) - [c31]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yaqiong Peng, Xin Deng, Zhenxi Sun:
DMNS: A Framework to Dynamically Monitor Simulated Network. ICPADS 2016: 192-199 - [c30]Yafei Sang, Shicong Li, Yongzheng Zhang, Tao Xu:
ProDigger: Towards Robust Automatic Network Protocol Fingerprint Learning via Byte Embedding. Trustcom/BigDataSE/ISPA 2016: 284-291 - [c29]Tao Yin, Yongzheng Zhang, Jia Li:
AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking. Trustcom/BigDataSE/ISPA 2016: 615-622 - [c28]Yanchen Qiao
, Xiaochun Yun, Yongzheng Zhang:
How to Automatically Identify the Homology of Different Malware. Trustcom/BigDataSE/ISPA 2016: 929-936 - [c27]Yanchen Qiao
, Xiaochun Yun, Yongzheng Zhang:
Fast Reused Function Retrieval Method Based on Simhash and Inverted Index. Trustcom/BigDataSE/ISPA 2016: 937-944 - 2015
- [j4]Yu Zhou
, Xiaokang Yang, Yongzheng Zhang, Xiang Xu, Yipeng Wang, Xiujuan Chai, Weiyao Lin:
Unsupervised adaptive sign language recognition based on hypothesis comparison guided cross validation and linguistic prior filtering. Neurocomputing 149: 1604-1612 (2015) - [j3]Xiao-chun Yun, Shuhao Li
, Yongzheng Zhang:
SMS Worm Propagation Over Contact Social Networks: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 10(11): 2365-2380 (2015) - [c26]Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, Haiqiang Fei:
Traffic Replay in Virtual Network Based on IP-Mapping. ICA3PP (4) 2015: 697-713 - [c25]Yipeng Wang, Xiao-chun Yun, Yongzheng Zhang:
Rethinking Robust and Accurate Application Protocol Identification: A Nonparametric Approach. ICNP 2015: 134-144 - [c24]Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang:
A Markov Random Field Approach to Automated Protocol Signature Inference. SecureComm 2015: 459-476 - 2014
- [c23]Yu Zhou, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Perspective Scene Text Recognition with Feature Compression and Ranking. ACCV Workshops (2) 2014: 181-195 - [c22]Yu Zhou
, Shuang Liu, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Text localization in natural scene images with stroke width histogram and superpixel. APSIPA 2014: 1-4 - [c21]Tao Yin, Yongzheng Zhang, Shuhao Li:
DR-SNBot: A Social Network-Based Botnet with Strong Destroy-Resistance. NAS 2014: 191-199 - [c20]Shuang Liu, Yu Zhou, Yongzheng Zhang, Yipeng Wang, Weiyao Lin:
Text Detection in Natural Scene Images with Stroke Width Clustering and Superpixel. PCM 2014: 123-132 - [c19]Yafei Sang, Yongzheng Zhang, Yipeng Wang, Yu Zhou
, Xu Tao:
A Segmentation Pattern Based Approach to Automated Protocol Identification. PDCAT 2014: 7-12 - [c18]Lulu Zhang, Yongzheng Zhang, Tianning Zang:
Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. SecureComm (1) 2014: 454-462 - [c17]Yu Zhou
, Yongzheng Zhang, Jun Xiao, Yipeng Wang, Weiyao Lin:
Visual Similarity Based Anti-phishing with the Combination of Local and Global Features. TrustCom 2014: 189-196 - 2013
- [c16]Qingxin Zou, Zhiyu Hao, Xu Cui, Xiao-chun Yun, Yongzheng Zhang:
Counting sort for the live migration of virtual machines. CLUSTER 2013: 1-5 - [c15]Ying Zhang, Yongzheng Zhang, Jun Xiao:
Detecting the DGA-Based Malicious Domain Names. ISCTCS 2013: 130-137 - [c14]Zhenquan Ding, Zhiyu Hao, Yongzheng Zhang:
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization. PDCAT 2013: 111-116 - 2012
- [c13]Yong Wang, Xiao-chun Yun, Yongzheng Zhang, Shuyuan Jin, Yanchen Qiao:
Research of Network Vulnerability Analysis Based on Attack Capability Transfer. CIT 2012: 38-44 - [c12]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c11]Yongzheng Zhang, Xiaochun Yun:
Modeling of Hierarchical Index System for Network Operation Security. ISCTCS 2012: 580-590 - [c10]Shicong Li, Xiao-chun Yun, Yongzheng Zhang, Jun Xiao, Yipeng Wang:
A General Framework of Trojan Communication Detection Based on Network Traces. NAS 2012: 49-58 - [c9]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [j2]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Parallelizing weighted frequency counting in high-speed network monitoring. Comput. Commun. 34(4): 536-547 (2011) - [c8]Rongrong Xi, Xiao-chun Yun, Shuyuan Jin, Yongzheng Zhang:
Network Threat Assessment Based on Alert Verification. PDCAT 2011: 30-34 - [c7]Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. TrustCom 2011: 482-487 - 2010
- [j1]Yu Zhang, Binxing Fang, Yongzheng Zhang:
Identifying heavy hitters in high-speed network monitoring. Sci. China Inf. Sci. 53(3): 659-676 (2010) - [c6]Tianning Zang, Xiao-chun Yun, Tianyi Zang, Yongzheng Zhang, Chaoguang Men:
Cooperative Work Systems for the Security of Digital Computing Infrastructure. ICPADS 2010: 676-681
2000 – 2009
- 2008
- [c5]Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. ISCC 2008: 332-339 - [c4]Tianning Zang, Xiao-chun Yun, Yongzheng Zhang:
A Survey of Alert Fusion Techniques for Security Incident. WAIM 2008: 475-481 - 2005
- [c3]Yongzheng Zhang, Binxing Fang, Yue Chi, Xiao-chun Yun:
Assessment of Windows System Security Using Vulnerability Relationship Graph. CIS (2) 2005: 415-420 - [c2]Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang:
Computer Vulnerability Evaluation Using Fault Tree Analysis. ISPEC 2005: 302-313 - 2004
- [c1]Yongzheng Zhang, Xiao-chun Yun:
A New Vulnerability Taxonomy Based on Privilege Escalation. ICEIS (3) 2004: 596-600
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-11 01:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint