


default search action
Jun Zhang 0010
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, Australia
- affiliation (2011 - 2017): Deakin University, School of Information Technology, Geelong, VIC, Australia
- affiliation (PhD 2011): University of Wollongong, NSW, Australia
Other persons with the same name
- Jun Zhang — disambiguation page
- Jun Zhang 0001 — University of Kentucky, Lexington, KY, USA
- Jun Zhang 0002 — Iowa State University, Ames, IO, USA
- Jun Zhang 0003
— Hanyang University, Division of Electrical Engineering, Ansan, Korea (and 4 more)
- Jun Zhang 0004
— Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Hong Kong (and 2 more)
- Jun Zhang 0005 — Nanyang Technological University, School of Computer Engineering, Singapore
- Jun Zhang 0006
— University of Wisconsin-Milwaukee, Department of Electrical Engineering and Computer Science, WI, USA (and 1 more)
- Jun Zhang 0007
— Beijing Institute of Technology, National Engineering Laboratory for Big Data Application Technologies for Comprehensive Traffic, China (and 1 more)
- Jun Zhang 0008 — Pitney Bowes, Shelton, CT, USA (and 1 more)
- Jun Zhang 0009
— University of Michigan, Department of Psychology, Ann Arbor, MI, USA
- Jun Zhang 0011
— Anhui University, Institute of Health Sciences, School of Electronic Engineering and Automation, Hefei, China (and 2 more)
- Jun Zhang 0012 — Northwestern University, College of Information Science and Engineering, Evanston, IL, USA
- Jun Zhang 0013 — Hunan University, Changsha, Hunan, China
- Jun Zhang 0014
— Huazhong University of Science and Technology, Wuhan, China
- Jun Zhang 0015 — Northwestern Polytechnical University, Xian, China
- Jun Zhang 0016
— University of Edinburgh, School of Engineering, UK (and 1 more)
- Jun Zhang 0017
— Hefei University of Technology, School of Computer Science and Information Engineering, China
- Jun Zhang 0018
— Tencent AI Lab, Shenzhen, China (and 3 more)
- Jun Zhang 0019
— TELECOM Paris, France (and 3 more)
- Jun Zhang 0020
— University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
- Jun Zhang 0021
— University of Science and Technology of China, School of Management, Hefei, China (and 2 more)
- Jun Zhang 0022
— University of Wollongong, Faculty of Engineering and Information Sciences, NSW, Australia
- Jun Zhang 0023
— Nanjing University of Posts and Telecommunications, Jiangsu Key Laboratory of Wireless Communications, China (and 2 more)
- Jun Zhang 0024
— Nanjing University of Science and Technology, School of Science, China
- Jun Zhang 0025
— University of Nevada, Reno, NV, USA (and 1 more)
- Jun Zhang 0026
— Guangdong University of Technology, School of Information Engineering, Guangzhou, China (and 2 more)
- Jun Zhang 0027
— Shenzhen University, Shenzhen-Hong Kong Joint Research Center for Applied Statistical Sciences, College of Mathematics and Statistics, China
- Jun Zhang 0028
— Guangdong University of Technology, School of Information Engineering, Guangzhou, China
- Jun Zhang 0029 — Xiangtan University, Information Engineering College, Hunan, China
- Jun Zhang 0030
— Southeast University, School of Instrument Science and Engineering, Nanjing, China
- Jun Zhang 0031
— Capital Normal University, School of Mathematical Sciences, Beijing, China (and 2 more)
- Jun Zhang 0032 — University of Science and Technology of China, Hefei, China (and 1 more)
- Jun Zhang 0033
— Chinese Academy of Sciences, Institute of Computing Technology, State Key Laboratory of Computer Architecture, Beijing, China
- Jun Zhang 0034
— Chinese Academy of Sciences, Hefei Institutes of Physical Science, High Magnetic Field Laboratory, China (and 1 more)
- Jun Zhang 0035
— Nanjing Audit University, Institute for Social and Economic Research, China (and 1 more)
- Jun Zhang 0036 — Queen Mary University of London, UK
- Jun Zhang 0037 — Capital University of Economics and Business, School of Information, Beijing, China
- Jun Zhang 0038 — Shanghai University, School of Computer Engineering and Science, China (and 1 more)
- Jun Jason Zhang
(aka: Jun Zhang 0040) — Wuhan University, School of Electrical Engineering and Automation, Wuhan, China (and 3 more)
- Jun Zhang 0041
— Heilongjiang Province Land Reclamation Headquarters General Hospital, Department of Rehabilitation, Harbin, China
- Jun Zhang 0042
— Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Jun Zhang 0043
— Dalian University of Technology, Mechanical Engineering School, China
- Jun Zhang 0044
— National University of Defense Technology, Science and Technology on Automatic Target Recognition Laboratory, Changsha, China
- Jun Zhang 0045
— Xidian University, School of Artificial Intelligence, MOE Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
- Jun Zhang 0046
— Fuzhou University, School of Mechanical Engineering and Automation, China (and 1 more)
