关注
zhiyu hao
zhiyu hao
ZGC Lab
在 zgclab.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Cruparamer: Learning on parameter-augmented api sequences for malware detection
X Chen, Z Hao, L Li, L Cui, Y Zhu, Z Ding, Y Liu
IEEE Transactions on Information Forensics and Security 17, 788-803, 2022
662022
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches
H Sun, L Cui, L Li, Z Ding, Z Hao, J Cui, P Liu
Computers & Security 110, 102417, 2021
602021
An improved quantitative evaluation method for network security
RR Xi, XC Yun, YZ Zhang, ZY Hao
Chinese Journal of Computers 38 (4), 749-758, 2015
492015
Vuldetector: Detecting vulnerabilities using weighted feature graph comparison
L Cui, Z Hao, Y Jiao, H Fei, X Yun
IEEE Transactions on Information Forensics and Security 16, 2004-2017, 2020
482020
Framework for risk assessment in cyber situational awareness
X Rongrong, Y Xiaochun, H Zhiyu
IET Information Security 13 (2), 149-156, 2019
312019
ShadowMonitor: An effective in-VM monitoring framework with hardware-enforced isolation
B Shi, L Cui, B Li, X Liu, Z Hao, H Shen
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
272018
API2Vec: Learning Representations of API Sequences for Malware Detection
L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
242023
Piccolo: A fast and efficient rollback system for virtual machine clusters
L Cui, Z Hao, Y Peng, X Yun
IEEE Transactions on Parallel and Distributed Systems 28 (8), 2328-2341, 2017
232017
Black box attack and network intrusion detection using machine learning for malicious traffic
Y Zhu, L Cui, Z Ding, L Li, Y Liu, Z Hao
Computers & Security 123, 102922, 2022
212022
Introspection-based memory pruning for live VM migration
C Wang, Z Hao, L Cui, X Zhang, X Yun
International Journal of Parallel Programming 45, 1298-1309, 2017
182017
An improved quantitative evaluation method for network security
X Rongrong, Y Xiaochun, Z Yongzheng, H Zhiyu
Chinese Joural of Computers 38 (4), 749-758, 2015
142015
An empirical study of vulnerability discovery methods over the past ten years
L Cui, J Cui, Z Hao, L Li, Z Ding, Y Liu
Computers & Security 120, 102817, 2022
132022
Malware detection using automated generation of yara rules on dynamic features
Q Si, H Xu, Y Tong, Y Zhou, J Liang, L Cui, Z Hao
International Conference on Science of Cyber Security, 315-330, 2022
132022
FA-Stack: A fast array-based stack with wait-free progress guarantee
Y Peng, Z Hao
IEEE Transactions on Parallel and Distributed Systems 29 (4), 843-857, 2017
132017
Lock-free parallelization for variance-reduced stochastic gradient descent on streaming data
Y Peng, Z Hao, X Yun
IEEE Transactions on Parallel and Distributed Systems 31 (9), 2220-2231, 2020
102020
Lightweight virtual machine checkpoint and rollback for long-running applications
L Cui, Z Hao, L Li, H Fei, Z Ding, B Li, P Liu
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
102015
Exploring efficient and robust virtual machine introspection techniques
C Wang, X Yun, Z Hao, L Cui, Y Han, Q Zou
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
102015
An efficient routing mechanism in network simulation
Z Hao, X Yun, H Zhang
Simulation 84 (10-11), 511-520, 2008
102008
An efficient routing mechanism in network simulation
Z Hao, X Yun, H Zhang
20th Workshop on Principles of Advanced and Distributed Simulation (PADS'06 …, 2006
102006
Malpro: Learning on process-aware behaviors for malware detection
X Chen, Y Tong, C Du, Y Liu, Z Ding, Q Ran, Y Zhang, L Cui, Z Hao
2022 IEEE Symposium on Computers and Communications (ISCC), 01-07, 2022
82022
系统目前无法执行此操作,请稍后再试。
文章 1–20