


default search action
Chao Zheng 0001
Person information
- affiliation: Geedge Networks, Beijing, China
- affiliation (PhD): Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Chao Zheng — disambiguation page
- Chao Zheng 0002 (aka: Charles Zheng 0002) — University of Notre Dame, IN, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j2]Yuntao Zhang
, Binxing Fang, Zehui Xiong
, Yanhao Wang
, Yuwei Liu
, Chao Zheng, Qinnan Zhang
:
A Semantics-Based Approach on Binary Function Similarity Detection. IEEE Internet Things J. 11(15): 25910-25924 (2024) - [j1]Tiantian Ji
, Binxing Fang, Xiang Cui, Tian Wang, Yuntao Zhang
, Fan Gu, Chao Zheng:
Scrutinizing Code Signing: A Study of in-Depth Threat Modeling and Defense Mechanism. IEEE Internet Things J. 11(24): 40051-40069 (2024)
Conference and Workshop Papers
- 2023
- [c20]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN. CSCWD 2023: 1741-1747 - 2022
- [c19]Chenming Chang
, Wei Yang, Chao Zheng, Ping Jiang, Liang Zhan, Qingyun Liu:
Accelerate State Sharing of Network Function with RDMA. GLOBECOM 2022: 1-6 - [c18]Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. TrustCom 2022: 291-298 - 2021
- [c17]Ping Jiang, Shuo Zhang, Qingyun Liu, Chao Zheng:
A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances. ICCCN 2021: 1-9 - [c16]Xiaoqing Ma, Chao Zheng, Zhao Li, Qingyun Liu, Xunxun Chen:
CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification. ISCC 2021: 1-7 - 2020
- [c15]Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu:
ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification. ICCS (2) 2020: 279-293 - [c14]Youting Liu, Shu Li, Chengwei Zhang, Chao Zheng, Yong Sun, Qingyun Liu:
DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic. ICT 2020: 1-5 - [c13]Xiaoou Zhang, Zhao Li, Yujia Zhu, Qingyun Liu, Chao Zheng:
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively. ICT 2020: 1-6 - [c12]Fengzhao Shi, Chao Zheng, Yiming Cui, Qingyun Liu:
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification. SecureComm (1) 2020: 172-189 - 2019
- [c11]Youbing Zhong, Zhou Zhou, Da Li, Wenliang He, Chao Zheng, Qingyun Liu, Li Guo:
NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure. CollaborateCom 2019: 583-599 - [c10]Zhongyi Zhang, Chao Zheng, Wei Yang, Yang Liu, Rong Yang, Qingyun Liu:
Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis. HPCC/SmartCity/DSS 2019: 2351-2359 - [c9]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Qingyun Liu, Yong Sun:
MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic. ICCS (2) 2019: 318-331 - 2018
- [c8]Chao Zheng, Qi Tang, Qiuwen Lu, Jie Li, Zhou Zhou, Qinyun Liu:
Janus: A User-Level TCP Stack for Processing 40 Million Concurrent TCP Connections. ICC 2018: 1-7 - [c7]Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. IFIP Int. Conf. Digital Forensics 2018: 199-224 - [c6]Chao Zheng, Qiuwen Lu, Jia Li, Qinyun Liu, Binxing Fang:
A flexible and efficient container-based NFV platform for middlebox networking. SAC 2018: 989-995 - [c5]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. TrustCom/BigDataSE 2018: 783-789 - 2016
- [c4]Zhipeng Chen, Peng Zhang, Chao Zheng, Qingyun Liu:
CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces. ICC 2016: 1-6 - 2015
- [c3]Hongzhou Sha, Zhou Zhou, Qingyun Liu, Tingwen Liu, Chao Zheng:
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection. ICC 2015: 7077-7082 - 2014
- [c2]Hongzhou Sha, Qingyun Liu, Zhou Zhou, Chao Zheng:
GuidedTracker: Track the victims with access logs to finding malicious web pages. GLOBECOM 2014: 564-569 - 2013
- [c1]Chen Chen, Qingyun Liu, Hongzhou Sha, Zhou Zhou, Chao Zheng:
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching. ISCTCS 2013: 107-114
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 00:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint