default search action
Xiaosong Zhang 0002
Person information
- affiliation: Tangshan University, Tangshan, China
Other persons with the same name
- Xiaosong Zhang — disambiguation page
- Xiaosong Zhang 0001 — University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
- Xiaosong Zhang 0003 — Changchun University of Technology, School of Mechatronic Engineering, Changchun, China
- Xiaosong Zhang 0004 — University of Chinese Academy of Sciences, Beijing, China
- Xiaosong Zhang 0005 — Xi'an Highway Institute, Shaanxi, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j16]Yuanzhang Li, Junli Liu, Xinting Xu, Xiaosong Zhang, Zhang Li, Quanxin Zhang:
A robust packet-dropping covert channel for mobile intelligent terminals. Int. J. Intell. Syst. 37(10): 6928-6950 (2022) - 2021
- [c7]Zhibin Zhang, Xiaosong Zhang, Yuan Xue, Yuanzhang Li:
Building a Covert Timing Channel over VoIP via Packet Length. DMBD (1) 2021: 81-88 - [c6]Yujie Ma, Yuanzhang Li, Zhibin Zhang, Ruyun Zhang, Lu Liu, Xiaosong Zhang:
A Classic Multi-method Collaborative Obfuscation Strategy. DMBD (2) 2021: 90-97 - 2020
- [j15]Quanxin Zhang, Xiaosong Zhang, Yuan Xue, Jingjing Hu:
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints. Future Gener. Comput. Syst. 102: 472-480 (2020) - [j14]Yuanzhang Li, Xiaosong Zhang, Xinting Xu, Yu-an Tan:
A Robust Packet-Dropout Covert Channel over Wireless Networks. IEEE Wirel. Commun. 27(3): 60-65 (2020) - [c5]Xiaosong Zhang, Ling Pang, Linhong Guo, Yuanzhang Li:
Building Undetectable Covert Channels Over Mobile Networks with Machine Learning. ML4CS (1) 2020: 331-339
2010 – 2019
- 2019
- [j13]Xiaosong Zhang, Linhong Guo, Yuan Xue, Quanxin Zhang:
A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment. IEEE Access 7: 122214-122223 (2019) - [j12]Xiaosong Zhang, Liehuang Zhu, Xianmin Wang, Changyou Zhang, Hongfei Zhu, Yu-an Tan:
A packet-reordering covert channel over VoLTE voice and video traffics. J. Netw. Comput. Appl. 126: 29-38 (2019) - [j11]Quan-Xin Zhang, Hanxiao Gong, Xiaosong Zhang, Chen Liang, Yu-an Tan:
A sensitive network jitter measurement for covert timing channels over interactive traffic. Multim. Tools Appl. 78(3): 3493-3509 (2019) - [c4]Yuhang Zhao, Kunqing Wang, Yuan Xue, Quanxin Zhang, Xiaosong Zhang:
An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors. SmartCom 2019: 63-72 - [c3]Jinbao Gao, Yuanzhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang:
An RTP Extension for Reliable User-Data Transmission over VoIP Traffic. SocialSec 2019: 74-86 - [c2]Xiaosong Zhang, Linhong Guo, Yuan Xue, Hongwei Jiang, Lu Liu, Quanxin Zhang:
A Hybrid Covert Channel with Feedback over Mobile Networks. SocialSec 2019: 87-94 - 2018
- [j10]Xiaosong Zhang, Yu-an Tan, Chen Liang, Yuanzhang Li, Jin Li:
A Covert Channel Over VoLTE via Adjusting Silence Periods. IEEE Access 6: 9292-9302 (2018) - [j9]Jiamin Zheng, Yu-an Tan, Qikun Zhang, Xiaosong Zhang, Liehuang Zhu, Quan-Xin Zhang:
Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci. China Inf. Sci. 61(4): 048103:1-048103:3 (2018) - [j8]Yu-an Tan, Xinting Xu, Chen Liang, Xiaosong Zhang, Quan-Xin Zhang, Yuanzhang Li:
An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distributed Sens. Networks 14(5) (2018) - [j7]Xiaosong Zhang, Chen Liang, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j6]Chen Liang, Xianmin Wang, Xiaosong Zhang, Yu Zhang, Kashif Sharif, Yu-an Tan:
A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465: 162-173 (2018) - [j5]Chen Liang, Yu-an Tan, Xiaosong Zhang, Xianmin Wang, Jun Zheng, Quan-Xin Zhang:
Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118: 144-153 (2018) - [j4]Xiaosong Zhang, Yu-an Tan, Changyou Zhang, Yuan Xue, Yuanzhang Li, Jun Zheng:
A code protection scheme by process memory relocation for android devices. Multim. Tools Appl. 77(9): 11137-11157 (2018) - [j3]Yu-an Tan, Xiaosong Zhang, Kashif Sharif, Chen Liang, Quan-Xin Zhang, Yuanzhang Li:
Covert Timing Channels for IoT over Mobile Networks. IEEE Wirel. Commun. 25(6): 38-44 (2018) - 2017
- [j2]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quan-Xin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [j1]Hongfei Zhu, Yu-an Tan, Xiaosong Zhang, Liehuang Zhu, Changyou Zhang, Jun Zheng:
A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73: 106-114 (2017) - [c1]Jiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng:
An Anti-Forensics Method against Memory Acquiring for Android Devices. CSE/EUC (1) 2017: 214-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint