default search action
Zhi Xue
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Wenyu Wang, Yanqin Zhao, Zhi Xue:
YOLOv8-Coal: a coal-rock image recognition method based on improved YOLOv8. PeerJ Comput. Sci. 10: e2313 (2024) - [j25]Libo Chen, Yanhao Wang, Jiaqi Linghu, Qinsheng Hou, Quanpu Cai, Shanqing Guo, Zhi Xue:
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 2421-2433 (2024) - [j24]Ruijie Zhao, Mingwei Zhan, Xianwen Deng, Fangqi Li, Yanhao Wang, Yijun Wang, Guan Gui, Zhi Xue:
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification. IEEE/ACM Trans. Netw. 32(3): 2012-2025 (2024) - [c45]Wenlong Du, Jian Li, Yanhao Wang, Libo Chen, Ruijie Zhao, Junmin Zhu, Zhengguang Han, Yijun Wang, Zhi Xue:
Vulnerability-oriented Testing for RESTful APIs. USENIX Security Symposium 2024 - [c44]Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue:
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection. USENIX Security Symposium 2024 - [c43]Xianwen Deng, Yijun Wang, Zhi Xue:
AN-Net: an Anti-Noise Network for Anonymous Traffic Classification. WWW 2024: 4417-4428 - 2023
- [j23]Ruijie Zhao, Yijun Wang, Zhi Xue, Tomoaki Ohtsuki, Bamidele Adebisi, Guan Gui:
Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things. IEEE Internet Things J. 10(10): 8645-8657 (2023) - [j22]Ruijie Zhao, Yiteng Huang, Xianwen Deng, Yong Shi, Jiabin Li, Zijing Huang, Yijun Wang, Zhi Xue:
A Novel Traffic Classifier With Attention Mechanism for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10799-10810 (2023) - [c42]Ruijie Zhao, Mingwei Zhan, Xianwen Deng, Yanhao Wang, Yijun Wang, Guan Gui, Zhi Xue:
Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation. AAAI 2023: 5420-5427 - [c41]Yuwei Liu, Siqi Chen, Yuchong Xie, Yanhao Wang, Libo Chen, Bin Wang, Yingming Zeng, Zhi Xue, Purui Su:
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device. ASE 2023: 1676-1687 - [c40]Han Zhang, Libo Chen, Ming Liu, Yong Shi, Songyang Wu, Zhi Xue:
Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC. MSN 2023: 855-861 - [c39]Junmin Zhu, Yizhao Yao, Xianwen Deng, Yaoguang Yong, Yanhao Wang, Libo Chen, Zhi Xue, Ruijie Zhao:
SAWD: Structural-Aware Webshell Detection System with Control Flow Graph. SEKE 2023: 351-356 - [c38]Ruijie Zhao, Xianwen Deng, Yanhao Wang, Zhicong Yan, Zhengguang Han, Libo Chen, Zhi Xue, Yijun Wang:
GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas. SP 2023: 1649-1666 - [c37]Han Zhang, Dengke Mi, Libo Chen, Ming Liu, Yong Shi, Zhi Xue:
Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email Security. SRDS 2023: 140-150 - 2022
- [j21]Ruijie Zhao, Guan Gui, Zhi Xue, Jie Yin, Tomoaki Ohtsuki, Bamidele Adebisi, Haris Gacanin:
A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things. IEEE Internet Things J. 9(12): 9960-9972 (2022) - [j20]Libo Chen, Yihang Xia, Zhenbang Ma, Ruijie Zhao, Yanhao Wang, Yue Liu, Wenqi Sun, Zhi Xue:
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection. J. Inf. Secur. Appl. 71: 103351 (2022) - [c36]Libo Chen, Quanpu Cai, Zhenbang Ma, Yanhao Wang, Hong Hu, Minghang Shen, Yue Liu, Shanqing Guo, Haixin Duan, Kaida Jiang, Zhi Xue:
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems. CCS 2022: 485-498 - [c35]Ruijie Zhao, Linbo Yang, Yijun Wang, Zhi Xue, Guan Gui, Tomoaki Ohtsuki:
A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection. ICC 2022: 2688-2693 - [c34]Ruijie Zhao, Tiantian Tang, Guan Gui, Zhi Xue:
A Lightweight Semi-Supervised Learning Method Based on Consistency Regularization for Intrusion Detection. ICC 2022: 3124-3129 - [c33]Xianwen Deng, Ruijie Zhao, Yanhao Wang, Libo Chen, Yijun Wang, Zhi Xue:
3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas. IJCAI 2022: 3817-3824 - [c32]Ruijie Zhao, Xianwen Deng, Yanhao Wang, Libo Chen, Ming Liu, Zhi Xue, Yijun Wang:
Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks. IWQoS 2022: 1-10 - [c31]Ruijie Zhao, Xianwen Deng, Zhicong Yan, Jun Ma, Zhi Xue, Yijun Wang:
MT-FlowFormer: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification. KDD 2022: 2576-2584 - [c30]Zilong Lin, Yong Shi, Zhi Xue:
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection. PAKDD (3) 2022: 79-91 - 2021
- [j19]Jiabin Li, Zhi Xue, Changlian Li, Ming Liu:
RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles. IEEE Access 9: 11296-11305 (2021) - [j18]Ming Liu, Zhi Xue, Xiangjian He:
Two-Tier Intrusion Detection Framework for Embedded Systems. IEEE Consumer Electron. Mag. 10(5): 102-108 (2021) - [j17]Ruijie Zhao, Jie Yin, Zhi Xue, Guan Gui, Bamidele Adebisi, Tomoaki Ohtsuki, Haris Gacanin, Hikmet Sari:
An Efficient Intrusion Detection Method Based on Dynamic Autoencoder. IEEE Wirel. Commun. Lett. 10(8): 1707-1711 (2021) - [c29]Ruijie Zhao, Yu Chen, Yijun Wang, Yong Shi, Zhi Xue:
An Efficient and Lightweight Approach for Intrusion Detection based on Knowledge Distillation. ICC 2021: 1-6 - [c28]Ruijie Zhao, Yiteng Huang, Xianwen Deng, Zhi Xue, Jiabin Li, Zijing Huang, Yijun Wang:
Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism. MSN 2021: 223-230 - [c27]Xianwen Deng, Ruijie Zhao, Zhi Xue, Ming Liu, Libo Chen, Yijun Wang:
A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs. TrustCom 2021: 614-619 - [c26]Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan, Hong Hu, Jiaqi Linghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue:
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems. USENIX Security Symposium 2021: 303-319 - [c25]Ruijie Zhao, Zhaojie Li, Zhi Xue, Tomoaki Ohtsuki, Guan Gui:
A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection. WCNC 2021: 1-6 - [i3]Ming Liu, Zhi Xue:
A Fuzzy Post-project Evaluation Approach for Security Video Surveillance System. CoRR abs/2106.15316 (2021) - [i2]Ming Liu, Zhi Xue, Xiangjian He, Jinjun Chen:
SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls. CoRR abs/2109.11821 (2021) - 2020
- [j16]Jiabin Li, Ming Liu, Zhi Xue, Xiaochen Fan, Xiangjian He:
RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things. IEEE Access 8: 36191-36201 (2020) - [j15]Ruijie Zhao, Yue Yin, Yong Shi, Zhi Xue:
Intelligent intrusion detection based on federated learning aided long short-term memory. Phys. Commun. 42: 101157 (2020) - [c24]Ming Liu, Zhi Xue, Xiangjian He:
A Unified Host-based Intrusion Detection Framework using Spark in Cloud. TrustCom 2020: 97-103 - [c23]Han Zhang, Ming Liu, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He:
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning. TrustCom 2020: 1584-1591
2010 – 2019
- 2019
- [j14]Ming Liu, Zhi Xue, Xiangjian He, Jinjun Chen:
Cyberthreat-Intelligence Information Sharing: Enhancing Collaborative Security. IEEE Consumer Electron. Mag. 8(3): 17-22 (2019) - [j13]Ming Liu, Yuxuan He, Zhi Xue, Xiangjian He, Jinjun Chen:
MultiScan: A Private Online Virus Detection System. IEEE Consumer Electron. Mag. 8(6): 53-55 (2019) - [j12]Xiao Chen, Liang Pang, Pengze Guo, Xingping Sun, Zhi Xue, N. Arunkumar:
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel. Clust. Comput. 22(Supplement): 4091-4099 (2019) - [j11]Ming Liu, Zhi Xue, Xianghua Xu, Changmin Zhong, Jinjun Chen:
Host-Based Intrusion Detection System with System Calls: Review and Future Trends. ACM Comput. Surv. 51(5): 98 (2019) - 2018
- [j10]Pengze Guo, Ming Liu, Jun Wu, Zhi Xue, Xiangjian He:
Energy-Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud-Based 5G Networks. IEEE Access 6: 53671-53683 (2018) - [j9]Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Suraj Sharma, Zhi Xue, Albert Y. Zomaya:
Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT. IEEE Access 6: 56587-56597 (2018) - [c22]Steven Z. Lin, Yong Shi, Zhi Xue:
Character-Level Intrusion Detection Based On Convolutional Neural Networks. IJCNN 2018: 1-8 - [i1]Zilong Lin, Yong Shi, Zhi Xue:
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection. CoRR abs/1809.02077 (2018) - 2017
- [j8]Liang Pang, Xiao Chen, Yong Shi, Zhi Xue, Rida Khatoun:
Localization of multiple jamming attackers in vehicular ad hoc network. Int. J. Distributed Sens. Networks 13(8) (2017) - [c21]Liang Pang, Zhi Xue:
A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer. ICSAI 2017: 954-959 - [c20]Liang Pang, Xiao Chen, Zhi Xue, Rida Khatoun:
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm. ICPCSEE (2) 2017: 198-211 - [c19]Liang Pang, Pengze Guo, Xiao Chen, Zhi Xue:
Tracking the Mobile Jammer Continuously in Time by Using Moving Vector. ISCID (1) 2017: 43-48 - 2016
- [j7]Shuang Li, Wei Hu, Yaoxue Zhang, Yue-Zhi Zhou, Zhi Xue:
Personalised content recommendation based on field authorities in transparent computing. Int. J. Ad Hoc Ubiquitous Comput. 21(2): 119-129 (2016) - [j6]Nan Run Zhou, Xiao Rong Liang, Zhi Juan Kang, Lihua Gong, Zhi Xue:
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System. Wirel. Pers. Commun. 90(4): 1635-1645 (2016) - [c18]Pengze Guo, Zhi Xue:
Real-Time Fault-Tolerant Scheduling Algorithm in Virtualized Clouds. ChinaCom (2) 2016: 443-452 - [c17]Pengze Guo, Zhi Xue:
Improved task partition based fault-tolerant rate-monotonic scheduling algorithm. SSIC 2016: 1-5 - 2015
- [c16]Xiao Chen, Liang Pang, Yuhuan Tang, Hongpeng Yang, Zhi Xue:
Security in MIMO wireless hybrid channel with artificial noise. SSIC 2015: 1-4 - 2014
- [j5]Xinxing Yin, Zhi Xue:
Wiretap Channel with Information Embedding on Actions. Entropy 16(4): 2105-2130 (2014) - [j4]Yongkai Zhou, Zheng Zheng Xiang, Yan Zhu, Zhi Xue:
Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization. IEEE Signal Process. Lett. 21(7): 804-808 (2014) - [j3]Nanrun Zhou, Xun Chen, Chisheng Li, Zhi Xue:
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay. Wirel. Pers. Commun. 75(1): 119-129 (2014) - [c15]Xinxing Yin, Yan Zhu, Xiao Chen, Liang Pang, Zhi Xue:
Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States. CIT 2014: 263-269 - [c14]Fangbiao Li, Zhi Xue:
An inner bound on the capacity region of multiple-access channel with side information. BMEI 2014: 918-922 - [c13]Yongkai Zhou, Fangbiao Li, Pengze Guo, Zhi Xue:
Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver. ChinaCom 2014: 612-616 - [c12]Yongkai Zhou, Yan Zhu, Zhi Xue:
Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios. GLOBECOM 2014: 3320-3325 - [c11]Xinxing Yin, Liang Pang, Zhi Xue:
Information embedding on actions in wiretap channel. ICC Workshops 2014: 752-758 - [c10]Xinxing Yin, Xiao Chen, Pengze Guo, Zhi Xue:
The role of feedback in channels with information embedding on actions. ICCC 2014: 42-46 - 2013
- [j2]Yan Zhu, Yongkai Zhou, Shivani Patel, Xiao Chen, Liang Pang, Zhi Xue:
Artificial Noise Generated in MIMO Scenario: Optimal Power Design. IEEE Signal Process. Lett. 20(10): 964-967 (2013) - [c9]Yongkai Zhou, Zhi Xue, Chong Fu, Jianhua Li, Yue Wu, Yi Yuan, Yun Zhu, Yong Shi:
A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network. CSE 2013: 248-251 - [c8]Yongkai Zhou, Pengze Guo, Yan Zhu, Zhi Xue, Jianhua Li, Yi Yuan:
Integrated Network Service to Enhance Multicast Communication. DASC 2013: 107-110 - 2012
- [c7]Yexia Cheng, Yuejin Du, Junfeng Xu, Chunyang Yuan, Zhi Xue:
Research on security evaluation of cloud computing based on attack graph. CCIS 2012: 459-465 - [c6]Wei Hu, Yaoxue Zhang, Yuezhi Zhou, Zhi Xue:
Contribution-Based User Reputation Modeling in Collaborative Recommender Systems. UIC/ATC 2012: 172-179 - 2011
- [j1]Jie Gu, Zhi Xue:
An Improved Efficient Secret Handshakes Scheme with Unlinkability. IEEE Commun. Lett. 15(2): 259-261 (2011) - 2010
- [c5]Jie Gu, Zhi Xue:
An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks. ICC 2010: 1-5
2000 – 2009
- 2008
- [c4]Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue:
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. ACSAC 2008: 215-224 - [c3]Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu:
Two Stochastic Models for Security Evaluation Based on Attack Graph. ICYCS 2008: 2198-2203 - 2007
- [c2]Baowen Zhang, William Zhu, Zhi Xue:
Mining Privilege Escalation Paths for Network Vulnerability Analysis. FSKD (4) 2007: 56-60 - [c1]Ming Zhao, Shilin Wang, Shenghong Li, Xiang Li, Zhi Xue:
Feature Analysis and Classification for Filtering Junk Information in Animation. ICNC (3) 2007: 551-555
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint