default search action
Zhaoxin Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Chao Li, Yanan Cheng, Zhaoxin Zhang, Zundong Zhang:
Censorship data-driven DNS resolution anomaly detection: An ensemble algorithm model with multivariate feature fusion. Comput. Networks 252: 110669 (2024) - [j37]Chao Li, Jian Chen, Zhaoxin Zhang, Zhiping Li, Yanan Cheng, Chendi Ma:
DNS root server resolution anomaly detection. Comput. Secur. 144: 103946 (2024) - [j36]Guoying Sun, Yanan Cheng, Zhaoxin Zhang, Xiaojun Tong, Tingting Chai:
Text classification with improved word embedding and adaptive segmentation. Expert Syst. Appl. 238(Part B): 121852 (2024) - [j35]Ke Kong, Luhua Wang, Zhaoxin Zhang, Yikang Li, Dong Zhao, Junkai Huang:
KFFPDet: Android malicious application detection system with assisted detection of adversarial samples. Expert Syst. Appl. 252: 124095 (2024) - [j34]Zhaoxin Zhang, Shize Huang, Xiaowen Liu, Qianhui Fan, Decun Dong:
Adversarial attack on human pose estimation network. Adv. Math. Commun. 33(1) (2024) - [j33]Dayong Zhang, Hao Men, Zhaoxin Zhang:
Assessing the stability of collaboration networks: A structural cohesion analysis perspective. J. Informetrics 18(1): 101490 (2024) - [j32]Guoying Sun, Yanan Cheng, Fangzhou Dong, Luhua Wang, Dong Zhao, Zhaoxin Zhang, Xiaojun Tong:
Multi-Label Text Classification model integrating Label Attention and Historical Attention. Knowl. Based Syst. 296: 111878 (2024) - [j31]Guoying Sun, Zhaoxin Zhang:
Radical-attended and Pinyin-attended malicious long-tail keywords detection. Neural Comput. Appl. 36(24): 14757-14773 (2024) - [j30]Wenling Li, Ping Yu, Yanan Cheng, Jianen Yan, Zhaoxin Zhang:
Efficient and Privacy-Enhanced Federated Learning Based on Parameter Degradation. IEEE Trans. Serv. Comput. 17(5): 2304-2319 (2024) - [c20]Jian Chen, Shenao Zheng, Yanan Cheng, Zhaoxin Zhang:
Data mining based analysis of online gambling sites and illicit financial flows. ICCBD 2024: 205-211 - [i8]Zhichao Zhang, Zhaoxin Zhang, Yanan Cheng, Ning Li:
6Rover: Leveraging Reinforcement Learning-based Address Pattern Mining Approach for Discovering Active Targets in IPv6 Unseeded Space. CoRR abs/2401.07081 (2024) - [i7]Xin Yuan, Ning Li, Quan Chen, Wenchao Xu, Zhaoxin Zhang, Song Guo:
A QoE-Aware Split Inference Accelerating Algorithm for NOMA-based Edge Intelligence. CoRR abs/2409.16537 (2024) - 2023
- [j29]Zijun Li, Chao Li, Guoying Sun, Zhaoxin Zhang, Yanan Cheng, Muxin Weng:
Research on Optimal Selection Measurement of DNS Root Instance. IEEE Access 11: 94034-94042 (2023) - [j28]Jianen Yan, Haiyan Xu, Ning Li, Zhaoxin Zhang:
Large-Scale Emulation Network Topology Partition Based on Community Detection With the Weight of Vertex Similarity. Comput. J. 66(8): 1817-1828 (2023) - [j27]Guoying Sun, Feng Ye, Tingting Chai, Zhaoxin Zhang, Xiaojun Tong, Shitala Prasad:
Gambling Domain Name Recognition via Certificate and Textual Analysis. Comput. J. 66(8): 1829-1839 (2023) - [j26]Shitala Prasad, Tingting Chai, Jiahui Li, Zhaoxin Zhang:
CR Loss: Improving Biometric Using ClassRoom Learning Approach. Comput. J. 66(12): 2897-2907 (2023) - [j25]Chao Li, Yanan Cheng, Zhaoxin Zhang, Ping Yu:
Configuration anormaly detection and resolution risk assessment of authoritative domain name server. Comput. Secur. 135: 103426 (2023) - [j24]Zonglin Li, Shengping Zhang, Zhaoxin Zhang, Quanling Meng, Qinglin Liu, Huiyu Zhou:
Attention guided domain alignment for conditional face image generation. Comput. Vis. Image Underst. 234: 103740 (2023) - [j23]Zonglin Li, Shengping Zhang, Yang Liu, Zhaoxin Zhang, Weigang Zhang, Qingming Huang:
Text-driven Face Image Generation and Manipulation via Multi-level Residual Mapper. Int. J. Softw. Informatics 13(2): 177-196 (2023) - [j22]Tingting Chai, Jiahui Li, Yanhong Wang, Guoying Sun, Changyong Guo, Zhaoxin Zhang:
Vascular Enhancement Analysis in Lightweight Deep Feature Space. Neural Process. Lett. 55(3): 2305-2320 (2023) - [j21]Wenling Li, Ning Li, Jianen Yan, Zhaoxin Zhang, Ping Yu, Gang Long:
Secure and High-Quality Watermarking Algorithms for Relational Database Based on Semantic. IEEE Trans. Knowl. Data Eng. 35(7): 7440-7456 (2023) - [j20]Tingting Chai, Shitala Prasad, Jianen Yan, Zhaoxin Zhang:
Contactless palmprint biometrics using DeepNet with dedicated assistant layers. Vis. Comput. 39(9): 4029-4047 (2023) - [i6]Xin Yuan, Ning Li, Zhaoxin Zhang, Quan Chen, José-Fernán Martínez:
FODT: Fast, Online, Distributed and Temporary Failure Recovery Approach for MEC. CoRR abs/2312.15849 (2023) - 2022
- [j19]Yanan Cheng, Tingting Chai, Zhaoxin Zhang, Keyu Lu, Yuejin Du:
Detecting Malicious Domain Names with Abnormal WHOIS Records Using Feature-Based Rules. Comput. J. 65(9): 2262-2275 (2022) - [j18]Keyu Lu, Tingting Chai, Haiyan Xu, Shitala Prasad, Jianen Yan, Zhaoxin Zhang:
Research on Unexpected DNS Response from Open DNS Resolvers. Comput. J. 65(9): 2276-2298 (2022) - [j17]Guoying Sun, Zhaoxin Zhang, Yanan Cheng, Tingting Chai:
Adaptive segmented webpage text based malicious website detection. Comput. Networks 216: 109236 (2022) - [j16]Ke Kong, Zhichao Zhang, Ziyuan Yang, Zhaoxin Zhang:
FCSCNN: Feature centralized Siamese CNN-based android malware identification. Comput. Secur. 112: 102514 (2022) - [j15]Zhaoxin Zhang, Shize Huang, Xiaowen Liu, Bingjie Zhang, Decun Dong:
Adversarial attacks on YOLACT instance segmentation. Comput. Secur. 116: 102682 (2022) - [j14]Ke Kong, Zhaoxin Zhang, Changyong Guo, Jideng Han, Gang Long:
PMMSA: Security analysis system for android wearable applications based on permission matching and malware similarity analysis. Future Gener. Comput. Syst. 137: 349-362 (2022) - [j13]Shize Huang, Xiaowen Liu, Wei Chen, Guanqun Song, Zhaoxin Zhang, Lingyu Yang, Bingjie Zhang:
A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series. Inf. Sci. 589: 62-79 (2022) - [j12]Tingting Chai, Jiahui Li, Shitala Prasad, Qi Lu, Zhaoxin Zhang:
Shape-driven lightweight CNN for finger-vein biometrics. J. Inf. Secur. Appl. 67: 103211 (2022) - [j11]Ping Yu, Wei Ni, Ren Ping Liu, Zhaoxin Zhang, Hua Zhang, Qiaoyan Wen:
Efficient Encrypted Range Query on Cloud Platforms. ACM Trans. Cyber Phys. Syst. 6(3): 27:1-27:23 (2022) - [j10]Haiyan Xu, Zhaoxin Zhang, Jianen Yan, Tingting Chai:
Name Dependency and Domain Name Resolution Risk Assessment. IEEE Trans. Netw. Serv. Manag. 19(3): 3413-3424 (2022) - [c19]Ning Li, Xin Yuan, Zhaoxin Zhang:
CoTree: Region-free and Decentralized Edge Server Cooperation. FRAME@HPDC 2022: 37-43 - [c18]Ning Li, Xin Yuan, José-Fernán Martínez, Zhaoxin Zhang:
The Variable-Weight MADM Algorithm for Wireless Network. SNTA@HPDC 2022: 51-55 - [i5]Ning Li, Xin Yuan, Zhaoxin Zhang, José-Fernán Martínez:
CoNet: Borderless and decentralized server cooperation in edge computing. CoRR abs/2207.13991 (2022) - 2021
- [j9]Shize Huang, Xiaowen Liu, Xiaolu Yang, Zhaoxin Zhang:
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs. Comput. Secur. 104: 102120 (2021) - [j8]Ning Li, Zhaoxin Zhang, Alex X. Liu, Xin Yuan, Yexia Cheng:
Pairwise-Based Multi-Attribute Decision Making Approach for Wireless Network. IEEE/ACM Trans. Netw. 29(4): 1687-1702 (2021) - [c17]Yiqi Zhong, Jiahui Li, Tingting Chai, Shitala Prasad, Zhaoxin Zhang:
Different Dimension Issues in Deep Feature Space for Finger-Vein Recognition. CCBR 2021: 295-303 - 2020
- [j7]Shize Huang, Xiaowen Liu, Xiaolu Yang, Zhaoxin Zhang, Lingyu Yang:
Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems. Complex. 2020: 6814263:1-6814263:10 (2020) - [j6]Changyong Guo, Zhaoxin Zhang, Jinjiang Li, Xuesong Jiang, Jun Zhang, Lei Zhang:
Robust Visual Tracking Using Kernel Sparse Coding on Multiple Covariance Descriptors. ACM Trans. Multim. Comput. Commun. Appl. 16(1s): 20:1-20:22 (2020) - [j5]Zhaoxin Zhang, Changyong Guo, Fanzhi Meng, Taizhong Xu, Junkai Huang:
CovLets: A Second-Order Descriptor for Modeling Multiple Features. ACM Trans. Multim. Comput. Commun. Appl. 16(1s): 21:1-21:14 (2020) - [c16]Yanan Cheng, Han Wang, Zhaoxin Zhang, Ning Li:
Characterizing the Security Threats of Disposable Phone Numbers. FCS 2020: 491-507 - [c15]Wenling Li, Jianen Yan, Zhaoxin Zhang:
Relational Database Watermarking Based on Chinese Word Segmentation and Word Embedding. ICCCN 2020: 1-6 - [c14]Ning Li, Yue Shi, Zhaoxin Zhang, José-Fernán Martínez, Xin Yuan:
Search-tree Based SDN Candidate Selection in Hybrid IP/SDN Network. ICNP 2020: 1-6 - [c13]Ning Li, Jianen Yan, Zhaoxin Zhang, José-Fernán Martínez, Xin Yuan:
Game Theory based Joint Task Offloading and Resource Allocation Algorithm for Mobile Edge Computing. MSN 2020: 791-796
2010 – 2019
- 2019
- [j4]Haiyan Xu, Zhaoxin Zhang, Jianen Yan, Xin Ma:
Evaluating the Impact of Name Resolution Dependence on the DNS. Secur. Commun. Networks 2019: 8565397:1-8565397:12 (2019) - [c12]Zhijun Wang, Qian Zhang, Hao Jia, Xueming Duan, Xinyu Huo, Zhaoxin Zhang, Peng Lan, Fenggang Sun:
An Effective Personnel Detection System Based on Radio Frequency Identification. ICAIT 2019: 78-81 - [c11]Zhengmin Li, Zhaoxin Zhang, Xinran Liu, Chunge Zhu:
Anomaly Detection for Container Cluster based on JointCloud Platform. ICCDA 2019: 26-30 - [i4]Ning Li, Jianen Yan, Zhaoxin Zhang, Alex X. Liu, Xin Yuan:
Pairwise-based Multi-Attribute Decision Making Approach for Wireless Network. CoRR abs/1912.07235 (2019) - [i3]Jianen Yan, Ning Li, Zhaoxin Zhang, Alex X. Liu, José-Fernán Martínez, Xin Yuan:
Game Theory based Joint Task Offloading and Resources Allocation Algorithm for Mobile Edge Computing. CoRR abs/1912.07599 (2019) - [i2]Ning Li, Jianen Yan, Zhaoxin Zhang, Xin Yuan:
Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams. CoRR abs/1912.07600 (2019) - [i1]Ning Li, Zhaoxin Zhang, José-Fernán Martínez-Ortega, Xin Yuan:
Geographical and Topology Control based Opportunistic Routing for Ad Hoc Networks. CoRR abs/1912.08100 (2019) - 2018
- [j3]Keyu Lu, Zhaoxin Zhang:
Evaluating "Health Status" for DNS Resolvers. IEICE Trans. Commun. 101-B(12): 2409-2424 (2018) - [j2]Jianen Yan, Hongli Zhang, Haiyan Xu, Zhaoxin Zhang:
Discrete PSO-based workload optimization in virtual machine placement. Pers. Ubiquitous Comput. 22(3): 589-596 (2018) - [c10]Jinxiu Lin, Zhaoxin Zhang, Lejun Chi, Yang Wang:
Research on Dynamic Discovery Model of User Interest Based on Time and Space Vector. ICPCSEE (2) 2018: 69-80 - [c9]Wei Wang, Wenjie Song, Chen Chen, Zhaoxin Zhang, Yi Xin:
I-vector features and deep neural network modeling for language recognition. IIKI 2018: 36-43 - [c8]J. K. Huang, Zhaoxin Zhang, W. J. Li, Yi Xin:
Assessment of the impacts of TLS vulnerabilities in the HTTPS ecosystem of China. IIKI 2018: 512-518 - 2016
- [c7]Keyu Lu, Zhengmin Li, Zhaoxin Zhang, Jiantao Shi:
DNS recursive server health evaluation model. APNOMS 2016: 1-4 - 2015
- [j1]Xiang-Zhan Yu, Zhaoxin Zhang, Haining Yu, Feng Jiang, Wen Ji:
An Asynchronous Periodic Sequential Pattern Mining Algorithm with Multiple Minimum Item Supports for Ad Hoc Networking. J. Sensors 2015: 461659:1-461659:13 (2015) - 2013
- [c6]Xiao Yang, Zhaoxin Zhang, Qiang Wang:
Personalized Recommendation Based on Co-Ranking and Query-Based Collaborative Diffusion. AAAI 2013: 1649-1650 - [c5]Xiao Yang, Zhaoxin Zhang:
Combining prestige and relevance ranking for personalized recommendation. CIKM 2013: 1877-1880 - [c4]Liang Zhang, Zhaoxin Zhang, Xu Cui, Dan Liu:
Research on the Monitoring and Controlling Model of SIP Network. GreenCom/iThings/CPScom 2013: 1784-1789 - 2012
- [c3]Xiao Yang, Zhen Tian, Huayang Cui, Zhaoxin Zhang:
Link prediction on evolving network using tensor-based node similarity. CCIS 2012: 154-158 - [c2]Qiao Li, Hui He, Binxing Fang, Zhaoxin Zhang, Juan Chen:
A content delivery strategy based on resource popularity for P4P architecture. CCIS 2012: 559-562 - [c1]Xiao Yang, Zhaoxin Zhang, Ke Wang:
Scalable collaborative filtering using incremental update and local link prediction. CIKM 2012: 2371-2374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint