关注
Ziming Zhao
Ziming Zhao
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
ERNN: Error-resilient RNN for encrypted traffic detection towards network-induced phenomena
Z Zhao, Z Li, J Jiang, F Yu, F Zhang, C Xu, X Zhao, R Zhang, S Guo
IEEE Transactions on Dependable and Secure Computing, 2023
162023
I RNN: An Incremental and Interpretable Recurrent Neural Network for Encrypted Traffic Classification
Z Song, Z Zhao, F Zhang, G Xiong, G Cheng, X Zhao, S Guo, B Chen
IEEE Transactions on Dependable and Secure Computing, 2023
132023
SAGE: steering the adversarial generation of examples with accelerations
Z Zhao, Z Li, F Zhang, Z Yang, S Luo, T Li, R Zhang, K Ren
IEEE Transactions on Information Forensics and Security 18, 789-803, 2023
102023
Purifier: Defending data inference attacks via transforming confidence scores
Z Yang, L Wang, D Yang, J Wan, Z Zhao, EC Chang, F Zhang, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 37 (9), 10871 …, 2023
82023
DDoS family: A novel perspective for massive types of DDoS attacks
Z Zhao, Z Li, Z Zhou, J Yu, Z Song, X Xie, F Zhang, R Zhang
Computers & Security 138, 103663, 2024
72024
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts
Z Li, S Lu, R Zhang, R Xue, W Ma, R Liang, Z Zhao, S Gao
Empirical Software Engineering 27 (7), 197, 2022
72022
Effective DDoS mitigation via ML-driven in-network traffic shaping
Z Zhao, Z Liu, H Chen, F Zhang, Z Song, Z Li
IEEE Transactions on Dependable and Secure Computing, 2024
42024
CMD: co-analyzed iot malware detection and forensics via network and hardware domains
Z Zhao, Z Li, J Yu, F Zhang, X Xie, H Xu, B Chen
IEEE Transactions on Mobile Computing, 2023
42023
Work-in-progress: Towards real-time IDS via RNN and programmable switches co-designed approach
Z Zhao, Z Li, Z Song, F Zhang
2023 IEEE Real-Time Systems Symposium (RTSS), 431-434, 2023
32023
Poster: Detecting adversarial examples hidden under watermark perturbation via usable information theory
Z Zhao, Z Li, T Li, Z Song, F Zhang, R Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining
X Ling, J Yu, Z Zhao, Z Zhou, H Xu, B Chen, F Zhang
International Conference on Applied Cryptography and Network Security, 283-309, 2024
12024
VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning
Z Li, S Lu, R Zhang, Z Zhao, R Liang, R Xue, W Li, F Zhang, S Gao
IEEE Transactions on Software Engineering, 2023
12023
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm
Z Li, Z Zhao, R Zhang, H Lu, W Li, F Zhang, S Lu, R Xue
Computer Networks 250, 110563, 2024
2024
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer
Z Zhao, Z Li, T Li, J Yu, F Zhang, R Zhang
Companion Proceedings of the ACM on Web Conference 2024, 529-532, 2024
2024
Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise
T Li, Z Zhao, J Yin
Companion Proceedings of the ACM on Web Conference 2024, 557-560, 2024
2024
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection
Z Zhao, Z Li, Z Song, W Li, F Zhang
Proceedings of the ACM on Web Conference 2024, 1608-1619, 2024
2024
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events
L Li, Y He, F Huang, Z Zhao, Z Song, T Zhou, Z Li, F Zhang
2024 27th International Conference on Computer Supported Cooperative Work in …, 2024
2024
基于流谱理论的 SSL/TLS 协议攻击检测方法
郭世泽, 张帆, 宋卓学, 赵子鸣, 赵新杰, 王小娟, 罗向阳
网络与信息安全学报 8 (1), 30-40, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–18