Jun Zhang
Jun Zhang
Verified email at swin.edu.au - Homepage
Title
Cited by
Cited by
Year
Network Traffic Classification Using Correlation Information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (1), 104-117, 2013
2992013
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2015
2282015
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
J Zhang, C Chen, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
1512013
Detecting and preventing cyber insider threats: A survey
L Liu, O De Vel, QL Han, J Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 20 (2), 1397-1417, 2018
1352018
Modeling Propagation Dynamics of Social Network Worms
S Wen, W Zhou, J Zhang, Y Xiang, W Jia
IEEE, 2012
1042012
An effective network traffic classification method with unknown flow detection
J Zhang, C Chen, Y Xiang, W Zhou, AV Vasilakos
IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013
1012013
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection
T Chen, X Li, H Yin, J Zhang
Pacific-Asia conference on knowledge discovery and data mining, 40-52, 2018
982018
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
982015
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
872013
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
842016
Secure buyer–seller watermarking protocol
J Zhang, W Kou, K Fan
IEE Proceedings-Information Security 153 (1), 15-18, 2006
822006
A performance evaluation of machine learning-based streaming spam tweets detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational social systems 2 (3), 65-76, 2015
772015
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019
692019
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
692017
Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol
B Zhao, W Kou, H Li, L Dang, J Zhang
Information Sciences 180 (23), 4672-4684, 2010
682010
Modeling and analysis on the propagation dynamics of modern email malware
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou
IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013
592013
Unsupervised traffic classification using flow statistical properties and IP packet payload
J Zhang, Y Xiang, W Zhou, Y Wang
Journal of Computer and System Sciences 79 (5), 573-585, 2013
572013
A novel semi-supervised approach for network traffic clustering
Y Wang, Y Xiang, J Zhang, S Yu
2011 5th International Conference on Network and System Security, 169-175, 2011
512011
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2020
492020
Addressing the class imbalance problem in twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
482017
The system can't perform the operation now. Try again later.
Articles 1–20