关注
Dongyang Zhan
Dongyang Zhan
在 hit.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Using deep-learning-based memory analysis for malware detection in cloud
H Li, D Zhan, T Liu, L Ye
2019 IEEE 16th international conference on mobile ad hoc and sensor systems …, 2019
152019
Deciding your own anonymity: user-oriented node selection in I2P
L Ye, X Yu, J Zhao, D Zhan, X Du, M Guizani
IEEE Access 6, 71350-71359, 2018
132018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT
D Zhan, L Ye, H Zhang, B Fang, H Li, Y Liu, X Du, M Guizani
Future Generation Computer Systems 88, 209-219, 2018
112018
Cfwatcher: A novel target-based real-time approach to monitor critical files using vmi
D Zhan, L Ye, B Fang, X Du, S Su
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
102016
Content Feature Extraction-based Hybrid Recommendation for Mobile Application Services.
C Ma, Z Yang, H Huang, D Zhan, J Qu
Computers, Materials & Continua 71 (3), 2022
82022
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach
D Zhan, L Ye, B Fang, H Zhang, X Du
Soft Computing 22, 7977-7987, 2018
82018
Unsupervised binary protocol clustering based on maximum sequential patterns
J Shi, L Ye, Z Li, D Zhan
Computer Modeling in Engineering & Sciences 130 (1), 483-498, 2022
62022
Shrinking the kernel attack surface through static and dynamic syscall limitation
D Zhan, Z Yu, X Yu, H Zhang, L Ye
IEEE Transactions on Services Computing 16 (2), 1431-1443, 2022
52022
Road Distance Computation Using Homomorphic Encryption in Road Networks.
H Yu, L Yin, H Zhang, D Zhan, J Qu, G Zhang
Computers, Materials & Continua 69 (3), 2021
42021
A low-overhead kernel object monitoring approach for virtual machine introspection
D Zhan, H Li, L Ye, H Zhang, B Fang, X Du
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
42019
Protecting critical files using target-based virtual machine introspection approach
D Zhan, L Ye, B Fang, X Du, Z Xu
IEICE TRANSACTIONS on Information and Systems 100 (10), 2307-2318, 2017
42017
A container-oriented virtual-machine-introspection-based security monitor to secure containers in cloud computing
Z Yu, L Ye, H Zhang, D Zhan, S Su, Z Tian
Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021
32021
Container introspection: using external management containers to monitor containers in cloud computing
D Zhan, K Tan, L Ye, H Yu, H Liu
Computers, Materials & Continua 69 (3), 3783-3794, 2021
22021
SAVM: A practical secure external approach for automated in‐VM management
D Zhan, L Ye, B Fang, H Zhang
Concurrency and Computation: Practice and Experience 31 (23), e4482, 2019
22019
Checking function-level kernel control flow integrity for cloud computing
L Ye, X Yu, L Yu, B Guo, D Zhan, X Du, M Guizani
IEEE Access 6, 41856-41865, 2018
22018
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems
D Zhan, Z Yu, X Yu, H Zhang, L Ye, L Liu
IEEE Internet of Things Journal 10 (6), 5378-5392, 2022
12022
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis
D Zhan, X Yu, H Zhang, L Ye
IEEE Transactions on Software Engineering 49 (2), 684-698, 2022
12022
EDSM-Based Binary Protocol State Machine Reversing
S Wang, F Sun, H Zhang, D Zhan, S Li, J Wang
CMC-COMPUTERS MATERIALS & CONTINUA 69 (3), 3711-3725, 2021
12021
A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers
K Tan, D Zhan, L Ye, H Zhang, B Fang
IEEE Transactions on Computers, 2023
2023
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning
D Zhan, K Tan, L Ye, X Yu, H Zhang, Z He
IEEE Transactions on Computers, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20