default search action
Dongdong Zhao 0001
Person information
- affiliation: Wuhan University of Technology, School of Computer Science and Technology, China
- affiliation (PhD 2016): University of Science and Technology of China, Hefei, China
Other persons with the same name
- Dongdong Zhao — disambiguation page
- Dongdong Zhao 0002 — Lanzhou University, School of Information Science and Engineering, China (and 1 more)
- Dongdong Zhao 0003 — Beijing Jiaotong University, Research Center for High-Speed Railway Network Management of Ministry of Education, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Wiraj Udara Wickramaarachchi, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
An effective iris biometric privacy protection scheme with renewability. J. Inf. Secur. Appl. 80: 103684 (2024) - [j20]Qianrong Zheng, Jianwen Xiang, Rui Hao, Xuemin Zhang, Songsong Liao, Dongdong Zhao:
A cancellable iris template protection scheme based on inverse merger and Bloom filter. J. Inf. Secur. Appl. 85: 103849 (2024) - [j19]Kai Jia, Xiao Yu, Chen Zhang, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang:
PMTT: Parallel multi-scale temporal convolution network and transformer for predicting the time to aging failure of software systems. J. Syst. Softw. 217: 112167 (2024) - [j18]Kai Jia, Xiao Yu, Chen Zhang, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang:
TTAFPred: Prediction of time to aging failure for software systems based on a two-stream multi-scale features fusion network. Softw. Qual. J. 32(4): 1481-1513 (2024) - [c49]Lihao Wang, Junwei Zhou, Dongdong Zhao, Dongqing Liao, Mengjie Wang, Jianwen Xiang:
AEDD: Anomaly Edge Detection Defense for Visual Recognition in Autonomous Vehicle Systems. CSCWD 2024: 1722-1727 - [c48]Jianwen Xiang, Xuemin Zhang, Qianrong Zheng, Longmin Deng, Dongdong Zhao, Junwei Zhou:
CIDF: Combined Intrusion Detection Framework in Industrial Control Systems based on Packet Signature and Enhanced FSFDP. Internetware 2024 - [c47]Dongdong Zhao, Zizhuo Yu, Jing Zhou, Jianwen Xiang:
A Privacy-Preserving Source Code Vulnerability Detection Method. PRCV (3) 2024: 438-452 - [i2]Baogang Song, Dongdong Zhao, Jiang Yan, Huanhuan Li, Hao Jiang:
BioDeepHash: Mapping Biometrics into a Stable Code. CoRR abs/2408.03704 (2024) - 2023
- [j17]Dongdong Zhao, Lei Liao, Wenjian Luo, Jianwen Xiang, Hao Jiang, Xiaoyi Hu:
Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden. J. Artif. Intell. Res. 76: 435-470 (2023) - [j16]Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang:
Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition. IEEE Trans. Emerg. Top. Comput. 11(3): 580-593 (2023) - [c46]Longmin Deng, Xuemin Zhang, Qianrong Zheng, Dongdong Zhao, Junwei Zhou, Jianwen Xiang:
A New Dataset for Intrusion Detection in Industrial Control System: A Gas Pipeline Testbed Study. ISPA/BDCloud/SocialCom/SustainCom 2023: 887-892 - [c45]Dongdong Zhao, Songsong Liao, Huanhuan Li, Jianwen Xiang:
Competitor Attack Model for Privacy-Preserving Deep Learning. CCGridW 2023: 133-140 - [c44]Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li:
DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation. CSCWD 2023: 1384-1389 - [c43]Wenzhi Xie, Chen Zhang, Kai Jia, Dongdong Zhao, Junwei Zhou, Jing Tian, Jianwen Xiang:
Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning. ISSREW 2023: 206-213 - [c42]Chen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo:
IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction. ISSRE 2023: 590-600 - [c41]Dongdong Zhao, Hucheng Liao, Songsong Liao, Huanhuan Li, Jianwen Xiang:
Cancelable Iris Biometrics Based on Transformation Network. QRS 2023: 507-516 - 2022
- [j15]Jianwen Xiang, Zixiang Wang, Chuanli Wu, Dongdong Zhao, Jing Tian:
Optimal redundancies of parallel-series systems in irrelevancy coverage model. Reliab. Eng. Syst. Saf. 225: 108567 (2022) - [c40]Zhen Xu, Dongdong Zhao, Fan Li, Jing Zhou:
Negative Survey with Aggregate Scores from Multiple Questions. CSCWD 2022: 1257-1262 - [c39]Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:
NegDL: Privacy-preserving Deep Learning Based on Negative Database. ICDIS 2022: 118-126 - [c38]Yancai Zhou, Chen Zhang, Kai Jia, Dongdong Zhao, Jianwen Xiang:
A Software Aging-Related Bug Prediction Framework Based on Deep Learning and Weakly Supervised Oversampling. ISSRE Workshops 2022: 185-192 - [c37]Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang:
The Impact of Software Aging and Rejuvenation on the User Experience for Android System. ISSRE 2022: 435-445 - [c36]Dongdong Zhao, Zhao Wang, Huanhuan Li, Jianwen Xiang:
GAN-Based Privacy-Preserving Unsupervised Domain Adaptation. QRS 2022: 117-126 - [c35]Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang:
CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. QRS 2022: 527-536 - 2021
- [j14]Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li:
k-means clustering and kNN classification based on negative databases. Appl. Soft Comput. 110: 107732 (2021) - [j13]Luyao Ye, Dongdong Zhao, Jianwen Xiang, Laura Carnevali, Enrico Vicario:
Quantitative Analysis of the Dynamic Relevance of Systems. IEEE Trans. Reliab. 70(1): 82-98 (2021) - [c34]Mengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao, Xiao Yu, Jianwen Xiang:
Within-Project Software Aging Defect Prediction Based on Active Learning. ISSRE Workshops 2021: 1-8 - [c33]Piaoyi Liu, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jianwen Xiang:
A Combinatorial Reliability Analysis of Dynamic Fault Trees with Priority-AND Gates. ISSRE Workshops 2021: 182-188 - [c32]Chuanli Wu, Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jing Tian, Jianwen Xiang:
Reliability Analysis of Systems Subject to Imperfect Fault Coverage Considering Failure Propagation and Component Relevancy. ISSRE Workshops 2021: 210-217 - [c31]Luyao Ye, Erqing Li, Dongdong Zhao, Shengwu Xiong, Siwei Zhou, Jianwen Xiang:
An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees. ISSRE 2021: 242-252 - [c30]Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jianwen Xiang:
Reliability-redundancy allocation problem considering imperfect fault coverage. QRS 2021: 394-403 - [i1]Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian:
NegDL: Privacy-Preserving Deep Learning Based on Negative Database. CoRR abs/2103.05854 (2021) - 2020
- [j12]Jing Zhou, Xiaozhe Zhao, Xiaopan Zhang, Dongdong Zhao, Huanhuan Li:
Task Allocation for Multi-Agent Systems Based on Distributed Many-Objective Evolutionary Algorithm and Greedy Algorithm. IEEE Access 8: 19306-19318 (2020) - [j11]Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Artur Andrzejak, Shengwu Xiong, Lin Li, Jing Tian:
Software aging and rejuvenation in android: new models and metrics. Softw. Qual. J. 28(1): 85-106 (2020) - [c29]Qinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang:
Aging-Related Bugs Prediction Via Convolutional Neural Network. DSA 2020: 90-98 - [c28]Zhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
VSFBS: Vulnerability Search in Firmware Based on String. DSA 2020: 555-563 - [c27]Junwei Zhou, Ke Shu, Dongdong Zhao, Zhe Xia:
Domain Adaptation Based Person-Specific Face Anti-spoofing Using Color Texture Features. ICMLT 2020: 79-85 - [c26]Bin Xu, Dongdong Zhao, Kai Jia, Junwei Zhou, Jing Tian, Jianwen Xiang:
Cross-Project Aging-Related Bug Prediction Based on Joint Distribution Adaptation and Improved Subclass Discriminant Analysis. ISSRE 2020: 325-334 - [c25]Dongdong Zhao, Xiaoyan Zhou, Jianwen Xiang, Wenjian Luo:
NDBIris with Better Unlinkability. SSCI 2020: 2948-2956
2010 – 2019
- 2019
- [j10]Yousif A. Alhaj, Jianwen Xiang, Dongdong Zhao, Mohammed Abdulaziz Aide Al-qaness, Mohamed E. Abd Elaziz, Abdelghani Dahou:
A Study of the Effects of Stemming Strategies on Arabic Document Classification. IEEE Access 7: 32664-32671 (2019) - [j9]Dongdong Zhao, Hong Lin, Linjun Ran, Mushuai Han, Jing Tian, Liping Lu, Shengwu Xiong, Jianwen Xiang:
CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. Softw. Qual. J. 27(3): 1045-1068 (2019) - [c24]Mushuai Han, Dongdong Zhao, Hong Lin, Dian Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware. DSA 2019: 395-400 - [c23]Jing Zhou, Xiaozhe Zhao, Dongdong Zhao, Zhong Lin:
Task Allocation in Multi-agent Systems Using Many-objective Evolutionary Algorithm NSGA-III. MLICOM 2019: 677-692 - [c22]Ming Yang, Dongdong Zhao, Luyao Ye, Siwei Zhou, Jianwen Xiang:
Reliability Analysis of Phased-Mission System in Irrelevancy Coverage Model. QRS 2019: 89-96 - [c21]Man Yu, Dongdong Zhao, Dian Zhou, Linjun Ran, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:
Vulnerability Detection in Firmware Based on Clonal Selection Algorithm. SSCI 2019: 1915-1921 - [c20]Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li:
A Fine-grained Privacy-preserving k-means Clustering Algorithm Upon Negative Databases. SSCI 2019: 1945-1951 - 2018
- [j8]Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong:
Iris Template Protection Based on Local Ranking. Secur. Commun. Networks 2018: 4519548:1-4519548:9 (2018) - [j7]Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue:
Negative Iris Recognition. IEEE Trans. Dependable Secur. Comput. 15(1): 112-125 (2018) - [j6]Wenjian Luo, Ran Liu, Hao Jiang, Dongdong Zhao, Linli Wu:
Three Branches of Negative Representation of Information: A Survey. IEEE Trans. Emerg. Top. Comput. Intell. 2(6): 411-425 (2018) - [j5]Hao Jiang, Wenjian Luo, Dongdong Zhao:
A Novel Negative Location Collection Method for Finding Aggregated Locations. IEEE Trans. Intell. Transp. Syst. 19(6): 1741-1753 (2018) - [c19]Jianwen Xiang, Shu Fang, Dongdong Zhao, Jing Tian, Shengwu Xiong, Dong Li, Chunhui Yang:
Handling Unreasonable Data in Negative Surveys. DASFAA (2) 2018: 395-403 - [c18]Wei Jiang, Siwei Zhou, Luyao Ye, Dongdong Zhao, Jing Tian, W. Eric Wong, Jianwen Xiang:
An Algebraic Binary Decision Diagram for Analysis of Dynamic Fault Tree. DSA 2018: 44-51 - [c17]Shouyu Huo, Dongdong Zhao, Xing Liu, Jianwen Xiang, Yingshou Zhong, Haiguo Yu:
Using machine learning for software aging detection in Android system. ICACI 2018: 741-746 - [c16]Xiaoyi Hu, Liping Lu, Dongdong Zhao, Jianwen Xiang, Xing Liu, Haiying Zhou, Shengwu Xiong, Jing Tian:
Privacy-Preserving K-Means Clustering Upon Negative Databases. ICONIP (4) 2018: 191-204 - [c15]Dongdong Zhao, Xiaoyi Hu, Jing Tian, Shengwu Xiong, Jianwen Xiang:
Iris Template Protection Based on Randomized Response Technique and Aggregated Block Information. ISSRE 2018: 248-258 - [c14]Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejak:
A New Software Rejuvenation Model for Android. ISSRE Workshops 2018: 293-299 - [c13]Jianwen Xiang, Lang Liu, Ming Yang, Siwei Zhou, Luyao Ye, Caisheng Weng, Dongdong Zhao, Jing Tian:
Crane: A Tool for Reliability Analysis with Different Coverage Models. LADC 2018: 171-174 - [c12]Erqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu:
Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. QRS Companion 2018: 345-352 - 2017
- [j4]Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue:
Experimental analyses of the K-hidden algorithm. Eng. Appl. Artif. Intell. 62: 331-340 (2017) - [j3]Dongdong Zhao, Wenjian Luo:
One-time password authentication scheme based on the negative database. Eng. Appl. Artif. Intell. 62: 396-404 (2017) - [j2]Wenjian Luo, Yihui Lu, Dongdong Zhao, Hao Jiang:
On Location and Trace Privacy of the Moving Object Using the Negative Survey. IEEE Trans. Emerg. Top. Comput. Intell. 1(2): 125-134 (2017) - [j1]Wenjian Luo, Hao Jiang, Dongdong Zhao:
Rating Credits of Online Merchants Using Negative Ranks. IEEE Trans. Emerg. Top. Comput. Intell. 1(5): 354-365 (2017) - [c11]Jianguo Wu, Jianwen Xiang, Dongdong Zhao, Huanhuan Li, Qing Xie, Xiaoyi Hu:
Negative Survey with Manual Selection: A Case Study in Chinese Universities. APWeb/WAIM (1) 2017: 57-65 - [c10]Hong Lin, Dongdong Zhao, Linjun Ran, Mushuai Han, Jing Tian, Jianwen Xiang, Xian Ma, Yingshou Zhong:
CVSSA: Cross-Architecture Vulnerability Search in Firmware Based on Support Vector Machine and Attributed Control Flow Graph. DSA 2017: 35-41 - [c9]Linjun Ran, Liping Lu, Hong Lin, Mushuai Han, Dongdong Zhao, Jianwen Xiang, Haiguo Yu, Xian Ma:
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability. DSA 2017: 42-50 - [c8]Caisheng Weng, Dongdong Zhao, Liping Lu, Jianwen Xiang, Chunhui Yang, Dong Li:
A Rejuvenation Strategy in Android. ISSRE Workshops 2017: 273-279 - [c7]Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-Based Knowledge Sharing Portal for Software Testing. QRS Companion 2017: 472-479 - [c6]Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang:
A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. QRS Companion 2017: 486-492 - [c5]Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:
An Ontology-based Knowledge Management System for Software Testing. SEKE 2017: 230-235 - 2016
- [c4]Dongdong Zhao, Wenjian Luo, Lihua Yue:
Reconstructing Positive Surveys from Negative Surveys with Background Knowledge. DMBD 2016: 86-99 - [c3]Caisheng Weng, Jianwen Xiang, Shengwu Xiong, Dongdong Zhao, Chunhui Yang:
Analysis of Software Aging in Android. ISSRE Workshops 2016: 78-83 - 2013
- [c2]Dongdong Zhao, Wenjian Luo:
A Study of the Private Set Intersection Protocol Based on Negative Databases. DASC 2013: 58-64 - [c1]Dongdong Zhao, Wenjian Luo:
Real-Valued Negative Databases. ECAL 2013: 884-890
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint