Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jinjing Zhao
@article{DBLP:journals/isci/ZhongZH24, author = {Wenjing Zhong and Jinjing Zhao and Hesuan Hu}, title = {Non-interference assessment in colored net systems via integer linear programming}, journal = {Inf. Sci.}, volume = {658}, pages = {120027}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.120027}, doi = {10.1016/J.INS.2023.120027}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhongZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/XieXZCZZJZZ23, author = {Yi Xie and Yun Xiong and Jiawei Zhang and Chao Chen and Yao Zhang and Jie Zhao and Yizhu Jiao and Jinjing Zhao and Yangyong Zhu}, title = {Temporal super-resolution traffic flow forecasting via continuous-time network dynamics}, journal = {Knowl. Inf. Syst.}, volume = {65}, number = {11}, pages = {4687--4712}, year = {2023}, url = {https://doi.org/10.1007/s10115-023-01887-6}, doi = {10.1007/S10115-023-01887-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/XieXZCZZJZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ZhongZH23, author = {Wenjing Zhong and Jinjing Zhao and Hesuan Hu}, title = {Beacon-Based Firing Control for Authorization Security in Workflows}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {4}, pages = {1594--1609}, year = {2023}, url = {https://doi.org/10.1109/TR.2023.3235785}, doi = {10.1109/TR.2023.3235785}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/ZhongZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhongZH23, author = {Wenjing Zhong and Jinjing Zhao and Hesuan Hu}, title = {Unified Implementation and Simplification for Task-Based Authorization Security in Workflows}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {5}, pages = {3796--3811}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3268651}, doi = {10.1109/TSC.2023.3268651}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhongZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/ShiXZJZWL23, author = {Zejian Shi and Yun Xiong and Yao Zhang and Zhijie Jiang and Jinjing Zhao and Lei Wang and Shanshan Li}, title = {Improving Code Search with Multi-Modal Momentum Contrastive Learning}, booktitle = {31st {IEEE/ACM} International Conference on Program Comprehension, {ICPC} 2023, Melbourne, Australia, May 15-16, 2023}, pages = {280--291}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPC58990.2023.00043}, doi = {10.1109/ICPC58990.2023.00043}, timestamp = {Thu, 20 Jul 2023 21:02:45 +0200}, biburl = {https://dblp.org/rec/conf/iwpc/ShiXZJZWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-07124, author = {Yuhui Li and Fangyun Wei and Jinjing Zhao and Chao Zhang and Hongyang Zhang}, title = {{RAIN:} Your Language Models Can Align Themselves without Finetuning}, journal = {CoRR}, volume = {abs/2309.07124}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.07124}, doi = {10.48550/ARXIV.2309.07124}, eprinttype = {arXiv}, eprint = {2309.07124}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-07124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09831, author = {Zian Jia and Yun Xiong and Yuhong Nan and Yao Zhang and Jinjing Zhao and Mi Wen}, title = {{MAGIC:} Detecting Advanced Persistent Threats via Masked Graph Representation Learning}, journal = {CoRR}, volume = {abs/2310.09831}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09831}, doi = {10.48550/ARXIV.2310.09831}, eprinttype = {arXiv}, eprint = {2310.09831}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/JiaWXZZ22, author = {Zian Jia and Xiaosu Wang and Yun Xiong and Yao Zhang and Jinjing Zhao}, title = {{AISLE:} Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat}, booktitle = {7th {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2022, Guilin, China, July 11-13, 2022}, pages = {360--366}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC55868.2022.00056}, doi = {10.1109/DSC55868.2022.00056}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/JiaWXZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/WangZZKZZ22, author = {Chenxu Wang and Ming Zhang and Jinjing Zhao and Xiaohui Kuang and Han Zhang and Xuhong Zhang}, title = {A Data-free Black-box Attack for Generating Transferable Adversarial Examples}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {672--678}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00115}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00115}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/WangZZKZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/WangZZK22, author = {Chenxu Wang and Ming Zhang and Jinjing Zhao and Xiaohui Kuang}, title = {Black-Box Adversarial Attacks on Deep Neural Networks: {A} Survey}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {88--93}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00021}, doi = {10.1109/ICDIS55630.2022.00021}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdis/WangZZK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-03237, author = {Xiaobin Fan and Xiaoping Wang and Kai Lu and Lei Xue and Jinjing Zhao}, title = {Tree-based Search Graph for Approximate Nearest Neighbor Search}, journal = {CoRR}, volume = {abs/2201.03237}, year = {2022}, url = {https://arxiv.org/abs/2201.03237}, eprinttype = {arXiv}, eprint = {2201.03237}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-03237.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhongZH21, author = {Wenjing Zhong and Jinjing Zhao and Hesuan Hu}, title = {A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage Problem}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {367--374}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00058}, doi = {10.1109/DSC53577.2021.00058}, timestamp = {Fri, 22 Apr 2022 19:18:38 +0200}, biburl = {https://dblp.org/rec/conf/dsc/ZhongZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/LiLLLZFLL21, author = {Xiang Li and Shenglan Liu and Yunheng Li and Hao Liu and Jinjing Zhao and Lin Feng and Guihong Lao and Guangzhe Li}, editor = {Teddy Mantoro and Minho Lee and Media Anugerah Ayu and Kok Wai Wong and Achmad Nizar Hidayanto}, title = {Spatial-Temporal Attention Network with Multi-similarity Loss for Fine-Grained Skeleton-Based Action Recognition}, booktitle = {Neural Information Processing - 28th International Conference, {ICONIP} 2021, Sanur, Bali, Indonesia, December 8-12, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13109}, pages = {620--631}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92270-2\_53}, doi = {10.1007/978-3-030-92270-2\_53}, timestamp = {Tue, 14 Dec 2021 17:56:34 +0100}, biburl = {https://dblp.org/rec/conf/iconip/LiLLLZFLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aca/ZhaoPL20, author = {Jinjing Zhao and Ling Pang and Bai Lin}, editor = {Dezun Dong and Xiaoli Gong and Cunlu Li and Dongsheng Li and Junjie Wu}, title = {{SDNVD-SCADA:} {A} Formalized Vulnerability Detection Platform in SDN-Enabled {SCADA} System}, booktitle = {Advanced Computer Architecture - 13th Conference, {ACA} 2020, Kunming, China, August 13-15, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1256}, pages = {3--15}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-8135-9\_1}, doi = {10.1007/978-981-15-8135-9\_1}, timestamp = {Wed, 23 Mar 2022 17:30:19 +0100}, biburl = {https://dblp.org/rec/conf/aca/ZhaoPL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhaoPLW20, author = {Jinjing Zhao and Ling Pang and Hongiian Li and Zibin Wang}, title = {A Safety-Enhanced Dijkstra Routing Algorithm via {SDN} Framework}, booktitle = {5th {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2020, Hong Kong, July 27-30, 2020}, pages = {388--393}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSC50466.2020.00067}, doi = {10.1109/DSC50466.2020.00067}, timestamp = {Thu, 27 Aug 2020 13:32:25 +0200}, biburl = {https://dblp.org/rec/conf/dsc/ZhaoPLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZhaoWLPKW19, author = {Jinjing Zhao and Yan Wen and Xiang Li and Ling Pang and Xiaohui Kuang and Dongxia Wang}, editor = {S{\'{e}}verine Sentilles and Barry W. Boehm and Catia Trubiani and Anne Koziolek}, title = {A heuristic fuzz test generator for Java native interface}, booktitle = {Proceedings of the 2nd {ACM} {SIGSOFT} International Workshop on Software Qualities and Their Dependencies, SQUADE@ESEC/SIGSOFT {FSE} 2019, Tallinn, Estonia, August 26, 2019}, pages = {1--7}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3340495.3342749}, doi = {10.1145/3340495.3342749}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ZhaoWLPKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhaoP18, author = {Jinjing Zhao and Ling Pang}, title = {Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {514--520}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00082}, doi = {10.1109/DSC.2018.00082}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZhaoP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/ZhaoPKJ18, author = {Jinjing Zhao and Ling Pang and Xiaohui Kuang and Rong Jin}, editor = {Feng Zhang and Jidong Zhai and Marc Snir and Hai Jin and Hironori Kasahara and Mateo Valero}, title = {Balancing the {QOS} and Security in Dijkstra Algorithm by {SDN} Technology}, booktitle = {Network and Parallel Computing - 15th {IFIP} {WG} 10.3 International Conference, {NPC} 2018, Muroran, Japan, November 29 - December 1, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11276}, pages = {126--131}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05677-3\_11}, doi = {10.1007/978-3-030-05677-3\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/ZhaoPKJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcallt/Zhao16a, author = {Jinjing Zhao}, title = {{L2} Languaging in a Massively Multiplayer Online Game: An Exploration of Learner Variations}, journal = {Int. J. Comput. Assist. Lang. Learn. Teach.}, volume = {6}, number = {4}, pages = {1--17}, year = {2016}, url = {https://doi.org/10.4018/IJCALLT.2016100101}, doi = {10.4018/IJCALLT.2016100101}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcallt/Zhao16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/HammadZFK16, author = {Eman M. Hammad and Jinjing Zhao and Abdallah K. Farraj and Deepa Kundur}, title = {Mitigating link insecurities in smart grids via QoS multi-constraint routing}, booktitle = {{IEEE} International Conference on Communication, {ICC} 2015, London, United Kingdom, June 8-12, 2015, Workshop Proceedings}, pages = {380--386}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCW.2016.7503817}, doi = {10.1109/ICCW.2016.7503817}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/HammadZFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/WenZYL14, author = {Yan Wen and Jinjing Zhao and Shuanghui Yi and Xiang Li}, editor = {Xingang Liu and Didier El Baz and Ching{-}Hsien Hsu and Kai Kang and Weifeng Chen}, title = {FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor}, booktitle = {17th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014}, pages = {620--626}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSE.2014.136}, doi = {10.1109/CSE.2014.136}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/WenZYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/WenFZL14, author = {Yan Wen and Youyuan Fang and Jinjing Zhao and Xiang Li}, editor = {Xingang Liu and Didier El Baz and Ching{-}Hsien Hsu and Kai Kang and Weifeng Chen}, title = {Shielding Your Privacy with the Local-Booted Virtual Machine}, booktitle = {17th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2014, Chengdu, China, December 19-21, 2014}, pages = {1637--1643}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSE.2014.301}, doi = {10.1109/CSE.2014.301}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/WenFZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/WenZC14, author = {Yan Wen and Jinjing Zhao and Hua Chen}, title = {Towards Thwarting Data Leakage with Memory Page Access Interception}, booktitle = {{IEEE} 12th International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2014, Dalian, China, August 24-27, 2014}, pages = {26--31}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DASC.2014.14}, doi = {10.1109/DASC.2014.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/WenZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/ZhaoW13, author = {Jinjing Zhao and Yan Wen}, title = {Evaluation on the influence of internet prefix hijacking events}, journal = {Comput. Sci. Inf. Syst.}, volume = {10}, number = {2}, pages = {611--631}, year = {2013}, url = {https://doi.org/10.2298/CSIS121108023Z}, doi = {10.2298/CSIS121108023Z}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/ZhaoW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/CaoZZLZ13, author = {Huayang Cao and Jinjing Zhao and Peidong Zhu and Xicheng Lu and Chonglun Zhao}, title = {Worm Detection without Knowledge Base in Industrial Networks}, journal = {J. Commun.}, volume = {8}, number = {11}, pages = {716--723}, year = {2013}, url = {https://doi.org/10.12720/jcm.8.11.716-723}, doi = {10.12720/JCM.8.11.716-723}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/CaoZZLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmiccc/CaoZZ13, author = {Huayang Cao and Peidong Zhu and Jinjing Zhao}, title = {{CBSTM:} Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms}, booktitle = {2013 The Second International Conference on Innovative Computing and Cloud Computing, {ICCC} '13, Wuhan, China - December 01 - 02, 2013}, pages = {158}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2556871.2556906}, doi = {10.1145/2556871.2556906}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/acmiccc/CaoZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/WenZCH13, author = {Yan Wen and Jinjing Zhao and Hua Chen and Minhuan Huang}, title = {Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology}, booktitle = {{IEEE} 11th International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2013, Chengdu, China, December 21-22, 2013}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DASC.2013.34}, doi = {10.1109/DASC.2013.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/WenZCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/WenZCH13, author = {Yan Wen and Jinjing Zhao and Hua Chen and Minhuan Huang}, editor = {Shuliang Wang and Xingquan Zhu and Tingting He}, title = {Towards sharing disks between host {OS} and virtual machine with volume snapshot technology}, booktitle = {2013 {IEEE} International Conference on Granular Computing, GrC 2013, Beijing, China, December 13-15, 2013}, pages = {347--352}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/GrC.2013.6740434}, doi = {10.1109/GRC.2013.6740434}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/grc/WenZCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/LiuWZH13, author = {Lingxia Liu and Dongxia Wang and Jinjing Zhao and Minhuan Huang}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {SA4WSs: {A} Security Architecture for Web Services}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {306--311}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_32}, doi = {10.1007/978-3-642-36818-9\_32}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/LiuWZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/SunCZH13, author = {Xiao Xia Sun and Hua Chen and Jinjing Zhao and Minhuan Huang}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {A Test Case Generation Technique for {VMM} Fuzzing}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {318--323}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_34}, doi = {10.1007/978-3-642-36818-9\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/SunCZH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/KuangLZ13, author = {Xiaohui Kuang and Xiang Li and Jinjing Zhao}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Architecture of Network Environment for High-Risk Security Experimentation}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {479--484}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_53}, doi = {10.1007/978-3-642-36818-9\_53}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ict-eurasia/KuangLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ZhaoW13, author = {Jinjing Zhao and Yan Wen}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Emulation on the Internet Prefix Hijacking Attack Impaction}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {485--489}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_54}, doi = {10.1007/978-3-642-36818-9\_54}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ZhaoW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhaoW12, author = {Jinjing Zhao and Yan Wen}, title = {Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy}, booktitle = {12th {IEEE} International Conference on Computer and Information Technology, {CIT} 2012, Chengdu, Sichuan, China, October 27-29, 2012}, pages = {375--382}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIT.2012.90}, doi = {10.1109/CIT.2012.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhaoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/WenZZCW12, author = {Yan Wen and Jinjing Zhao and Gang Zhao and Hua Chen and Dongxia Wang}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {A Survey of Virtualization Technologies Focusing on Untrusted Code Execution}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {378--383}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.92}, doi = {10.1109/IMIS.2012.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/WenZZCW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ZhaoWLPZ12, author = {Jinjing Zhao and Yan Wen and Xiang Li and Wei Peng and Feng Zhao}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {The Relation on Prefix Hijacking and the Internet Hierarchy}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {415--420}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.40}, doi = {10.1109/IMIS.2012.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/ZhaoWLPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZW11, author = {Chunlei Wang and Liang Ming and Jinjing Zhao and Dongxia Wang}, title = {A General Framework for Network Survivability Testing and Evaluation}, journal = {J. Networks}, volume = {6}, number = {6}, pages = {831--841}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.6.831-841}, doi = {10.4304/JNW.6.6.831-841}, timestamp = {Mon, 20 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangMZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ZhaoWW11, author = {Jinjing Zhao and Yan Wen and Dongxia Wang}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {371--375}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.38}, doi = {10.1109/IMIS.2011.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/ZhaoWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/WenZHC11, author = {Yan Wen and Jinjing Zhao and Minhuan Huang and Hua Chen}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {Aquarius: {A} Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {403--407}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.39}, doi = {10.1109/IMIS.2011.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/WenZHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/ZhaoWZ11, author = {Jinjing Zhao and Yan Wen and Gang Zhao}, editor = {Erik R. Altman and Weisong Shi}, title = {H-Fuzzing: {A} New Heuristic Method for Fuzzing Data Generation}, booktitle = {Network and Parallel Computing - 8th {IFIP} International Conference, {NPC} 2011, Changsha, China, October 21-23, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6985}, pages = {32--43}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24403-2\_3}, doi = {10.1007/978-3-642-24403-2\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/npc/ZhaoWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WenZHC11, author = {Yan Wen and Jinjing Zhao and Minhuan Huang and Hua Chen}, title = {Towards Detecting Thread Deadlock in Java Programs with {JVM} Introspection}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {1600--1607}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.222}, doi = {10.1109/TRUSTCOM.2011.222}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/WenZHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhaoZWL10, author = {Jinjing Zhao and Gang Zhao and Yan Wen and Xiang Li}, title = {Towards Detecting the Interaction Vulnerabilities in Large Distributed System}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {2843--2848}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.475}, doi = {10.1109/CIT.2010.475}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhaoZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/WenHZK10, author = {Yan Wen and Minhuan Huang and Jinjing Zhao and Xiaohui Kuang}, editor = {Yi Peng and Gang Kou and Franz I. S. Ko and Yong Zeng and Kae{-}Dal Kwack}, title = {Implicit detection of stealth software with a local-booted virtual machine}, booktitle = {Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences {(ICIS} 2010), Chengdu, China, June 23-25, 2010}, pages = {152--157}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICICIS.2010.5534733}, doi = {10.1109/ICICIS.2010.5534733}, timestamp = {Mon, 21 Jun 2021 12:14:56 +0200}, biburl = {https://dblp.org/rec/conf/interaction/WenHZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinagrid/ZhaoZZC09, author = {Gang Zhao and Weimin Zheng and Jinjing Zhao and Hua Chen}, title = {An Heuristic Method for Web-Service Program Security Testing}, booktitle = {Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, China, 21-22 August, 2009}, pages = {139--144}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ChinaGrid.2009.10}, doi = {10.1109/CHINAGRID.2009.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chinagrid/ZhaoZZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WenZWC08, author = {Yan Wen and Jinjing Zhao and Huaimin Wang and Jiannong Cao}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {361--375}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_27}, doi = {10.1007/978-3-540-70500-0\_27}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WenZWC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isip/WenZW08, author = {Yan Wen and Jinjing Zhao and Huaimin Wang}, editor = {Fei Yu and Qi Luo}, title = {A Novel Intrusion-Tolerant Approach for Internet Access}, booktitle = {International Symposium on Information Processing, {ISIP} 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, {WMWA} 2008, Moscow, Russia, 23-25 May 2008}, pages = {485--489}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISIP.2008.28}, doi = {10.1109/ISIP.2008.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isip/WenZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WenZW08, author = {Yan Wen and Jinjing Zhao and Huaimin Wang}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Hiding "real" machine from attackers and malware with a minimal virtual machine monitor}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {21}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460904}, doi = {10.1145/1460877.1460904}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WenZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wstst/CuiZZZ08, author = {Yimin Cui and Tao Zou and Lufeng Zhang and Jinjing Zhao}, editor = {Richard Chbeir and Youakim Badr and Ajith Abraham and Dominique Laurent and Mario K{\"{o}}ppen and Fernando Ferri and Lotfi A. Zadeh and Yukio Ohsawa}, title = {Network security simulation and evaluation}, booktitle = {{CSTST} 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008}, pages = {55--58}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456223.1456239}, doi = {10.1145/1456223.1456239}, timestamp = {Mon, 03 Jul 2023 14:54:48 +0200}, biburl = {https://dblp.org/rec/conf/wstst/CuiZZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/ZhaoZL07, author = {Jinjing Zhao and Peidong Zhu and Xicheng Lu}, title = {Pricing Models of Inter-Domain Multicasting Applications}, booktitle = {4th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2007, Las Vegas, NV, USA, January 11-13, 2007}, pages = {773--777}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/CCNC.2007.157}, doi = {10.1109/CCNC.2007.157}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/ZhaoZL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhuZWC07, author = {Peidong Zhu and Jinjing Zhao and Yan Wen and Kaiyu Cai}, editor = {Hai Jin and Omer F. Rana and Yi Pan and Viktor K. Prasanna}, title = {On the Power-Law of the Internet and the Hierarchy of {BGP} Convergence}, booktitle = {Algorithms and Architectures for Parallel Processing, 7th International Conference, {ICA3PP} 2007, Hangzhou, China, June 11-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4494}, pages = {470--481}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72905-1\_42}, doi = {10.1007/978-3-540-72905-1\_42}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhuZWC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WenZW07, author = {Yan Wen and Jinjing Zhao and Huaimin Wang}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {A Novel Approach for Untrusted Code Execution}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {398--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_31}, doi = {10.1007/978-3-540-77048-0\_31}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WenZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/ZhaoZLX07, author = {Jinjing Zhao and Peidong Zhu and Xicheng Lu and Lei Xuan}, editor = {Teresa Maria Vaz{\~{a}}o and M{\'{a}}rio M. Freire and Ilyoung Chong}, title = {Does the Average Path Length Grow in the Internet?}, booktitle = {Information Networking. Towards Ubiquitous Networking and Services, International Conference, {ICOIN} 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5200}, pages = {183--190}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89524-4\_19}, doi = {10.1007/978-3-540-89524-4\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/icoin/ZhaoZLX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/ZhaoLZZ06, author = {Feng Zhao and Xicheng Lu and Peidong Zhu and Jinjing Zhao}, editor = {Michael Gerndt and Dieter Kranzlm{\"{u}}ller}, title = {BGPSep{\_}D: An Improved Algorithm for Constructing Correct and Scalable {IBGP} Configurations Based on Vertexes Degree}, booktitle = {High Performance Computing and Communications, Second International Conference, {HPCC} 2006, Munich, Germany, September 13-15, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4208}, pages = {406--415}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11847366\_42}, doi = {10.1007/11847366\_42}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/ZhaoLZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/ZhaoLZZ06, author = {Feng Zhao and Xicheng Lu and Peidong Zhu and Jinjing Zhao}, editor = {Soma Chaudhuri and Samir R. Das and Himadri S. Paul and Srikanta Tirthapura}, title = {BGPSep{\_}S: An Algorithm for Constructing {IBGP} Configurations with Complete Visibility}, booktitle = {Distributed Computing and Networking, 8th International Conference, {ICDCN} 2006, Guwahati, India, December 27-30, 2006}, series = {Lecture Notes in Computer Science}, volume = {4308}, pages = {379--384}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11947950\_42}, doi = {10.1007/11947950\_42}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/ZhaoLZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netgames/ZhaoZLZ06, author = {Jinjing Zhao and Peidong Zhu and Xicheng Lu and Feng Zhao}, editor = {Adrian David Cheok and Yutaka Ishibashi}, title = {A practical pricing model of inter-domain multicasting based on game theory}, booktitle = {Proceedings of the 5th Workshop on Network and System Support for Games, {NETGAMES} 2006, Singapore, October 30-31, 2006}, pages = {40}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1230040.1230050}, doi = {10.1145/1230040.1230050}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netgames/ZhaoZLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prdc/ZhaoZLZ06, author = {Jinjing Zhao and Peidong Zhu and Xicheng Lu and Feng Zhao}, title = {The Hierarchy of {BGP} Convergence on the Self-Organized Internet}, booktitle = {12th {IEEE} Pacific Rim International Symposium on Dependable Computing {(PRDC} 2006), 18-20 December, 2006, University of California, Riverside, {USA}}, pages = {391--392}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/PRDC.2006.60}, doi = {10.1109/PRDC.2006.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/prdc/ZhaoZLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.