default search action
Zhiyu Hao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Hao Sun, Lei Cui, Lun Li, Zhenquan Ding, Siyuan Li, Zhiyu Hao, Hongsong Zhu:
VDTriplet: Vulnerability detection with graph semantics using triplet model. Comput. Secur. 139: 103732 (2024) - [j23]Lei Cui, Junnan Yin, Jiancong Cui, Yuede Ji, Peng Liu, Zhiyu Hao, Xiaochun Yun:
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. IEEE Trans. Software Eng. 50(8): 2142-2162 (2024) - [c35]Lei Cui, Yiran Zhu, Junnan Yin, Zhiyu Hao, Wei Wang, Peng Liu, Ziqi Yang, Xiaochun Yun:
APIBeh: Learning Behavior Inclination of APIs for Malware Classification. ISSRE 2024: 1-12 - [i1]Wei Peng, Junmei Ding, Wei Wang, Lei Cui, Wei Cai, Zhiyu Hao, Xiaochun Yun:
CTISum: A New Benchmark Dataset For Cyber Threat Intelligence Summarization. CoRR abs/2408.06576 (2024) - 2023
- [j22]Zhenquan Ding, Hui Xu, Lei Cui, Haiqiang Fei, Yongji Liu, Zhiyu Hao:
HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation. Int. J. Inf. Comput. Secur. 22(3/4): 390-410 (2023) - [j21]Bo Li, Lei Cui, Zhiyu Hao, Lun Li, Yongji Liu, Yongnan Li:
eHotSnap: An Efficient and Hot Distributed Snapshots System for Virtual Machine Cluster. IEEE Trans. Parallel Distributed Syst. 34(8): 2433-2447 (2023) - [c34]Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. DSN 2023: 165-178 - [c33]Hao Sun, Yongji Liu, Zhenquan Ding, Yang Xiao, Zhiyu Hao, Hongsong Zhu:
An Enhanced Vulnerability Detection in Software Using a Heterogeneous Encoding Ensemble. ISCC 2023: 1214-1220 - [c32]Lei Cui, Jiancong Cui, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding:
API2Vec: Learning Representations of API Sequences for Malware Detection. ISSTA 2023: 261-273 - [c31]Hao Sun, Zhe Bu, Yang Xiao, Chengsheng Zhou, Zhiyu Hao, Hongsong Zhu:
Software Vulnerability Detection Using an Enhanced Generalization Strategy. SETTA 2023: 226-242 - 2022
- [j20]Yuxin Song, Li'ang Yang, Li Jiang, Zhiyu Hao, Runqing Yang, Pao Xu:
Optimizing genomic control in mixed model associations with binary diseases. Briefings Bioinform. 23(1) (2022) - [j19]Lei Cui, Jiancong Cui, Zhiyu Hao, Lun Li, Zhenquan Ding, Yongji Liu:
An empirical study of vulnerability discovery methods over the past ten years. Comput. Secur. 120: 102817 (2022) - [j18]Yiran Zhu, Lei Cui, Zhenquan Ding, Lun Li, Yongji Liu, Zhiyu Hao:
Black box attack and network intrusion detection using machine learning for malicious traffic. Comput. Secur. 123: 102922 (2022) - [j17]Xiaohui Chen, Zhiyu Hao, Lun Li, Lei Cui, Yiran Zhu, Zhenquan Ding, Yongji Liu:
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection. IEEE Trans. Inf. Forensics Secur. 17: 788-803 (2022) - [j16]Zhiyu Hao, Wei Wang, Lei Cui, Xiaochun Yun, Zhenquan Ding:
iConSnap: An Incremental Continuous Snapshots System for Virtual Machines. IEEE Trans. Serv. Comput. 15(1): 539-550 (2022) - [c30]Haiqiang Fei, Wei Wang, Yu Chen, Zhenquan Ding, Hongsong Zhu, Yongji Liu, Zhiyu Hao, Chengli Yu:
A Cache-Aware Virtual Machine Placement With Network Constraints in Large-Scale Network Emulation. HPCC/DSS/SmartCity/DependSys 2022: 285-294 - [c29]Zhenquan Ding, Yonghe Guo, Hui Xu, Longchuan Yan, Lei Cui, Yuanlong Peng, Feng Cheng, Zhiyu Hao:
SeqTrace: API Call Tracing Based on Intel PT and VMI for Malware Detection. ICA3PP 2022: 98-116 - [c28]Xiaohui Chen, Ying Tong, Chunlai Du, Yongji Liu, Zhenquan Ding, Qingyun Ran, Yi Zhang, Lei Cui, Zhiyu Hao:
MalPro: Learning on Process-Aware Behaviors for Malware Detection. ISCC 2022: 1-7 - [c27]Qin Si, Hui Xu, Ying Tong, Yu Zhou, Jian Liang, Lei Cui, Zhiyu Hao:
