default search action
Jia Zhang 0004
Person information
- affiliation: Tsinghua University, Beijing National Research Center for Information Science and Technology, Department of Computer Science and Technology, China
Other persons with the same name
- Jia Zhang — disambiguation page
- Jia Zhang 0001 — Southern Methodist University, Department of Computer Science, Dallas, TX, USA (and 2 more)
- Jia Zhang 0002 — City University of Hong Kong, SAR, China
- Jia Zhang 0003 — Xidian University, Xi'an, Shaanxi, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Xinquan Huang, Wenlei Shi, Xiaotian Gao, Xinran Wei, Jia Zhang, Jiang Bian, Mao Yang, Tie-Yan Liu:
LordNet: An efficient neural network for learning to solve parametric partial differential equations without simulated data. Neural Networks 176: 106354 (2024) - [c31]Yunyang Li, Yusong Wang, Lin Huang, Han Yang, Xinran Wei, Jia Zhang, Tong Wang, Zun Wang, Bin Shao, Tie-Yan Liu:
Long-Short-Range Message-Passing: A Physics-Informed Framework to Capture Non-Local Interaction for Scalable Molecular Dynamics Simulation. ICLR 2024 - [c30]Ruixuan Li, Shaodong Xiao, Baojun Liu, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen, Jia Zhang, Ximeng Liu, Xiuqi Lu, Jun Shao:
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider. IMC 2024: 659-673 - [c29]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. NDSS 2024 - [c28]Xiang Li, Wei Xu, Baojun Liu, Mingming Zhang, Zhou Li, Jia Zhang, Deliang Chang, Xiaofeng Zheng, Chuhan Wang, Jianjun Chen, Haixin Duan, Qi Li:
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets. SP 2024: 4459-4477 - [c27]Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu:
Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure. USENIX Security Symposium 2024 - 2023
- [c26]Di He, Shanda Li, Wenlei Shi, Xiaotian Gao, Jia Zhang, Jiang Bian, Liwei Wang, Tie-Yan Liu:
Learning Physics-Informed Neural Networks without Stacked Back-propagation. AISTATS 2023: 3034-3047 - [c25]Wei Xu, Xiang Li, Chaoyi Lu, Baojun Liu, Haixin Duan, Jia Zhang, Jianjun Chen, Tao Wan:
TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers. CCS 2023: 311-325 - [c24]Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. CCS 2023: 326-340 - [c23]Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. CCS 2023: 756-770 - [c22]Xinquan Huang, Wenlei Shi, Qi Meng, Yue Wang, Xiaotian Gao, Jia Zhang, Tie-Yan Liu:
NeuralStagger: Accelerating Physics-constrained Neural PDE Solver with Spatial-temporal Decomposition. ICML 2023: 13993-14006 - [i14]Xinquan Huang, Wenlei Shi, Qi Meng, Yue Wang, Xiaotian Gao, Jia Zhang, Tie-Yan Liu:
NeuralStagger: accelerating physics-constrained neural PDE solver with spatial-temporal decomposition. CoRR abs/2302.10255 (2023) - [i13]Yuqi Qing, Qilei Yin, Xinhao Deng, Yihao Chen, Zhuotao Liu, Kun Sun, Ke Xu, Jia Zhang, Qi Li:
Low-Quality Training Data Only? A Robust Framework for Detecting Encrypted Malicious Network Traffic. CoRR abs/2309.04798 (2023) - 2022
- [c21]Kaiwen Shen, Jianyu Lu, Yaru Yang, Jianjun Chen, Mingming Zhang, Haixin Duan, Jia Zhang, Xiaofeng Zheng:
HDiff: A Semi-automatic Framework for Discovering Semantic Gap Attack in HTTP Implementations. DSN 2022: 1-13 - [c20]Chuyun Deng, Mingxuan Liu, Yue Qin, Jia Zhang, Hai-Xin Duan, Donghong Sun:
ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model. NAACL-HLT 2022: 1735-1746 - [c19]Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, Haixin Duan:
Encrypted Malware Traffic Detection via Graph-based Network Analysis. RAID 2022: 495-509 - [i12]Di He, Wenlei Shi, Shanda Li, Xiaotian Gao, Jia Zhang, Jiang Bian, Liwei Wang, Tie-Yan Liu:
Learning Physics-Informed Neural Networks without Stacked Back-propagation. CoRR abs/2202.09340 (2022) - [i11]Lin Huang, Qiyuan Dong, Lijun Wu, Jia Zhang, Jiang Bian, Tie-Yan Liu:
AF2: Adaptive Focus Framework for Aerial Imagery Segmentation. CoRR abs/2202.10322 (2022) - [i10]Lin Huang, Lijun Wu, Jia Zhang, Jiang Bian, Tie-Yan Liu:
Dynamic Relation Discovery and Utilization in Multi-Entity Time Series Forecasting. CoRR abs/2202.10586 (2022) - [i9]Wenlei Shi, Xinquan Huang, Xiaotian Gao, Xinran Wei, Jia Zhang, Jiang Bian, Mao Yang, Tie-Yan Liu:
LordNet: Learning to Solve Parametric Partial Differential Equations without Simulated Data. CoRR abs/2206.09418 (2022) - 2021
- [c18]Wenlei Shi, Xinran Wei, Jia Zhang, Xiaoyuan Ni, Arthur Jiang, Jiang Bian, Tie-Yan Liu:
Cooperative Policy Learning with Pre-trained Heterogeneous Observation Representations. AAMAS 2021: 1191-1199 - [c17]Hao Yang, Kun Du, Yubao Zhang, Shuai Hao, Haining Wang, Jia Zhang, Haixin Duan:
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO. ESORICS (1) 2021: 263-284 - [c16]Hui Gao, Yiming Zhang, Tao Wan, Jia Zhang, Haixin Duan:
On Evaluating Delegated Digital Signing of Broadcasting Messages in 5G. GLOBECOM 2021: 1-7 - 2020
- [c15]Zhenhui Xu, Guolin Ke, Jia Zhang, Jiang Bian, Tie-Yan Liu:
Light Multi-Segment Activation for Model Compression. AAAI 2020: 6542-6549 - [c14]Weizhong Li, Kaiwen Shen, Run Guo, Baojun Liu, Jia Zhang, Haixin Duan, Shuang Hao, Xiarun Chen, Yao Wang:
CDN Backfired: Amplification Attacks Based on HTTP Range Requests. DSN 2020: 14-25 - [c13]Run Guo, Weizhong Li, Baojun Liu, Shuang Hao, Jia Zhang, Haixin Duan, Kaiwen Sheng, Jianjun Chen, Ying Liu:
CDN Judo: Breaking the CDN DoS Protection with Itself. NDSS 2020 - [i8]Hao Wang, Jia Zhang, Yingce Xia, Jiang Bian, Chao Zhang, Tie-Yan Liu:
COSEA: Convolutional Code Search with Layer-wise Attention. CoRR abs/2010.09520 (2020) - [i7]Wenlei Shi, Xinran Wei, Jia Zhang, Xiaoyuan Ni, Arthur Jiang, Jiang Bian, Tie-Yan Liu:
Cooperative Policy Learning with Pre-trained Heterogeneous Observation Representations. CoRR abs/2012.13099 (2020)
2010 – 2019
- 2019
- [j5]Jia Zhang, Hai-Xin Duan, Jian Jiang, Jinjin Liang, Jianping Wu:
Finding the best answer: measuring the optimization of public and authoritative DNS. Sci. China Inf. Sci. 62(3): 39107:1-39107:3 (2019) - [c12]Xihan Li, Jia Zhang, Jiang Bian, Yunhai Tong, Tie-Yan Liu:
A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network. AAMAS 2019: 980-988 - [c11]Guolin Ke, Zhenhui Xu, Jia Zhang, Jiang Bian, Tie-Yan Liu:
DeepGBM: A Deep Learning Framework Distilled by GBDT for Online Prediction Tasks. KDD 2019: 384-394 - [i6]Xihan Li, Jia Zhang, Jiang Bian, Yunhai Tong, Tie-Yan Liu:
A Cooperative Multi-Agent Reinforcement Learning Framework for Resource Balancing in Complex Logistics Network. CoRR abs/1903.00714 (2019) - [i5]Zhenhui Xu, Guolin Ke, Jia Zhang, Jiang Bian, Tie-Yan Liu:
Light Multi-segment Activation for Model Compression. CoRR abs/1907.06870 (2019) - 2018
- [c10]Jian Jiang, Jia Zhang, Hai-Xin Duan, Kang Li, Wu Liu:
Analysis and Measurement of Zone Dependency in the Domain Name System. ICC 2018: 1-7 - [c9]Run Guo, Jianjun Chen, Baojun Liu, Jia Zhang, Chao Zhang, Hai-Xin Duan, Tao Wan, Jian Jiang, Shuang Hao, Yaoqi Jia:
Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation. SRDS 2018: 1-10 - [c8]Mingming Zhang, Baojun Liu, Chaoyi Lu, Jia Zhang, Shuang Hao, Hai-Xin Duan:
Measuring Privacy Threats in China-Wide Mobile Networks. FOCI @ USENIX Security Symposium 2018 - 2017
- [j4]Xiaoming Sun, Jia Zhang, Jialin Zhang:
Near optimal algorithms for online weighted bipartite matching in adversary model. J. Comb. Optim. 34(3): 689-705 (2017) - [c7]Jia Zhang, Zheng Wang, Qian Li, Jialin Zhang, Yanyan Lan, Qiang Li, Xiaoming Sun:
Efficient Delivery Policy to Minimize User Traffic Consumption in Guaranteed Advertising. AAAI 2017: 252-258 - [c6]Jia Zhang, Weidong Ma, Tao Qin, Xiaoming Sun, Tie-Yan Liu:
Randomized Mechanisms for Selling Reserved Instances in Cloud Computing. AAAI 2017: 750-757 - [c5]Jia Zhang, Hai-Xin Duan, Wu Liu, Xingkun Yao:
How to Notify a Vulnerability to the Right Person? Case Study: In an ISP Scope. GLOBECOM 2017: 1-7 - 2016
- [j3]Qizhi Fang, Bo Li, Xiaoming Sun, Jia Zhang, Jialin Zhang:
Computing the least-core and nucleolus for threshold cardinality matching games. Theor. Comput. Sci. 609: 500-510 (2016) - [i4]Jia Zhang, Weidong Ma, Tao Qin, Xiaoming Sun, Tie-Yan Liu:
Randomized Mechanisms for Selling Reserved Instances in Cloud. CoRR abs/1611.07379 (2016) - [i3]Jia Zhang, Zheng Wang, Qian Li, Jialin Zhang, Yanyan Lan, Qiang Li, Xiaoming Sun:
Efficient Delivery Policy to Minimize User Traffic Consumption in Guaranteed Advertising. CoRR abs/1611.07599 (2016) - 2014
- [c4]Xiaoming Sun, Jia Zhang, Jialin Zhang:
Solving Multi-choice Secretary Problem in Parallel: An Optimal Observation-Selection Protocol. ISAAC 2014: 661-673 - [c3]Qizhi Fang, Bo Li, Xiaoming Sun, Jia Zhang, Jialin Zhang:
Computing the Least-Core and Nucleolus for Threshold Cardinality Matching Games. WINE 2014: 474-479 - [i2]Xiaoming Sun, Jia Zhang, Jialin Zhang:
Deterministic Protocol for Shared $Q$-queue $J$-choice $K$-best Secretary Problem. CoRR abs/1405.5975 (2014) - [i1]Qizhi Fang, Bo Li, Xiaoming Sun, Jia Zhang, Jialin Zhang:
Computing the Least-core and Nucleolus for Threshold Cardinality Matching Games. CoRR abs/1409.5987 (2014) - 2011
- [j2]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Anonymity analysis of P2P anonymous communication systems. Comput. Commun. 34(3): 358-366 (2011) - 2010
- [c2]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
Analysis of Anonymity in P2P Anonymous Communication Systems. AINA Workshops 2010: 860-865
2000 – 2009
- 2009
- [j1]Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu:
WindTalker: A P2P-Based Low-Latency Anonymous Communication Network. IEICE Trans. Commun. 92-B(10): 3183-3194 (2009) - 2008
- [c1]Jia Zhang, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu:
AMCAS: An Automatic Malicious Code Analysis System. WAIM 2008: 501-507
Coauthor Index
aka: Haixin Duan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint