关注
Ming Zhong
Ming Zhong
在 zjnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Sequential model based intrusion detection system for IoT servers using deep learning methods
M Zhong, Y Zhou, G Chen
Sensors 21 (4), 1113, 2021
852021
Higher-order percolation in simplicial complexes
D Zhao, R Li, H Peng, M Zhong, W Wang
Chaos, Solitons & Fractals 155, 111701, 2022
262022
Disintegrate hypergraph networks by attacking hyperedge
H Peng, C Qian, D Zhao, M Zhong, X Ling, W Wang
Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022
242022
Targeting attack hypergraph networks
H Peng, C Qian, D Zhao, M Zhong, J Han, W Wang
Chaos: An Interdisciplinary Journal of Nonlinear Science 32 (7), 2022
222022
Percolation on simplicial complexes
D Zhao, R Li, H Peng, M Zhong, W Wang
Applied Mathematics and Computation 431, 127330, 2022
122022
EXAMINER: Automatically locating inconsistent instructions between real devices and CPU emulators for ARM
M Jiang, T Xu, Y Zhou, Y Hu, M Zhong, L Wu, X Luo, K Ren
Proceedings of the 27th ACM International Conference on Architectural …, 2022
82022
Efficient text-based evolution algorithm to hard-label adversarial attacks on text
H Peng, Z Wang, D Zhao, Y Wu, J Han, S Guo, S Ji, M Zhong
Journal of King Saud University-Computer and Information Sciences 35 (5), 101539, 2023
72023
Robustness of higher-order interdependent networks
H Peng, Y Zhao, D Zhao, M Zhong, Z Hu, J Han, R Li, W Wang
Chaos, Solitons & Fractals 171, 113485, 2023
62023
Reliability analysis of interdependent hypergraph network under different attack strategies
H Peng, Z Xie, D Zhao, M Zhong, J Han, W Wang
International Journal of Modern Physics C 34 (02), 2350027, 2023
62023
TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting
H Peng, S Guo, D Zhao, X Zhang, J Han, S Ji, X Yang, M Zhong
IEEE Transactions on Dependable and Secure Computing, 2023
52023
Message passing approach to analyze the robustness of hypergraph
H Peng, C Qian, D Zhao, M Zhong, J Han, R Li, W Wang
arXiv preprint arXiv:2302.14594, 2023
52023
A security log analysis scheme using deep learning algorithm for IDSs in social network
M Zhong, Y Zhou, G Chen
Security and Communication Networks 2021 (1), 5542543, 2021
52021
Message-passing approach to higher-order percolation
H Peng, C Qian, D Zhao, M Zhong, J Han, T Zhou, W Wang
Physica A: Statistical Mechanics and its Applications 634, 129446, 2024
32024
Digital contact tracing on hypergraphs
Y Nie, M Zhong, R Li, D Zhao, H Peng, X Zhong, T Lin, W Wang
Chaos: An Interdisciplinary Journal of Nonlinear Science 33 (6), 2023
32023
Robustness of directed higher-order networks
D Zhao, X Ling, X Zhang, H Peng, M Zhong, C Qian, W Wang
Chaos: An Interdisciplinary Journal of Nonlinear Science 33 (8), 2023
22023
Automatically Locating ARM Instructions Deviation between Real Devices and CPU Emulators
M Jiang, T Xu, Y Zhou, Y Hu, M Zhong, L Wu, X Luo, K Ren
arXiv preprint arXiv:2105.14273, 2021
22021
Robustness of interdependent directed higher-order networks against cascading failures
D Zhao, X Ling, H Peng, M Zhong, J Han, W Wang
Physica D: Nonlinear Phenomena 462, 134126, 2024
12024
Malgne: Enhancing the performance and efficiency of cfg-based malware detector by graph node embedding in low dimension space
H Peng, J Yang, D Zhao, X Xu, Y Pu, J Han, X Yang, M Zhong, S Ji
IEEE Transactions on Information Forensics and Security, 2024
12024
Cascading failures on interdependent hypergraph
C Qian, D Zhao, M Zhong, H Peng, W Wang
Communications in Nonlinear Science and Numerical Simulation, 108237, 2024
2024
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples
H Peng, Z Wang, C Wei, D Zhao, G Xu, J Han, S Guo, M Zhong, S Ji
Knowledge-Based Systems, 112188, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20