Malware Detection Using Automated Generation of Yara Rules on Dynamic Features. SciSec 2022: 315-330 - [c26]Zhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui, Zhiyu Hao:
Mal-Bert-GCN: Malware Detection by Combining Bert and GCN. TrustCom 2022: 175-183 - [c25]Haiqiang Fei, Yindan Zhang, Wei Wang, Yubo Li, Hui Xu, Hongsong Zhu, Zhiyu Hao, Dahui Li:
Fast Provisioning of Virtual Machine Based on Intelligent Virtual Machine Image Prefetching. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 778-787 - [c24]Wei Wang, Zhiyu Hao, Lei Cui:
ClusterRR: a record and replay framework for virtual machine cluster. VEE 2022: 31-44 - [c23]Kang Wang, Longchuan Yan, Zihao Chu, Yonghe Guo, Yongji Liu, Lei Cui, Zhiyu Hao:
CodeDiff: A Malware Vulnerability Detection Tool Based on Binary File Similarity for Edge Computing Platform. WASA (3) 2022: 507-528 - 2021
- [j15]Zhiyu Hao, Jin Gao, Yuxin Song, Runqing Yang, Di Liu:
Genome-wide hierarchical mixed model association analysis. Briefings Bioinform. 22(6) (2021) - [j14]Hao Sun, Lei Cui, Lun Li, Zhenquan Ding, Zhiyu Hao, Jiancong Cui, Peng Liu:
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches. Comput. Secur. 110: 102417 (2021) - [j13]Lei Cui, Zhiyu Hao, Yang Jiao, Haiqiang Fei, Xiaochun Yun:
VulDetector: Detecting Vulnerabilities Using Weighted Feature Graph Comparison. IEEE Trans. Inf. Forensics Secur. 16: 2004-2017 (2021) - [c22]Qin Si, Lei Cui, Lun Li, Zhenquan Ding, Yongji Liu, Zhiyu Hao:
EmuIoTNet: An Emulated IoT Network for Dynamic Analysis. ICICS (1) 2021: 224-240 - 2020
- [j12]Yaqiong Peng, Zhiyu Hao, Xiaochun Yun:
Lock-Free Parallelization for Variance-Reduced Stochastic Gradient Descent on Streaming Data. IEEE Trans. Parallel Distributed Syst. 31(9): 2220-2231 (2020) - [c21]Zhenquan Ding, Lei Cui, Haiqiang Fei, Longchuan Yan, Zhiyu Hao, Yijing Wang:
A High-Efficiency and Comprehensive Dynamic Behavior Analysis System for Malware based on Hardware Virtualization. HPCC/DSS/SmartCity 2020: 722-727 - [c20]Yaqiong Peng, Haiqiang Fei, Lun Li, Zhenquan Ding, Zhiyu Hao:
CHEAPS2AGA: Bounding Space Usage in Variance-Reduced Stochastic Gradient Descent over Streaming Data and Its Asynchronous Parallel Variants. ICA3PP (2) 2020: 398-414 - [c19]Wei Wang, Lei Cui, Zhiyu Hao, Haiqiang Fei, Chonghua Wang, Yaqiong Peng:
pRnR: A Parallel Record-Replay Framework for Virtual Machines. ICCD 2020: 610-618
2010 – 2019
- 2019
- [j11]Zhiyu Hao, Li Jiang, Jin Gao, Jinhua Ye, Jingli Zhao, Shuling Li, Runqing Yang:
Quick approximation of threshold values for genome-wide association studies. Briefings Bioinform. 20(6): 2217-2223 (2019) - [j10]Rongrong Xi, Xiaochun Yun, Zhiyu Hao:
Framework for risk assessment in cyber situational awareness. IET Inf. Secur. 13(2): 149-156 (2019) - [j9]Chonghua Wang, Libo Yin, Jun Li, Xuehong Chen, Rongchao Yin, Xiaochun Yun, Yang Jiao, Zhiyu Hao:
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. EAI Endorsed Trans. Security Safety 5(18): e5 (2019) - [j8]Yaqiong Peng, Xiaochun Yun, Zhiyu Hao:
Fast Wait-Free Construction for Pool-Like Objects with Weakened Internal Order: Stacks as an Example. IEEE Trans. Parallel Distributed Syst. 30(7): 1596-1612 (2019) - [c18]Lei Cui, Rongrong Xi, Zhiyu Hao, Xuehao Yu, Lei Zhang:
DunDi: Improving Robustness of Neural Networks Using Distance Metric Learning. ICCS (2) 2019: 145-159 - 2018
- [j7]Yaqiong Peng, Zhiyu Hao:
FA-Stack: A Fast Array-Based Stack with Wait-Free Progress Guarantee. IEEE Trans. Parallel Distributed Syst. 29(4): 843-857 (2018) - [j6]Lei Cui, Zhiyu Hao, Lun Li, Xiaochun Yun:
SnapFiner: A Page-Aware Snapshot System for Virtual Machines. IEEE Trans. Parallel Distributed Syst. 29(11): 2613-2626 (2018) - [c17]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yongji Liu, Dahui Li:
Modeling for Traffic Replay in Virtual Network. HPCC/SmartCity/DSS 2018: 495-502 - [c16]Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen:
ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation. RAID 2018: 670-690 - 2017
- [j5]Chonghua Wang, Zhiyu Hao, Lei Cui, Xiangyu Zhang, Xiaochun Yun:
Introspection-Based Memory Pruning for Live VM Migration. Int. J. Parallel Program. 45(6): 1298-1309 (2017) - [j4]Lei Cui, Zhiyu Hao, Yaqiong Peng, Xiaochun Yun:
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters. IEEE Trans. Parallel Distributed Syst. 28(8): 2328-2341 (2017) - [c15]Chonghua Wang, Zhiyu Hao, Xiaochun Yun:
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment. Inscrypt 2017: 500-517 - [c14]Jing Xu, Lei Cui, Zhiyu Hao, Chonghua Wang:
SA-PFRS: Semantics-Aware Page Frame Reclamation System in Virtualized Environments. ICPADS 2017: 684-693 - [c13]Chonghua Wang, Shiqing Ma, Xiangyu Zhang, Junghwan Rhee, Xiaochun Yun, Zhiyu Hao:
A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. SecureComm 2017: 778-792 - 2016
- [j3]Rongrong Xi, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang:
Quantitative threat situation assessment based on alert verification. Secur. Commun. Networks 9(13): 2135-2142 (2016) - [c12]Rongrong Xi, Xiaochun Yun, Zhiyu Hao:
Study on Address Blocks with Inaccurate Geolocations of China's Internet. HPCC/SmartCity/DSS 2016: 438-442 - [c11]Lun Li, Zhiyu Hao, Yongzheng Zhang, Yaqiong Peng, Xin Deng, Zhenxi Sun:
DMNS: A Framework to Dynamically Monitor Simulated Network. ICPADS 2016: 192-199 - [c10]Lei Cui, Zhiyu Hao, Chonghua Wang, Haiqiang Fei, Zhenquan Ding:
Piccolo: A Fast and Efficient Rollback System for Virtual Machine Clusters. ICPP 2016: 87-92 - [c9]Yandong Han, Zhiyu Hao, Lei Cui, Chonghua Wang, Yafei Sang:
A Hybrid Monitoring Mechanism in Virtualized Environments. Trustcom/BigDataSE/ISPA 2016: 1038-1045 - 2015
- [j2]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [c8]Chonghua Wang, Xiao-chun Yun, Zhiyu Hao, Lei Cui, Yandong Han, Qingxin Zou:
Exploring Efficient and Robust Virtual Machine Introspection Techniques. ICA3PP (3) 2015: 429-448 - [c7]Lei Cui, Zhiyu Hao, Lun Li, Haiqiang Fei, Zhenquan Ding, Bo Li, Peng Liu:
Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications. ICA3PP (3) 2015: 577-596 - [c6]Lun Li, Zhiyu Hao, Yongzheng Zhang, Zhenquan Ding, Haiqiang Fei:
Traffic Replay in Virtual Network Based on IP-Mapping. ICA3PP (4) 2015: 697-713 - 2013
- [c5]Qingxin Zou, Zhiyu Hao, Xu Cui, Xiao-chun Yun, Yongzheng Zhang:
Counting sort for the live migration of virtual machines. CLUSTER 2013: 1-5 - [c4]Zhenquan Ding, Zhiyu Hao, Yongzheng Zhang:
CADM: A Centralized Administration and Dynamic Monitoring Framework for Network Intrusion Detection Based on Virtualization. PDCAT 2013: 111-116 - 2012
- [c3]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. SEC 2012: 261-272 - 2011
- [c2]Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Xiang Cui, Yipeng Wang:
A Propagation Model for Social Engineering Botnets in Social Networks. PDCAT 2011: 423-426
2000 – 2009
- 2008
- [j1]Zhiyu Hao, Xiao-chun Yun, Hongli Zhang:
An Efficient Routing Mechanism in Network Simulation. Simul. 84(10-11): 511-520 (2008) - 2006
- [c1]Zhiyu Hao, Xiao-chun Yun, Hongli Zhang:
An Efficient Routing Mechanism in Network Simulation. PADS 2006: 150-157
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint