Name
Affiliation
Papers
ZHEN XU
Chinese Acad Sci, Inst Informat Engn, Beijing 1000193, Peoples R China
50
Collaborators
Citations 
PageRank 
139
21
17.33
Referers 
Referees 
References 
93
632
163
Search Limit
100632
Title
Citations
PageRank
Year
Detection of Hardware-Assisted Virtualization Based on Low-Level Feature00.342022
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.00.342022
A Byte-level Autoencoder-based Method to Detect Malicious Open Resolver00.342022
Dual-Channel Convolution Network With Image-Based Global Learning Framework for Hyperspectral Image Classification10.352022
RAPMiner: A Generic Anomaly Localization Mechanism for CDN System with Multi-dimensional KPIs00.342022
360-Attack: Distortion-Aware Perturbations from Perspective-Views00.342022
Job Completion Time Under Migration-Based Dynamic Platform Technique00.342022
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning00.342021
360-Degree VR Video Watermarking Based on Spherical Wavelet Transform00.342021
Empowering Adaptive Early-Exit Inference With Latency Awareness00.342021
Improved Face Detector on Fisheye Images via Spherical-Domain Attention00.342021
DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs00.342021
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it!00.342021
QuickCDC: A Quick Content Defined Chunking Algorithm Based on Jumping and Dynamically Adjusting Mask Bits00.342021
SDFVAE: Static and Dynamic Factorized VAE for Anomaly Detection of Multivariate CDN KPIs60.432021
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center00.342021
A Novel Trojan Attack against Co-learning Based ASR DNN System00.342021
Security Analysis of DNS Open Resolvers by Continuous and Ambulatory Detection00.342021
A novel network traffic classification approach via discriminative feature learning00.342020
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks00.342020
An enhanced saturation attack and its mitigation mechanism in software-defined networking.10.352020
A Feedback Mechanism For Prediction-Based Anomaly Detection In Content Delivery Networks00.342020
End-Edge Coordinated Inference For Real-Time Byod Malware Detection Using Deep Learning00.342020
A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.00.342020
Comments On "Dropping Activation Outputs With Localized First-Layer Deep Network For Enhancing User Privacy And Data Security"00.342020
ConfigRand - A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.00.342020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.20.382020
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud00.342020
A Multivariate Time Series Prediction Schema Based On Multi-Attention In Recurrent Neural Network00.342020
Prihook: Differentiated Context-Aware Hook Placement for Different Owners' Smartphones00.342020
LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems00.342020
A Novel Polarimetric SAR Classification Method Integrating Pixel-Based and Patch-Based Classification20.362020
Adaptive SDN Master Controller Assignment for Maximizing Network Throughput00.342019
Minimizing Multi-Controller Deployment Cost in Software-Defined Networking00.342019
SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS00.342019
An Effective Table-Overflow Attack and Defense in Software-Defined Networking00.342019
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.00.342019
Towards Scalable and Flexible Path Control Schema in Software Defined Networking00.342019
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.10.352019
Prototype-Based Malware Traffic Classification With Novelty Detection00.342019
T-Tracker: Compressing System Audit Log by Taint Tracking00.342018
Understanding User Behavior in Online Banking System.00.342018
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.10.362018
A Game Theoretical Framework For Improving The Quality Of Service In Cooperative Ran Caching00.342017
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone10.362017
Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks.40.442017
DC2-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network.00.342017
Thwart eavesdropping attacks on network communication based on moving target defense00.342016
Defending Blind DDoS Attack on SDN Based on Moving Target Defense.10.412014
Real-Time Remote Attestation Of Iaas Cloud10.342012