Using deep-learning-based memory analysis for malware detection in cloud H Li, D Zhan, T Liu, L Ye 2019 IEEE 16th international conference on mobile ad hoc and sensor systems …, 2019 | 15 | 2019 |
Deciding your own anonymity: user-oriented node selection in I2P L Ye, X Yu, J Zhao, D Zhan, X Du, M Guizani IEEE Access 6, 71350-71359, 2018 | 13 | 2018 |
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT D Zhan, L Ye, H Zhang, B Fang, H Li, Y Liu, X Du, M Guizani Future Generation Computer Systems 88, 209-219, 2018 | 11 | 2018 |
Cfwatcher: A novel target-based real-time approach to monitor critical files using vmi D Zhan, L Ye, B Fang, X Du, S Su 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 10 | 2016 |
Content Feature Extraction-based Hybrid Recommendation for Mobile Application Services. C Ma, Z Yang, H Huang, D Zhan, J Qu Computers, Materials & Continua 71 (3), 2022 | 8 | 2022 |
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach D Zhan, L Ye, B Fang, H Zhang, X Du Soft Computing 22, 7977-7987, 2018 | 8 | 2018 |
Unsupervised binary protocol clustering based on maximum sequential patterns J Shi, L Ye, Z Li, D Zhan Computer Modeling in Engineering & Sciences 130 (1), 483-498, 2022 | 6 | 2022 |
Shrinking the kernel attack surface through static and dynamic syscall limitation D Zhan, Z Yu, X Yu, H Zhang, L Ye IEEE Transactions on Services Computing 16 (2), 1431-1443, 2022 | 5 | 2022 |
Road Distance Computation Using Homomorphic Encryption in Road Networks. H Yu, L Yin, H Zhang, D Zhan, J Qu, G Zhang Computers, Materials & Continua 69 (3), 2021 | 4 | 2021 |
A low-overhead kernel object monitoring approach for virtual machine introspection D Zhan, H Li, L Ye, H Zhang, B Fang, X Du ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 4 | 2019 |
Protecting critical files using target-based virtual machine introspection approach D Zhan, L Ye, B Fang, X Du, Z Xu IEICE TRANSACTIONS on Information and Systems 100 (10), 2307-2318, 2017 | 4 | 2017 |
A container-oriented virtual-machine-introspection-based security monitor to secure containers in cloud computing Z Yu, L Ye, H Zhang, D Zhan, S Su, Z Tian Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021 | 3 | 2021 |
Container introspection: using external management containers to monitor containers in cloud computing D Zhan, K Tan, L Ye, H Yu, H Liu Computers, Materials & Continua 69 (3), 3783-3794, 2021 | 2 | 2021 |
SAVM: A practical secure external approach for automated in‐VM management D Zhan, L Ye, B Fang, H Zhang Concurrency and Computation: Practice and Experience 31 (23), e4482, 2019 | 2 | 2019 |
Checking function-level kernel control flow integrity for cloud computing L Ye, X Yu, L Yu, B Guo, D Zhan, X Du, M Guizani IEEE Access 6, 41856-41865, 2018 | 2 | 2018 |
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems D Zhan, Z Yu, X Yu, H Zhang, L Ye, L Liu IEEE Internet of Things Journal 10 (6), 5378-5392, 2022 | 1 | 2022 |
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis D Zhan, X Yu, H Zhang, L Ye IEEE Transactions on Software Engineering 49 (2), 684-698, 2022 | 1 | 2022 |
EDSM-Based Binary Protocol State Machine Reversing S Wang, F Sun, H Zhang, D Zhan, S Li, J Wang CMC-COMPUTERS MATERIALS & CONTINUA 69 (3), 3711-3725, 2021 | 1 | 2021 |
A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers K Tan, D Zhan, L Ye, H Zhang, B Fang IEEE Transactions on Computers, 2023 | | 2023 |
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning D Zhan, K Tan, L Ye, X Yu, H Zhang, Z He IEEE Transactions on Computers, 2023 | | 2023 |