default search action
Ziming Zhao 0008
Person information
- affiliation: Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
Other persons with the same name
- Ziming Zhao 0001 — Northeastern University, CactiLab, Boston, MA, USA (and 3 more)
- Ziming Zhao 0002 — National University of Defense Technology, Changsha, China
- Ziming Zhao 0003 — Shanghai Jiao Tong University, Shanghai, China
- Ziming Zhao 0004 — East China University of Science and Technology, Shanghai, China
- Ziming Zhao 0005 — Beijing Jiaotong University, School of Mechanical and Electronic Control Engineering, China
- Ziming Zhao 0006 — Tongji University, Shanghai, China
- Ziming Zhao 0007 — Southeast University, State Key Laboratory of Millimeter-Wave, Nanjing, China
- Ziming Zhao 0009 — Nanchang University, Software Engineering Institute, China
- Ziming Zhao 0010 — Ant Group, Hangzhou, China
- Ziming Zhao 0011 — Northeast Agricultural University, College of Engineering, Harbin, China
- Ziming Zhao 0012 — Henan University, School of Software, Kaifeng, China
- Ziming Zhao 0013 — Purdue University, West Lafayette, IN, USA
- Ziming Zhao 0014 — Aerospace Science and Engineering Microsystem Technology Co., Ltd, Nanjing, China
- Ziming Zhao 0015 — Shanxi University of Finance and Economics, Statistic Institute, Taiyuan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Zhaoxuan Li, Ziming Zhao, Rui Zhang, Haoyang Lu, Wenhao Li, Fan Zhang, Siqi Lu, Rui Xue:
metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm. Comput. Networks 250: 110563 (2024) - [j7]Ziming Zhao, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang, Rui Zhang:
DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 138: 103663 (2024) - [j6]Ziming Zhao, Zhuotao Liu, Huan Chen, Fan Zhang, Zhuoxue Song, Zhaoxuan Li:
Effective DDoS Mitigation via ML-Driven In-Network Traffic Shaping. IEEE Trans. Dependable Secur. Comput. 21(4): 4271-4289 (2024) - [j5]Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, Binbin Chen:
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput. 23(5): 5589-5603 (2024) - [j4]Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, Wenrui Ma:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024) - [c12]Xi Ling, Jiongchi Yu, Ziming Zhao, Zhihao Zhou, Haitao Xu, Binbin Chen, Fan Zhang:
DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining. ACNS (2) 2024: 283-309 - [c11]Liang Li, Yuanhui He, Feiyang Huang, Ziming Zhao, Zhuoxue Song, Tong Zhou, Zhenyuan Li, Fan Zhang:
An Automated Alert Cross-Verification System with Graph Neural Networks for IDS Events. CSCWD 2024: 2240-2245 - [c10]Tingting Li, Ziming Zhao:
Moirai: Optimizing Quantum Serverless Function Orchestration via Device Allocation and Circuit Deployment. ICWS 2024: 707-717 - [c9]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang, Binbin Chen:
RIDS: Towards Advanced IDS via RNN Model and Programmable Switches Co-Designed Approaches. INFOCOM 2024: 591-600 - [c8]Tingting Li, Ziming Zhao, Jianwei Yin:
Minerva: Enhancing Quantum Network Performance for High-Fidelity Multimedia Transmission. ACM Multimedia 2024: 3704-3712 - [c7]Ziming Zhao, Zhaoxuan Li, Fan Zhang, Tingting Li, Jianwei Yin:
Poster: Combine Topology and Traffic to Calibrate P2P Botnet Identification in Large-Scale Network. SIGCOMM (Posters and Demos) 2024: 16-18 - [c6]Ziming Zhao, Zhaoxuan Li, Tingting Li, Jiongchi Yu, Fan Zhang, Rui Zhang:
Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer. WWW (Companion Volume) 2024: 529-532 - [c5]Tingting Li, Ziming Zhao, Jianwei Yin:
Task-Driven Quantum Device Fingerprint Identification via Modeling QNN Outcome Shift Induced by Quantum Noise. WWW (Companion Volume) 2024: 557-560 - [c4]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Wenhao Li, Fan Zhang:
Trident: A Universal Framework for Fine-Grained and Class-Incremental Unknown Traffic Detection. WWW 2024: 1608-1619 - 2023
- [j3]Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren:
SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur. 18: 789-803 (2023) - [j2]Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao:
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning. IEEE Trans. Software Eng. 49(11): 4886-4916 (2023) - [c3]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879 - [c2]Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang:
Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. CCS 2023: 3636-3638 - [c1]Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang:
Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach. RTSS 2023: 431-434 - 2022
- [j1]Zhaoxuan Li, Siqi Lu, Rui Zhang, Rui Xue, Wenqiu Ma, Rujin Liang, Ziming Zhao, Sheng Gao:
SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts. Empir. Softw. Eng. 27(7): 197 (2022) - [i1]Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren:
Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint