A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 172 | 2012 |
Inferring protocol state machine from network traces: a probabilistic approach Y Wang, Z Zhang, D Yao, B Qu, L Guo Applied Cryptography and Network Security: 9th International Conference …, 2011 | 130 | 2011 |
Causality reasoning about network events for detecting stealthy malware activities H Zhang, DD Yao, N Ramakrishnan, Z Zhang computers & security 58, 180-198, 2016 | 75 | 2016 |
Biprominer: Automatic mining of binary protocol features Y Wang, X Li, J Meng, Y Zhao, Z Zhang, L Guo 2011 12th International Conference on Parallel and Distributed Computing …, 2011 | 52 | 2011 |
Proword: An unsupervised approach to protocol feature word extraction Z Zhang, Z Zhang, PPC Lee, Y Liu, G Xie IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1393-1401, 2014 | 46 | 2014 |
Using entropy to classify traffic more deeply Y Wang, Z Zhang, L Guo, S Li 2011 IEEE Sixth International Conference on Networking, Architecture, and …, 2011 | 33 | 2011 |
Toward unsupervised protocol feature word extraction Z Zhang, Z Zhang, PPC Lee, Y Liu, G Xie IEEE Journal on Selected Areas in Communications 32 (10), 1894-1906, 2014 | 32 | 2014 |
An analysis of UDP traffic classification J Cai, Z Zhang, X Song 2010 IEEE 12th International Conference on Communication Technology, 116-119, 2010 | 30 | 2010 |
Kaleido: An efficient out-of-core graph mining system on A single machine C Zhao, Z Zhang, P Xu, T Zheng, J Guo 2020 IEEE 36th International Conference on Data Engineering (ICDE), 673-684, 2020 | 27 | 2020 |
On accuracy of early traffic classification B Qu, Z Zhang, L Guo, D Meng 2012 IEEE Seventh International Conference on Networking, Architecture, and …, 2012 | 24 | 2012 |
An empirical study of morphing on behavior‐based network traffic classification B Qu, Z Zhang, X Zhu, D Meng Security and Communication Networks 8 (1), 68-79, 2015 | 18 | 2015 |
Feature rescaling and fusion for tiny object detection J Liu, Y Gu, S Han, Z Zhang, J Guo, X Cheng IEEE Access 9, 62946-62955, 2021 | 16 | 2021 |
Comparative analysis on TCP and UDP network traffic YB Zhang, ZB Zhang, Y Zhao, L Guo Jisuanji Yingyong Yanjiu 27 (6), 2192-2197, 2006 | 15 | 2006 |
Online traffic classification based on co-training method J Yan, X Yun, Z Wu, H Luo, S Zhang, S Jin, Z Zhang 2012 13th International Conference on Parallel and Distributed Computing …, 2012 | 11 | 2012 |
Accelerating LSH-based distributed search with in-network computation P Zhang, H Pan, Z Li, P He, Z Zhang, G Tyson, G Xie IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 7 | 2021 |
Saha: a string adaptive hash table for analytical databases T Zheng, Z Zhang, X Cheng Applied Sciences 10 (6), 1915, 2020 | 7 | 2020 |
Revisiting the swarm evolution: A long term perspective Y Zhao, Z Zhang, L Guo, B Fang 2011 IEEE Symposium on Computers and Communications (ISCC), 1062-1067, 2011 | 7 | 2011 |
An adaptive timeout strategy for profiling udp flows J Cai, Z Zhang, P Zhang, X Song 2010 First International Conference on Networking and Computing, 44-48, 2010 | 7 | 2010 |
Inferring protocol state machine from real-world trace Y Wang, Z Zhang, L Guo Recent Advances in Intrusion Detection: 13th International Symposium, RAID …, 2010 | 7 | 2010 |
TPCAD: A text-oriented multi-protocol inference approach Y Zhao, QL Yao, ZB Zhang, L Guo, BX Fang Journal of China Institute of Communications 30 (10), 2009 | 6 | 2009 |