default search action
Jinjing Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Wenjing Zhong, Jinjing Zhao, Hesuan Hu:
Non-interference assessment in colored net systems via integer linear programming. Inf. Sci. 658: 120027 (2024) - [c47]Jinjing Zhao, Fangyun Wei, Chang Xu:
Hybrid Proposal Refiner: Revisiting DETR Series from the Faster R-CNN Perspective. CVPR 2024: 17416-17426 - [c46]Yuhui Li, Fangyun Wei, Jinjing Zhao, Chao Zhang, Hongyang Zhang:
RAIN: Your Language Models Can Align Themselves without Finetuning. ICLR 2024 - [c45]Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. USENIX Security Symposium 2024 - [i4]Jierun Chen, Fangyun Wei, Jinjing Zhao, Sizhe Song, Bohuai Wu, Zhuoxuan Peng, S.-H. Gary Chan, Hongyang Zhang:
Revisiting Referring Expression Comprehension Evaluation in the Era of Large Multimodal Models. CoRR abs/2406.16866 (2024) - 2023
- [j7]Yi Xie, Yun Xiong, Jiawei Zhang, Chao Chen, Yao Zhang, Jie Zhao, Yizhu Jiao, Jinjing Zhao, Yangyong Zhu:
Temporal super-resolution traffic flow forecasting via continuous-time network dynamics. Knowl. Inf. Syst. 65(11): 4687-4712 (2023) - [j6]Wenjing Zhong, Jinjing Zhao, Hesuan Hu:
Beacon-Based Firing Control for Authorization Security in Workflows. IEEE Trans. Reliab. 72(4): 1594-1609 (2023) - [j5]Wenjing Zhong, Jinjing Zhao, Hesuan Hu:
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. IEEE Trans. Serv. Comput. 16(5): 3796-3811 (2023) - [c44]Zejian Shi, Yun Xiong, Yao Zhang, Zhijie Jiang, Jinjing Zhao, Lei Wang, Shanshan Li:
Improving Code Search with Multi-Modal Momentum Contrastive Learning. ICPC 2023: 280-291 - [i3]Yuhui Li, Fangyun Wei, Jinjing Zhao, Chao Zhang, Hongyang Zhang:
RAIN: Your Language Models Can Align Themselves without Finetuning. CoRR abs/2309.07124 (2023) - [i2]Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. CoRR abs/2310.09831 (2023) - 2022
- [c43]Zian Jia, Xiaosu Wang, Yun Xiong, Yao Zhang, Jinjing Zhao:
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat. DSC 2022: 360-366 - [c42]Chenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang, Han Zhang, Xuhong Zhang:
A Data-free Black-box Attack for Generating Transferable Adversarial Examples. HPCC/DSS/SmartCity/DependSys 2022: 672-678 - [c41]Chenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang:
Black-Box Adversarial Attacks on Deep Neural Networks: A Survey. ICDIS 2022: 88-93 - [i1]Xiaobin Fan, Xiaoping Wang, Kai Lu, Lei Xue, Jinjing Zhao:
Tree-based Search Graph for Approximate Nearest Neighbor Search. CoRR abs/2201.03237 (2022) - 2021
- [c40]Wenjing Zhong, Jinjing Zhao, Hesuan Hu:
A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage Problem. DSC 2021: 367-374 - [c39]Xiang Li, Shenglan Liu, Yunheng Li, Hao Liu, Jinjing Zhao, Lin Feng, Guihong Lao, Guangzhe Li:
Spatial-Temporal Attention Network with Multi-similarity Loss for Fine-Grained Skeleton-Based Action Recognition. ICONIP (2) 2021: 620-631 - 2020
- [c38]Jinjing Zhao, Ling Pang, Bai Lin:
SDNVD-SCADA: A Formalized Vulnerability Detection Platform in SDN-Enabled SCADA System. ACA 2020: 3-15 - [c37]Jinjing Zhao, Ling Pang, Hongiian Li, Zibin Wang:
A Safety-Enhanced Dijkstra Routing Algorithm via SDN Framework. DSC 2020: 388-393
2010 – 2019
- 2019
- [c36]Jinjing Zhao, Yan Wen, Xiang Li, Ling Pang, Xiaohui Kuang, Dongxia Wang:
A heuristic fuzz test generator for Java native interface. SQUADE@ESEC/SIGSOFT FSE 2019: 1-7 - 2018
- [c35]Jinjing Zhao, Ling Pang:
Automated Fuzz Generators for High-Coverage Tests Based on Program Branch Predications. DSC 2018: 514-520 - [c34]Jinjing Zhao, Ling Pang, Xiaohui Kuang, Rong Jin:
Balancing the QOS and Security in Dijkstra Algorithm by SDN Technology. NPC 2018: 126-131 - 2016
- [j4]Jinjing Zhao:
L2 Languaging in a Massively Multiplayer Online Game: An Exploration of Learner Variations. Int. J. Comput. Assist. Lang. Learn. Teach. 6(4): 1-17 (2016) - [c33]Eman M. Hammad, Jinjing Zhao, Abdallah K. Farraj, Deepa Kundur:
Mitigating link insecurities in smart grids via QoS multi-constraint routing. ICC Workshops 2016: 380-386 - 2014
- [c32]Yan Wen, Jinjing Zhao, Shuanghui Yi, Xiang Li:
FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor. CSE 2014: 620-626 - [c31]Yan Wen, Youyuan Fang, Jinjing Zhao, Xiang Li:
Shielding Your Privacy with the Local-Booted Virtual Machine. CSE 2014: 1637-1643 - [c30]Yan Wen, Jinjing Zhao, Hua Chen:
Towards Thwarting Data Leakage with Memory Page Access Interception. DASC 2014: 26-31 - 2013
- [j3]Jinjing Zhao, Yan Wen:
Evaluation on the influence of internet prefix hijacking events. Comput. Sci. Inf. Syst. 10(2): 611-631 (2013) - [j2]Huayang Cao, Jinjing Zhao, Peidong Zhu, Xicheng Lu, Chonglun Zhao:
Worm Detection without Knowledge Base in Industrial Networks. J. Commun. 8(11): 716-723 (2013) - [c29]Huayang Cao, Peidong Zhu, Jinjing Zhao:
CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms. ICCC 2013: 158 - [c28]Yan Wen, Jinjing Zhao, Hua Chen, Minhuan Huang:
Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology. DASC 2013: 31-38 - [c27]Yan Wen, Jinjing Zhao, Hua Chen, Minhuan Huang:
Towards sharing disks between host OS and virtual machine with volume snapshot technology. GrC 2013: 347-352 - [c26]Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang:
SA4WSs: A Security Architecture for Web Services. ICT-EurAsia 2013: 306-311 - [c25]Xiao Xia Sun, Hua Chen, Jinjing Zhao, Minhuan Huang:
A Test Case Generation Technique for VMM Fuzzing. ICT-EurAsia 2013: 318-323 - [c24]Xiaohui Kuang, Xiang Li, Jinjing Zhao:
Architecture of Network Environment for High-Risk Security Experimentation. ICT-EurAsia 2013: 479-484 - [c23]Jinjing Zhao, Yan Wen:
Emulation on the Internet Prefix Hijacking Attack Impaction. ICT-EurAsia 2013: 485-489 - 2012
- [c22]Jinjing Zhao, Yan Wen:
Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy. CIT 2012: 375-382 - [c21]Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang:
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution. IMIS 2012: 378-383 - [c20]Jinjing Zhao, Yan Wen, Xiang Li, Wei Peng, Feng Zhao:
The Relation on Prefix Hijacking and the Internet Hierarchy. IMIS 2012: 415-420 - 2011
- [j1]Chunlei Wang, Liang Ming, Jinjing Zhao, Dongxia Wang:
A General Framework for Network Survivability Testing and Evaluation. J. Networks 6(6): 831-841 (2011) - [c19]Jinjing Zhao, Yan Wen, Dongxia Wang:
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory. IMIS 2011: 371-375 - [c18]Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way. IMIS 2011: 403-407 - [c17]Jinjing Zhao, Yan Wen, Gang Zhao:
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation. NPC 2011: 32-43 - [c16]Yan Wen, Jinjing Zhao, Minhuan Huang, Hua Chen:
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection. TrustCom 2011: 1600-1607 - 2010
- [c15]Jinjing Zhao, Gang Zhao, Yan Wen, Xiang Li:
Towards Detecting the Interaction Vulnerabilities in Large Distributed System. CIT 2010: 2843-2848 - [c14]Yan Wen, Minhuan Huang, Jinjing Zhao, Xiaohui Kuang:
Implicit detection of stealth software with a local-booted virtual machine. ICIS 2010: 152-157
2000 – 2009
- 2009
- [c13]Gang Zhao, Weimin Zheng, Jinjing Zhao, Hua Chen:
An Heuristic Method for Web-Service Program Security Testing. ChinaGrid 2009: 139-144 - 2008
- [c12]Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao:
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor. ACISP 2008: 361-375 - [c11]Yan Wen, Jinjing Zhao, Huaimin Wang:
A Novel Intrusion-Tolerant Approach for Internet Access. ISIP 2008: 485-489 - [c10]Yan Wen, Jinjing Zhao, Huaimin Wang:
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor. SecureComm 2008: 21 - [c9]Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao:
Network security simulation and evaluation. CSTST 2008: 55-58 - 2007
- [c8]Jinjing Zhao, Peidong Zhu, Xicheng Lu:
Pricing Models of Inter-Domain Multicasting Applications. CCNC 2007: 773-777 - [c7]Peidong Zhu, Jinjing Zhao, Yan Wen, Kaiyu Cai:
On the Power-Law of the Internet and the Hierarchy of BGP Convergence. ICA3PP 2007: 470-481 - [c6]Yan Wen, Jinjing Zhao, Huaimin Wang:
A Novel Approach for Untrusted Code Execution. ICICS 2007: 398-411 - [c5]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Lei Xuan:
Does the Average Path Length Grow in the Internet?. ICOIN 2007: 183-190 - 2006
- [c4]Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao:
BGPSep_D: An Improved Algorithm for Constructing Correct and Scalable IBGP Configurations Based on Vertexes Degree. HPCC 2006: 406-415 - [c3]Feng Zhao, Xicheng Lu, Peidong Zhu, Jinjing Zhao:
BGPSep_S: An Algorithm for Constructing IBGP Configurations with Complete Visibility. ICDCN 2006: 379-384 - [c2]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:
A practical pricing model of inter-domain multicasting based on game theory. NETGAMES 2006: 40 - [c1]Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:
The Hierarchy of BGP Convergence on the Self-Organized Internet. PRDC 2006: 391-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint