Cruparamer: Learning on parameter-augmented api sequences for malware detection X Chen, Z Hao, L Li, L Cui, Y Zhu, Z Ding, Y Liu IEEE Transactions on Information Forensics and Security 17, 788-803, 2022 | 66 | 2022 |
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches H Sun, L Cui, L Li, Z Ding, Z Hao, J Cui, P Liu Computers & Security 110, 102417, 2021 | 60 | 2021 |
An improved quantitative evaluation method for network security RR Xi, XC Yun, YZ Zhang, ZY Hao Chinese Journal of Computers 38 (4), 749-758, 2015 | 49 | 2015 |
Vuldetector: Detecting vulnerabilities using weighted feature graph comparison L Cui, Z Hao, Y Jiao, H Fei, X Yun IEEE Transactions on Information Forensics and Security 16, 2004-2017, 2020 | 48 | 2020 |
Framework for risk assessment in cyber situational awareness X Rongrong, Y Xiaochun, H Zhiyu IET Information Security 13 (2), 149-156, 2019 | 31 | 2019 |
ShadowMonitor: An effective in-VM monitoring framework with hardware-enforced isolation B Shi, L Cui, B Li, X Liu, Z Hao, H Shen Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 27 | 2018 |
API2Vec: Learning Representations of API Sequences for Malware Detection L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 24 | 2023 |
Piccolo: A fast and efficient rollback system for virtual machine clusters L Cui, Z Hao, Y Peng, X Yun IEEE Transactions on Parallel and Distributed Systems 28 (8), 2328-2341, 2017 | 23 | 2017 |
Black box attack and network intrusion detection using machine learning for malicious traffic Y Zhu, L Cui, Z Ding, L Li, Y Liu, Z Hao Computers & Security 123, 102922, 2022 | 21 | 2022 |
Introspection-based memory pruning for live VM migration C Wang, Z Hao, L Cui, X Zhang, X Yun International Journal of Parallel Programming 45, 1298-1309, 2017 | 18 | 2017 |
An improved quantitative evaluation method for network security X Rongrong, Y Xiaochun, Z Yongzheng, H Zhiyu Chinese Joural of Computers 38 (4), 749-758, 2015 | 14 | 2015 |
An empirical study of vulnerability discovery methods over the past ten years L Cui, J Cui, Z Hao, L Li, Z Ding, Y Liu Computers & Security 120, 102817, 2022 | 13 | 2022 |
Malware detection using automated generation of yara rules on dynamic features Q Si, H Xu, Y Tong, Y Zhou, J Liang, L Cui, Z Hao International Conference on Science of Cyber Security, 315-330, 2022 | 13 | 2022 |
FA-Stack: A fast array-based stack with wait-free progress guarantee Y Peng, Z Hao IEEE Transactions on Parallel and Distributed Systems 29 (4), 843-857, 2017 | 13 | 2017 |
Lock-free parallelization for variance-reduced stochastic gradient descent on streaming data Y Peng, Z Hao, X Yun IEEE Transactions on Parallel and Distributed Systems 31 (9), 2220-2231, 2020 | 10 | 2020 |
Lightweight virtual machine checkpoint and rollback for long-running applications L Cui, Z Hao, L Li, H Fei, Z Ding, B Li, P Liu Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 10 | 2015 |
Exploring efficient and robust virtual machine introspection techniques C Wang, X Yun, Z Hao, L Cui, Y Han, Q Zou Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 10 | 2015 |
An efficient routing mechanism in network simulation Z Hao, X Yun, H Zhang Simulation 84 (10-11), 511-520, 2008 | 10 | 2008 |
An efficient routing mechanism in network simulation Z Hao, X Yun, H Zhang 20th Workshop on Principles of Advanced and Distributed Simulation (PADS'06 …, 2006 | 10 | 2006 |
Malpro: Learning on process-aware behaviors for malware detection X Chen, Y Tong, C Du, Y Liu, Z Ding, Q Ran, Y Zhang, L Cui, Z Hao 2022 IEEE Symposium on Computers and Communications (ISCC), 01-07, 2022 | 8 | 2022 |