- Jun Zhang 0047
— Guizhou University of Finance and Economics, Computational Mathematics Research Center, Guiyang, China
- Jun Zhang 0048 — Dalian University of Technology, School of Software, Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province, China
- Jun Zhang 0049
— Shenzhen University, Educational Technology Department, China (and 1 more)
- Jun Zhang 0050
— Hebei University of Technology, School of Artificial Intelligence, Hebei Province Key Laboratory of Big Data Calculation, Tianjin, China
- Jun Zhang 0051
— Zhejiang University, College of Electrical Engineering, Hangzhou, China
- Jun Zhang 0052
— Tsinghua University, Department of Computer Science and Technology, China (and 1 more)
- Jun Zhang 0053
— Northwest A&F University, College of Mechanical and Electronic Engineering, Yangling, China (and 1 more)
- Jun Zhang 0054
— Hainan University, School of Economics and Management, Haikou, China
- Jun Zhang 0055
— Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Jun Zhang 0056
— Heilongjiang Province Land Reclamation Headquarters General Hospital, Harbin, China
- Jun Zhang 0057
— Nanjing University of Posts and Telecommunications, College of Electronic and Optical Engineering / College of Microelectronics, China
- Jun Zhang 0058
— East China University of Technology, School of Software, Nanchang, China (and 1 more)
- Jun Zhang 0059
— Southwest Jiaotong University, School of Transportation and Logistics, Chengdu, China
- Jun Zhang 0060
— China University of Mining and Technology, School of Information and Control Engineering, Xuzhou, China
- Jun Zhang 0061
— Tongji University, College of Transportation Engineering, Shanghai, China
- Jun Zhang 0062
— Huazhong University of Science and Technology, School of Artificial Intelligence and Automation, Wuhan, China
- Jun Zhang 0063 — Google Inc., China (and 1 more)
- Jun Zhang 0064 — Old Dominion University, Department of Engineering Management and Systems Engineering, Norfolk, Virginia, USA
- Jun Zhang 0065
— Yunnan Normal University, School of Physics and Electronic Information, Yunnan Key Laboratory of Opto-Electronic Information Technology, Kunming, China
- Jun Zhang 0066 — AI Lab, ByteDance Inc., Speech & Audio Team, Beijing, China (and 1 more)
- Jun Zhang 0067
— National University of Defense Technology, Laboratory for big data and decision, Department of Information System and Management, Changsha, China
- Jun Zhang 0068
— University of Science and Technology of China, State Key Laboratory of Fire Science, Hefei, China (and 1 more)
- Jun Zhang 0069
— Zhejiang University, State Key Laboratory of Blockchain and Data Security, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j98]Chi Liu
, Tianqing Zhu
, Yuan Zhao, Jun Zhang, Wanlei Zhou:
Disentangling different levels of GAN fingerprints for task-specific forensics. Comput. Stand. Interfaces 89: 103825 (2024) - [j97]Minfeng Qi
, Ziyuan Wang, Qing-Long Han, Jun Zhang, Shiping Chen, Yang Xiang:
Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey. IEEE CAA J. Autom. Sinica 11(8): 1757-1776 (2024) - [j96]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
IoTFuzz: Automated Discovery of Violations in Smart Homes With Real Environment. IEEE Internet Things J. 11(6): 10183-10196 (2024) - [j95]Weizhi Meng
, Rongxing Lu
, Jun Zhang
, Pierangela Samarati
:
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices. IEEE Trans. Consumer Electron. 70(1): 3960-3962 (2024) - [c65]Xiaowei Zhang, Shigang Liu, Jun Zhang, Yang Xiang:
PTFix: Rule-Based and LLM Techniques for Java Path Traversal Vulnerability. DSPP (1) 2024: 276-293 - [c64]Shigang Liu, Lin Li, Xinbo Ban, Chao Chen, Jun Zhang, Seyit Camtepe, Yang Xiang:
Automatic Software Vulnerability Detection in Binary Code. ML4CS 2024: 148-166 - [c63]Zian Liu, Shigang Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Jun Zhang, Dongxi Liu:
VulMatch: Binary-Level Vulnerability Detection Through Signature. NSS 2024: 409-427 - [c62]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. USENIX Security Symposium 2024 - [c61]Zeming Yao
, Lin Li
, Leo Yu Zhang
, Fusen Guo
, Chao Chen
, Jun Zhang
:
Deceptive Waves: Embedding Malicious Backdoors in PPG Authentication. WISE (2) 2024: 258-272 - [i25]Yasas Supeksala, Dinh C. Nguyen
, Ming Ding, Thilina Ranbaduge, Calson Chua, Jun Zhang, Jun Li, H. Vincent Poor:
Private Knowledge Sharing in Distributed Learning: A Survey. CoRR abs/2402.06682 (2024) - [i24]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Ming Ding, Chao Chen, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Memorization in deep learning: A survey. CoRR abs/2406.03880 (2024) - [i23]Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang:
EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection. CoRR abs/2407.19216 (2024) - 2023
- [j94]Jingjin Li
, Chao Chen
, Mostafa Rahimi Azghadi, Hossein Ghodosi, Lei Pan
, Jun Zhang:
Security and privacy problems in voice assistant applications: A survey. Comput. Secur. 134: 103448 (2023) - [j93]Lin Li
, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. Comput. Secur. 135: 103488 (2023) - [j92]Nan Sun
, Ming Ding
, Jiaojiao Jiang
, Weikang Xu, Xiaoxing Mo
, Yonghang Tai
, Jun Zhang
:
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. IEEE Commun. Surv. Tutorials 25(3): 1748-1774 (2023) - [j91]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
A survey on privacy inference attacks and defenses in cloud-based Deep Neural Network. Comput. Stand. Interfaces 83: 103672 (2023) - [j90]Chi Liu
, Tianqing Zhu
, Jun Zhang
, Wanlei Zhou
:
Privacy Intelligence: A Survey on Image Privacy in Online Social Networks. ACM Comput. Surv. 55(8): 161:1-161:35 (2023) - [j89]Binjie Liao
, Hongyi Chen, Yu Wang
, Weizhi Meng
, Jun Zhang:
Analysis of hybrid attack and defense based on block withholding strategy. J. Inf. Secur. Appl. 78: 103620 (2023) - [j88]Junyang Qiu
, Qing-Long Han
, Wei Luo
, Lei Pan
, Surya Nepal
, Jun Zhang
, Yang Xiang
:
Cyber Code Intelligence for Android Malware Detection. IEEE Trans. Cybern. 53(1): 617-627 (2023) - [j87]Nan Sun
, Jun Zhang
, Shang Gao
, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Cyber Information Retrieval Through Pragmatics Understanding and Visualization. IEEE Trans. Dependable Secur. Comput. 20(2): 1186-1199 (2023) - [j86]Chi Liu
, Huajie Chen
, Tianqing Zhu
, Jun Zhang
, Wanlei Zhou:
Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack. IEEE Trans. Dependable Secur. Comput. 20(6): 5182-5196 (2023) - [c60]Zian Liu
, Chao Chen
, Ejaz Ahmed
, Jun Zhang
, Dongxi Liu
:
WinkFuzz: Model-based Script Synthesis for Fuzzing. ASSS@AsiaCCS 2023: 2:1-2:12 - [c59]Lin Li
, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. ESORICS (3) 2023: 183-202 - [c58]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SigD: A Cross-Session Dataset for PPG-based User Authentication in Different Demographic Groups. IJCNN 2023: 1-8 - [c57]Andrew Plapp
, Jianzhang Wu, Lei Pan, Chao Chen, Caslon Chua
, Jun Zhang:
Strengthening Cyber Security Education: Designing Robust Assessments for ChatGPT-Generated Answers. ML4CS 2023: 17-27 - [c56]Lin Li
, Chao Chen
, Lei Pan
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display. RAID 2023: 686-699 - [i22]Jingjin Li, Chao Chen, Lei Pan, Mostafa Rahimi Azghadi, Hossein Ghodosi, Jun Zhang:
Security and Privacy Problems in Voice Assistant Applications: A Survey. CoRR abs/2304.09486 (2023) - [i21]Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu:
VulMatch: Binary-level Vulnerability Detection Through Signature. CoRR abs/2308.00288 (2023) - [i20]Zian Liu, Zhi Zhang, Siqi Ma
, Dongxi Liu, Jun Zhang, Chao Chen, Shigang Liu, Muhammad Ejaz Ahmed, Yang Xiang:
SemDiff: Binary Similarity Detection by Diffing Key-Semantics Graphs. CoRR abs/2308.01463 (2023) - [i19]Zian Liu, Chao Chen, Muhammad Ejaz Ahmed, Jun Zhang, Dongxi Liu:
model-based script synthesis for fuzzing. CoRR abs/2308.04115 (2023) - [i18]Jiaheng Wei, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shirui Pan, Kok-Leong Ong, Jun Zhang, Yang Xiang:
Client-side Gradient Inversion Against Federated Learning from Poisoning. CoRR abs/2309.07415 (2023) - 2022
- [j85]Rory Coulter
, Jun Zhang, Lei Pan, Yang Xiang
:
Domain adaptation for Windows advanced persistent threat detection. Comput. Secur. 112: 102496 (2022) - [j84]Jiashuo Lin
, Liping Liao, Tao Wang, Jun Zhang, Lianglun Cheng:
SDCCP: Control the network using software-defined networking and end-to-end congestion control. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j83]Yonghang Tai, Yinjia Wang, Zhifeng Wang, Feiyan Li, Lei Wei
, Lei Pan
, Jun Zhang, Junsheng Shi:
Trustworthy blockchain-based medical Internet of thing for minimal invasive surgery training simulator. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j82]Xiangyu Hu
, Wanlun Ma, Chao Chen
, Sheng Wen, Jun Zhang
, Yang Xiang
, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j81]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
:
Machine Learning-based Cyber Attacks Targeting on Controlled Information: A Survey. ACM Comput. Surv. 54(7): 139:1-139:36 (2022) - [j80]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang
:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j79]Shigang Liu
, Guanjun Lin
, Lizhen Qu, Jun Zhang
, Olivier Y. de Vel, Paul Montague, Yang Xiang
:
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 19(1): 438-451 (2022) - [j78]Guangquan Xu
, Xiaofei Xie
, Shuhan Huang
, Jun Zhang
, Lei Pan
, Wei Lou
, Kaitai Liang
:
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers. IEEE Trans. Dependable Secur. Comput. 19(2): 862-878 (2022) - [j77]Jian Shen
, Ziyuan Gui
, Xiaofeng Chen
, Jun Zhang
, Yang Xiang
:
Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1464-1475 (2022) - [j76]Liang Yuan
, Qiang He
, Feifei Chen
, Jun Zhang
, Lianyong Qi
, Xiaolong Xu
, Yang Xiang
, Yun Yang
:
CSEdge: Enabling Collaborative Edge Storage for Multi-Access Edge Computing Based on Blockchain. IEEE Trans. Parallel Distributed Syst. 33(8): 1873-1887 (2022) - [c55]Lin Li
, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. AISec@CCS 2022: 57-66 - [c54]Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. ESORICS (2) 2022: 610-628 - [c53]Zian Liu, Chao Chen, Ejaz Ahmed, Dongxi Liu, Jun Zhang:
Automated Binary Analysis: A Survey. ICA3PP 2022: 392-411 - [c52]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. ICME 2022: 1-6 - [c51]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
:
A Survey on IoT Vulnerability Discovery. NSS 2022: 267-282 - [i17]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
SoK: An Overview of PPG's Application in Authentication. CoRR abs/2201.11291 (2022) - [i16]Yuantian Miao, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation. CoRR abs/2202.05416 (2022) - [i15]Lin Li, Chao Chen, Lei Pan, Jun Zhang, Yang Xiang:
Video is All You Need: Attacking PPG-based Biometric Authentication. CoRR abs/2203.00928 (2022) - [i14]Chi Liu
, Huajie Chen, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack. CoRR abs/2203.11433 (2022) - [i13]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. CoRR abs/2204.01934 (2022) - [i12]Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication. CoRR abs/2207.04434 (2022) - 2021
- [j75]Junyang Qiu, Jun Zhang
, Wei Luo
, Lei Pan
, Surya Nepal
, Yang Xiang
:
A Survey of Android Malware Detection with Deep Neural Models. ACM Comput. Surv. 53(6): 126:1-126:36 (2021) - [j74]Guanjun Lin, Wei Xiao, Leo Yu Zhang
, Shang Gao, Yonghang Tai
, Jun Zhang:
Deep neural-based vulnerability discovery demystified: data, model and performance. Neural Comput. Appl. 33(20): 13287-13300 (2021) - [j73]Yuantian Miao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Benjamin Zi Hao Zhao, Dali Kaafar, Yang Xiang:
The Audio Auditor: User-Level Membership Inference in Internet of Things Voice Services. Proc. Priv. Enhancing Technol. 2021(1): 209-228 (2021) - [j72]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Olivier Y. de Vel
, Paul Montague, Yang Xiang
:
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Trans. Dependable Secur. Comput. 18(5): 2469-2485 (2021) - [c50]Xinbo Ban
, Ming Ding
, Shigang Liu
, Chao Chen
, Jun Zhang
, Yang Xiang
:
TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 218-237 - [c49]Nan Sun, Jun Zhang, Shang Gao, Leo Yu Zhang, Seyit Camtepe, Yang Xiang:
My Security: An interactive search engine for cybersecurity. HICSS 2021: 1-10 - [i11]Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang:
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey. CoRR abs/2102.07969 (2021) - [i10]Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang:
Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey. CoRR abs/2105.06300 (2021) - [i9]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021) - 2020
- [j71]Peng Zeng, Guanjun Lin
, Lei Pan
, Yonghang Tai
, Jun Zhang:
Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey. IEEE Access 8: 197158-197172 (2020) - [j70]Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang
, Shui Yu
, Wanlei Zhou
:
Security and privacy in 6G networks: New areas and new challenges. Digit. Commun. Networks 6(3): 281-291 (2020) - [j69]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou
, Dongxi Xiang:
A study of data pre-processing techniques for imbalanced biomedical data classification. Int. J. Bioinform. Res. Appl. 16(3): 290-318 (2020) - [j68]Yuexin Zhang
, Xinyi Huang
, Xiaofeng Chen
, Leo Yu Zhang
, Jun Zhang
, Yang Xiang
:
A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle. IEEE Internet Things J. 7(2): 1061-1071 (2020) - [j67]Rory Coulter, Qing-Long Han
, Lei Pan
, Jun Zhang, Yang Xiang
:
Code analysis for intelligent cyber systems: A data-driven approach. Inf. Sci. 524: 46-58 (2020) - [j66]Zheng Yan
, Willy Susilo
, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j65]Guanjun Lin
, Sheng Wen
, Qing-Long Han
, Jun Zhang
, Yang Xiang
:
Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proc. IEEE 108(10): 1825-1848 (2020) - [j64]Rory Coulter
, Qing-Long Han
, Lei Pan
, Jun Zhang
, Yang Xiang
:
Data-Driven Cyber Security in Perspective - Intelligent Traffic Analysis. IEEE Trans. Cybern. 50(7): 3081-3093 (2020) - [j63]Yonggang Huang
, Jun Zhang
, Lei Pan
, Yang Xiang
:
Privacy Protection in Interactive Content Based Image Retrieval. IEEE Trans. Dependable Secur. Comput. 17(3): 595-607 (2020) - [j62]Shigang Liu
, Guanjun Lin
, Qing-Long Han
, Sheng Wen, Jun Zhang
, Yang Xiang
:
DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection. IEEE Trans. Fuzzy Syst. 28(7): 1329-1343 (2020) - [j61]Xiao Chen
, Chaoran Li
, Derui Wang
, Sheng Wen, Jun Zhang
, Surya Nepal
, Yang Xiang
, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020) - [j60]Shigang Liu
, Mahdi Dibaei
, Yonghang Tai, Chao Chen
, Jun Zhang
, Yang Xiang
:
Cyber Vulnerability Intelligence for Internet of Things Binary. IEEE Trans. Ind. Informatics 16(3): 2154-2163 (2020) - [c48]Nan Sun
, Jun Zhang, Shang Gao, Leo Yu Zhang
, Seyit Camtepe
, Yang Xiang
:
Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence. NSS 2020: 3-21 - [c47]Qi Zhong
, Leo Yu Zhang
, Jun Zhang, Longxiang Gao, Yong Xiang:
Protecting IP of Deep Neural Networks with Watermarking: A New Label Helps. PAKDD (2) 2020: 462-474 - [c46]Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang
:
Unmasking Windows Advanced Persistent Threat Execution. TrustCom 2020: 268-276 - [c45]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309 - [c44]Meng Li, Qi Zhong
, Leo Yu Zhang
, Yajuan Du, Jun Zhang, Yong Xiang:
Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach. TrustCom 2020: 402-409 - [e3]Miroslaw Kutylowski
, Jun Zhang
, Chao Chen
:
Network and System Security - 14th International Conference, NSS 2020, Melbourne, VIC, Australia, November 25-27, 2020, Proceedings. Lecture Notes in Computer Science 12570, Springer 2020, ISBN 978-3-030-65744-4 [contents] - [i8]Chi Liu, Tianqing Zhu, Jun Zhang, Wanlei Zhou:
Privacy Intelligence: A Survey on Image Sharing on Online Social Networks. CoRR abs/2008.12199 (2020) - [i7]Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Seyit Ahmet Çamtepe, Yang Xiang:
DeFuzz: Deep Learning Guided Directed Fuzzing. CoRR abs/2010.12149 (2020)
2010 – 2019
- 2019
- [j59]Junyang Qiu
, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Predicting the Impact of Android Malicious Samples via Machine Learning. IEEE Access 7: 66304-66316 (2019) - [j58]Junyang Qiu
, Jun Zhang, Wei Luo
, Lei Pan
, Surya Nepal
, Yu Wang
, Yang Xiang
:
A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019) - [j57]Liu Liu
, Chao Chen
, Jun Zhang
, Olivier Y. de Vel
, Yang Xiang
:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [j56]Nan Sun
, Jun Zhang
, Paul Rimba, Shang Gao
, Leo Yu Zhang
, Yang Xiang
:
Data-Driven Cybersecurity Incident Prediction: A Survey. IEEE Commun. Surv. Tutorials 21(2): 1744-1772 (2019) - [j55]Lei Pan
, Jun Zhang, Jonathan J. Oliver:
Editorial: Recent advances in machine learning for cybersecurity. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j54]Hong Zhang, Yifan Yang
, Ding Yuan, Daniel Sun, Jun Zhang, Guoqiang Li, Mingui Sun:
Video denoising for security and privacy in fog computing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j53]Binfeng Wang, Jun Zhang, Zili Zhang
, Lei Pan
, Yang Xiang
, Dawen Xia
:
Noise-Resistant Statistical Traffic Classification. IEEE Trans. Big Data 5(4): 454-466 (2019) - [c43]Guanjun Lin, Wei Xiao, Jun Zhang, Yang Xiang
:
Deep Learning-Based Vulnerable Function Detection: A Benchmark. ICICS 2019: 219-232 - [c42]Junyang Qiu, Surya Nepal, Wei Luo
, Lei Pan
, Yonghang Tai, Jun Zhang, Yang Xiang:
Data-Driven Android Malware Intelligence: A Survey. ML4CS 2019: 183-202 - [c41]Rory Coulter, Lei Pan
, Jun Zhang, Yang Xiang:
A Visualization-Based Analysis on Classifying Android Malware. ML4CS 2019: 304-319 - [c40]Liu Liu, Chao Chen
, Jun Zhang, Olivier Y. de Vel, Yang Xiang
:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - [e2]Xiaofeng Chen, Xinyi Huang, Jun Zhang:
Machine Learning for Cyber Security - Second International Conference, ML4CS 2019, Xi'an, China, September 19-21, 2019, Proceedings. Lecture Notes in Computer Science 11806, Springer 2019, ISBN 978-3-030-30618-2 [contents] - [i6]Yuantian Miao, Benjamin Zi Hao Zhao, Minhui Xue, Chao Chen, Lei Pan, Jun Zhang, Dali Kaafar, Yang Xiang:
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT. CoRR abs/1905.07082 (2019) - [i5]Mahdi Dibaei
, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu:
An Overview of Attacks and Defences on Intelligent Connected Vehicles. CoRR abs/1907.07455 (2019) - [i4]Shigang Liu, Jun Zhang, Yang Xiang, Wanlei Zhou, Dongxi Xiang:
A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification. CoRR abs/1911.00996 (2019) - 2018
- [j52]Hong Lai, Mingxing Luo, Josef Pieprzyk
, Jun Zhang, Lei Pan
, Mehmet A. Orgun
:
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci. China Inf. Sci. 61(6): 062501:1-062501:11 (2018) - [j51]Weizhi Meng
, Lijun Jiang, Yu Wang
, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76: 252-264 (2018) - [j50]Liu Liu
, Olivier Y. de Vel, Qing-Long Han
, Jun Zhang, Yang Xiang
:
Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Commun. Surv. Tutorials 20(2): 1397-1417 (2018) - [j49]Yuantian Miao, Zichan Ruan
, Lei Pan
, Jun Zhang
, Yang Xiang:
Comprehensive analysis of network traffic data. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j48]Jun Zhang, Aniello Castiglione
, Laurence Tianruo Yang, Yan Zhang:
Recent advances in security and privacy in Social Big Data. Future Gener. Comput. Syst. 87: 686-687 (2018) - [j47]Zichan Ruan
, Yuantian Miao, Lei Pan
, Yang Xiang, Jun Zhang:
Big network traffic data visualization. Multim. Tools Appl. 77(9): 11459-11487 (2018) - [j46]Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk
, Lei Pan
, Mehmet A. Orgun
:
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Inf. Process. 17(7): 162 (2018) - [j45]Yonggang Huang
, Longbing Cao
, Jun Zhang
, Lei Pan
, Yuying Liu:
Exploring Feature Coupling and Model Coupling for Image Source Identification. IEEE Trans. Inf. Forensics Secur. 13(12): 3108-3121 (2018) - [j44]Guanjun Lin
, Jun Zhang
, Wei Luo
, Lei Pan
, Yang Xiang
, Olivier Y. de Vel, Paul Montague:
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Trans. Ind. Informatics 14(7): 3289-3297 (2018) - [c39]Junyang Qiu, Wei Luo
, Surya Nepal
, Jun Zhang, Yang Xiang
, Lei Pan
:
Keep Calm and Know Where to Focus: Measuring and Predicting the Impact of Android Malware. ADMA 2018: 238-254 - [c38]Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou
, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. AsiaCCS 2018: 723-734 - [c37]Mengdi Liu
, Guangquan Xu, Jun Zhang, Rajan Shankaran
, Gang Luo, Xi Zheng
, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - [c36]Derek Wang
, Wanlei Zhou
, James Xi Zheng
, Sheng Wen, Jun Zhang, Yang Xiang:
Who Spread to Whom? Inferring Online Social Networks with User Features. ICC 2018: 1-6 - [c35]Liu Liu
, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - [c34]Tong Chen
, Xue Li
, Hongzhi Yin
, Jun Zhang:
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection. PAKDD (Workshops) 2018: 40-52 - [c33]Xinbo Ban, Chao Chen, Shigang Liu, Yu Wang, Jun Zhang:
Deep-learnt features for Twitter spam detection. SocialSec 2018: 22-26 - [i3]Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang:
Automated Big Traffic Analytics for Cyber Security. CoRR abs/1804.09023 (2018) - [i2]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018) - 2017
- [j43]Guanjun Lin
, Nan Sun
, Surya Nepal
, Jun Zhang
, Yang Xiang, Houcine Hassan:
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability. IEEE Access 5: 11142-11154 (2017) - [j42]Shigang Liu, Yu Wang
, Jun Zhang
, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69: 35-49 (2017) - [j41]Tingmin Wu
, Sheng Wen
, Shigang Liu
, Jun Zhang
, Yang Xiang
, Majed A. AlRubaian, Mohammad Mehedi Hassan
:
Detecting spamming activities in twitter based on deep-learning technique. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j40]Zichan Ruan, Yuantian Miao, Lei Pan
, Nicholas Charles Patterson
, Jun Zhang
:
Visualization of big data security: a case study on the KDD99 cup data set. Digit. Commun. Networks 3(4): 250-259 (2017) - [j39]Chao Chen, Sheng Wen
, Jun Zhang
, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72: 319-326 (2017) - [j38]Fei Yu
, Chin-Chen Chang, Jian Shu
, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks 2016. J. Sensors 2017: 3057534:1-3057534:3 (2017) - [j37]Shigang Liu
, Jun Zhang
, Yang Xiang
, Wanlei Zhou
:
Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning. IEEE Trans. Fuzzy Syst. 25(6): 1476-1490 (2017) - [j36]Chao Chen, Yu Wang
, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Geyong Min
:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - [c32]Tingmin Wu, Shigang Liu, Jun Zhang
, Yang Xiang:
Twitter spam detection based on deep learning. ACSW 2017: 3:1-3:8 - [c31]Yuantian Miao, Lei Pan
, Sutharshan Rajasegarar
, Jun Zhang, Christopher Leckie
, Yang Xiang:
Distributed Detection of Zero-Day Network Traffic Flows. AusDM 2017: 173-191 - [c30]Guanjun Lin, Jun Zhang, Wei Luo
, Lei Pan
, Yang Xiang:
POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects. CCS 2017: 2539-2541 - [c29]Yuying Liu, Yonggang Huang, Jun Zhang
, Xu Liu, Hualei Shen:
Noisy Smoothing Image Source Identification. CSS 2017: 135-147 - [c28]Derek Wang
, Sheng Wen
, Yang Xiang, Wanlei Zhou
, Jun Zhang, Surya Nepal:
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. ICDCS 2017: 2417-2422 - [i1]Tong Chen, Lin Wu, Xue Li, Jun Zhang, Hongzhi Yin, Yang Wang:
Call Attention to Rumors: Deep Attention Based Recurrent Neural Networks for Early Rumor Detection. CoRR abs/1704.05973 (2017) - 2016
- [j35]Yang Xiang, Ivan Stojmenovic, Peter Mueller, Jun Zhang
:
Security and reliability in big data. Concurr. Comput. Pract. Exp. 28(3): 581-582 (2016) - [j34]Chao Chen, Jun Zhang
, Yang Xiang, Wanlei Zhou
, Jonathan J. Oliver:
Spammers Are Becoming "Smarter" on Twitter. IT Prof. 18(2): 66-70 (2016) - [j33]Chao Chen, Jun Zhang
, Yi Xie, Yang Xiang, Wanlei Zhou
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Comments and Corrections. IEEE Trans. Comput. Soc. Syst. 3(1): 42 (2016) - [c27]Yuantian Miao, Zichan Ruan, Lei Pan
, Jun Zhang
, Yang Xiang, Yu Wang
:
Comprehensive Analysis of Network Traffic Data. CIT 2016: 423-430 - [c26]Shigang Liu, Jun Zhang
, Yu Wang
, Yang Xiang:
Fuzzy-Based Feature and Instance Recovery. ACIIDS (1) 2016: 605-615 - [c25]Shigang Liu, Jun Zhang
, Yang Xiang:
Statistical Detection of Online Drifting Twitter Spam: Invited Paper. AsiaCCS 2016: 1-10 - [c24]Jun Zhang
, Andrzej Goscinski:
Flow-based traffic retrieval using statistical features. IWBIS 2016: 25-30 - 2015
- [j32]Fei Yu
, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang
, José María de Fuentes
:
Recent Advances in Security and Privacy for Wireless Sensor Networks. J. Sensors 2015: 169305:1-169305:2 (2015) - [j31]Chao Chen, Jun Zhang, Yi Xie, Yang Xiang, Wanlei Zhou
, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi, Majed A. AlRubaian:
A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection. IEEE Trans. Comput. Soc. Syst. 2(3): 65-76 (2015) - [j30]Yonggang Huang, Jun Zhang
, Heyan Huang:
Camera Model Identification With Unknown Models. IEEE Trans. Inf. Forensics Secur. 10(12): 2692-2704 (2015) - [j29]Jun Zhang
, Xiao Chen
, Yang Xiang
, Wanlei Zhou
, Jie Wu:
Robust Network Traffic Classification. IEEE/ACM Trans. Netw. 23(4): 1257-1270 (2015) - [c23]Chao Chen, Jun Zhang
, Xiao Chen
, Yang Xiang
, Wanlei Zhou
:
6 million spam tweets: A large ground truth for timely Twitter spam detection. ICC 2015: 7065-7070 - [c22]Binfeng Wang, Jun Zhang
, Zili Zhang, Wei Luo
, Dawen Xia
:
Robust Traffic Classification with Mislabelled Training Samples. ICPADS 2015: 328-335 - [c21]Chao Chen, Jun Zhang
, Yang Xiang
, Wanlei Zhou
:
Asymmetric self-learning for tackling Twitter Spam Drift. INFOCOM Workshops 2015: 208-213 - [c20]Ang Yang, Jun Zhang
, Lei Pan
, Yang Xiang:
Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination. SocialSec 2015: 52-57 - 2014
- [j28]Yu Wang
, Yang Xiang
, Jun Zhang
, Wanlei Zhou
, Bailin Xie:
Internet traffic clustering with side information. J. Comput. Syst. Sci. 80(5): 1021-1036 (2014) - [j27]Yonggang Huang, Jun Zhang
, Heyan Huang, Daifa Wang:
Medical image retrieval based on unclean image bags. Multim. Tools Appl. 72(3): 2977-2999 (2014) - [j26]Yonggang Huang, Heyan Huang, Jun Zhang
:
A noisy-smoothing relevance feedback method for content-based medical image retrieval. Multim. Tools Appl. 73(3): 1963-1981 (2014) - [j25]Yongli Ren
, Gang Li
, Jun Zhang
, Wanlei Zhou
:
The maximum imputation framework for neighborhood-based collaborative filtering. Soc. Netw. Anal. Min. 4(1): 207 (2014) - [j24]Sheng Wen
, Wei Zhou, Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Weijia Jia
, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. IEEE Trans. Dependable Secur. Comput. 11(4): 361-374 (2014) - [j23]Yu Wang
, Yang Xiang
, Jun Zhang
, Wanlei Zhou
, Guiyi Wei, Laurence T. Yang:
Internet Traffic Classification Using Constrained Clustering. IEEE Trans. Parallel Distributed Syst. 25(11): 2932-2943 (2014) - [c19]Di Wu
, Xiao Chen
, Chao Chen, Jun Zhang, Yang Xiang, Wanlei Zhou
:
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification. NSS 2014: 138-151 - 2013
- [j22]Jun Zhang
, Lei Ye, Yang Xiang
, Wanlei Zhou
:
Robust image retrieval with hidden classes. Comput. Vis. Image Underst. 117(6): 670-679 (2013) - [j21]Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Yu Wang
:
Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5): 573-585 (2013) - [j20]Yongli Ren
, Gang Li
, Jun Zhang
, Wanlei Zhou
:
Lazy Collaborative Filtering for Data Sets With Missing Values. IEEE Trans. Cybern. 43(6): 1822-1834 (2013) - [j19]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Yong Xiang:
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions. IEEE Trans. Inf. Forensics Secur. 8(1): 5-15 (2013) - [j18]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
, Athanasios V. Vasilakos
:
An Effective Network Traffic Classification Method with Unknown Flow Detection. IEEE Trans. Netw. Serv. Manag. 10(2): 133-147 (2013) - [j17]Jun Zhang
, Yang Xiang
, Yu Wang
, Wanlei Zhou
, Yong Xiang, Yong Guan:
Network Traffic Classification Using Correlation Information. IEEE Trans. Parallel Distributed Syst. 24(1): 104-117 (2013) - [j16]Sheng Wen
, Wei Zhou, Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Weijia Jia
:
Modeling Propagation Dynamics of Social Network Worms. IEEE Trans. Parallel Distributed Syst. 24(8): 1633-1643 (2013) - [c18]Yongli Ren
, Gang Li
, Jun Zhang
, Wanlei Zhou
:
AdaM: adaptive-maximum imputation for neighborhood-based collaborative filtering. ASONAM 2013: 628-635 - [c17]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Robust network traffic identification with unknown applications. AsiaCCS 2013: 405-414 - [c16]Xiao Chen
, Jun Zhang
, Yang Xiang
, Wanlei Zhou
:
Traffic Identification in Semi-known Network Environment. CSE 2013: 572-579 - [c15]Jun Zhang
, Xiao Chen
, Yang Xiang
, Wanlei Zhou
:
Zero-Day Traffic Identification. CSS 2013: 213-227 - [c14]Yu Wang
, Yang Xiang
, Jun Zhang
:
Network traffic clustering using Random Forest proximities. ICC 2013: 2058-2062 - [c13]Silvio Cesare, Yang Xiang, Jun Zhang:
Clonewise - Detecting Package-Level Clones Using Machine Learning. SecureComm 2013: 197-215 - 2012
- [j15]Yonggang Huang, Dianfu Ma, Jun Zhang
, Yongwang Zhao:
QDFA: Query-Dependent Feature Aggregation for Medical Image Retrieval. IEICE Trans. Inf. Syst. 95-D(1): 275-279 (2012) - [j14]Yonggang Huang, Jun Zhang
, Yongwang Zhao, Dianfu Ma:
A New Re-Ranking Method Using Enhanced Pseudo-Relevance Feedback for Content-Based Medical Image Retrieval. IEICE Trans. Inf. Syst. 95-D(2): 694-698 (2012) - [j13]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Semi-supervised and compound classification of network traffic. Int. J. Secur. Networks 7(4): 252-261 (2012) - [c12]Yongli Ren
, Gang Li
, Jun Zhang
, Wanlei Zhou
:
The efficient imputation method for neighborhood-based collaborative filtering. CIKM 2012: 684-693 - [c11]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Semi-supervised and Compound Classification of Network Traffic. ICDCS Workshops 2012: 617-621 - [c10]Yu Wang
, Yang Xiang
, Jun Zhang
, Shunzheng Yu:
Internet traffic clustering with constraints. IWCMC 2012: 619-624 - [c9]Jun Zhang
, Chao Chen, Yang Xiang
, Wanlei Zhou
:
Classification of Correlated Internet Traffic Flows. TrustCom 2012: 490-496 - 2011
- [j12]Jun Zhang
, Yang Xiang
, Wanlei Zhou
, Lei Ye, Yi Mu:
Secure Image Retrieval Based on Visual Content and Watermarking Protocol. Comput. J. 54(10): 1661-1674 (2011) - [c8]Yu Wang
, Yang Xiang
, Jun Zhang
, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. NSS 2011: 169-175 - 2010
- [j11]Jun Zhang
, Lei Ye:
Series feature aggregation for content-based image retrieval. Comput. Electr. Eng. 36(4): 691-701 (2010) - [j10]Jun Zhang
, Zhijing Liu, Hong Zhou:
Real-time gait classification based on fuzzy associative memory. Int. J. Model. Identif. Control. 10(3/4): 263-271 (2010) - [j9]Bin Zhao, Weidong Kou, Hui Li, Lanjun Dang, Jun Zhang
:
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. Inf. Sci. 180(23): 4672-4684 (2010) - [j8]Fei Yu, Chin-Chen Chang, Jian Shu, Guangxue Yue, Jun Zhang:
Guest Editorial. J. Multim. 5(3): 197-199 (2010) - [j7]Fei Yu, Chin-Chen Chang, Wen Chen, Jun Zhang, Guangxue Yue:
Guest Editorial. J. Networks 5(6): 631-633 (2010) - [j6]Dongfeng Yuan, Chin-Chen Chang, Fei Yu, Guozhu Liu, Jun Zhang:
Guest Editorial. J. Networks 5(9): 991-993 (2010) - [c7]Yonggang Huang, Jun Zhang
, Yongwang Zhao, Dianfu Ma:
Medical Image Retrieval with Query-Dependent Feature Fusion Based on One-Class SVM. CSE 2010: 176-183
2000 – 2009
- 2009
- [j5]Fei Yu, Chin-Chen Chang, Deng-Yi Zhang, Jiexian Zeng, Jun Zhang:
Editorial. J. Multim. 4(3): 101-103 (2009) - [j4]Fei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue:
Editorial. J. Softw. 4(1): 1-2 (2009) - [j3]Jun Zhang
, Lei Ye:
Local aggregation function learning based on support vector machines. Signal Process. 89(11): 2291-2295 (2009) - [j2]Jun Zhang
, Lei Ye:
Content Based Image Retrieval Using Unclean Positive Examples. IEEE Trans. Image Process. 18(10): 2370-2375 (2009) - [c6]Jun Zhang
, Lei Ye:
Image retrieval based on bag of images. ICIP 2009: 1865-1868 - [c5]Jun Zhang
, Lei Ye:
Image retrieval using noisy query. ICME 2009: 866-869 - [c4]Jun Zhang
, Lei Ye:
Watermarking protocol for protecting user's right in content based image retrieval. ICME 2009: 1082-1085 - [e1]Mohsen Guizani, Peter Müller, Klaus-Peter Fähnrich, Athanasios V. Vasilakos, Yan Zhang, Jun Zhang:
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009. ACM 2009, ISBN 978-1-60558-569-7 [contents] - 2007
- [j1]Jun Zhang
, Weidong Kou, Kai Fan, Lei Ye:
Watermarking protocol of secure verification. J. Electronic Imaging 16(4): 043002 (2007) - [c3]Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang
, Zan Li, Kai Fan:
A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. Inscrypt 2007: 442-456 - [c2]Jun Zhang
, Lei Ye:
An Unified Framework Based on p-Norm for Feature Aggregation in Content-Based Image Retrieval. ISM 2007: 195-201 - [c1]Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang, Xuefei Cao:
Design of Secure Watermarking Scheme for Watermarking Protocol. PCM 2007: 357-366
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-24 21:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint