default search action
Dongyang Zhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang:
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. IEEE Trans. Computers 73(3): 708-721 (2024) - [c6]Kai Tan, Dongyang Zhan, Zhaofeng Yu, Lin Ye, Hongli Zhang, Binxing Fang:
Multi-Stage Defense: Enhancing Robustness in Sequence-Based Log Anomaly Detection. ICC 2024: 2725-2730 - 2023
- [j11]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye, Likun Liu:
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems. IEEE Internet Things J. 10(6, March 15): 5378-5392 (2023) - [j10]Dongyang Zhan, Kai Tan, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He:
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning. IEEE Trans. Computers 72(11): 3286-3299 (2023) - [j9]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. IEEE Trans. Serv. Comput. 16(2): 1431-1443 (2023) - [j8]Dongyang Zhan, Xiangzhan Yu, Hongli Zhang, Lin Ye:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. IEEE Trans. Software Eng. 49(2): 684-698 (2023) - 2022
- [j7]Yinggang Sun, Hongguo Zhang, Luogang Zhang, Chao Ma, Hai Huang, Dongyang Zhan, Jiaxing Qu:
Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model. KSII Trans. Internet Inf. Syst. 16(10): 3419-3437 (2022) - 2021
- [c5]Zhaofeng Yu, Lin Ye, Hongli Zhang, Dongyang Zhan:
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing. ICAIS (2) 2021: 102-111
2010 – 2019
- 2019
- [j6]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019) - [c4]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6 - [c3]Huhua Li, Dongyang Zhan, Tianrui Liu, Lin Ye:
Using Deep-Learning-Based Memory Analysis for Malware Detection in Cloud. MASS Workshops 2019: 1-6 - [i2]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019) - 2018
- [j5]Lin Ye, Xiangzhan Yu, Lei Yu, Bin Guo, Dongyang Zhan, Xiaojiang Du, Mohsen Guizani:
Checking Function-Level Kernel Control Flow Integrity for Cloud Computing. IEEE Access 6: 41856-41865 (2018) - [j4]Lin Ye, Xiangzhan Yu, Junda Zhao, Dongyang Zhan, Xiaojiang Du, Mohsen Guizani:
Deciding Your Own Anonymity: User-Oriented Node Selection in I2P. IEEE Access 6: 71350-71359 (2018) - [j3]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018) - [j2]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018) - [i1]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018) - 2017
- [j1]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Zhikai Xu:
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach. IEICE Trans. Inf. Syst. 100-D(10): 2307-2318 (2017) - 2016
- [c2]Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan, Junxi Guo:
Shrinking the Sentiment Analysis for Signed Network Construction. DSC 2016: 353-357 - [c1]Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Shen Su:
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI. ICC 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint