default search action
Erzhou Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Erzhou Zhu, Kang Cheng, Zhizheng Zhang, Huabin Wang:
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. Comput. Secur. 136: 103561 (2024) - 2023
- [j22]Erzhou Zhu, Qixiang Yuan, Zhile Chen, Xuejian Li, Xianyong Fang:
CCBLA: a Lightweight Phishing Detection Model Based on CNN, BiLSTM, and Attention Mechanism. Cogn. Comput. 15(4): 1320-1333 (2023) - [c18]Jiaqi Chang, Zhujuan Ma, Binghao Cao, Erzhou Zhu:
VDDA: An Effective Software Vulnerability Detection Model Based on Deep Learning and Attention Mechanism. CSCWD 2023: 474-479 - [c17]Yating Zuo, Zhujuan Ma, Erzhou Zhu:
MPC: A Novel Internal Clustering Validity Index Based on Midpoint-Involved Distance. ICA3PP (3) 2023: 310-323 - 2022
- [j21]Erzhou Zhu, Zhile Chen, Jie Cui, Hong Zhong:
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest. IEEE Trans. Netw. Serv. Manag. 19(4): 4461-4478 (2022) - [c16]Erzhou Zhu, Zihan Wang, Feng Liu, Zhujuan Ma:
DH-Kmeans: An Improved K-means Clustering Algorithm based on Dynamic Initial Cluster Center Determination and Hierarchical Clustering. CSCWD 2022: 170-176 - 2020
- [j20]Erzhou Zhu, Yinyin Ju, Zhile Chen, Feng Liu, Xianyong Fang:
DTOF-ANN: An Artificial Neural Network phishing detection model based on Decision Tree and Optimal Features. Appl. Soft Comput. 95: 106505 (2020)
2010 – 2019
- 2019
- [j19]Erzhou Zhu, Yuyang Chen, Chengcheng Ye, Xuejun Li, Feng Liu:
OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network. IEEE Access 7: 73271-73284 (2019) - [j18]Erzhou Zhu, Peng Wen, Kanqi Ni, Ruhui Ma:
Implementation of an effective dynamic concolic execution framework for analyzing binary programs. Comput. Secur. 86: 1-27 (2019) - [j17]Erzhou Zhu, Yuanxiang Zhang, Peng Wen, Feng Liu:
Fast and stable clustering analysis based on Grid-mapping K-means algorithm and new clustering validity index. Neurocomputing 363: 149-170 (2019) - [j16]Xuejun Li, Lei Zhang, Yang Wu, Xiao Liu, Erzhou Zhu, Huikang Yi, Futian Wang, Cheng Zhang, Yun Yang:
A Novel Workflow-Level Data Placement Strategy for Data-Sharing Scientific Cloud Workflows. IEEE Trans. Serv. Comput. 12(3): 370-383 (2019) - [c15]Erzhou Zhu, Meng Li, Jia Xu, Xuejun Li, Feng Liu, Futian Wang:
TIMOM: A Novel Time Influence Multi-objective Optimization Cloud Data Storage Model for Business Process Management. ICA3PP (1) 2019: 315-329 - [c14]Dawei Liu, Dong Liu, Yang Li, Mengqi Zhu, Erzhou Zhu, Xuejian Li:
Efficient Android Phishing Detection Based on Improved Naïve Bayes Algorithm. ICSI (2) 2019: 183-190 - 2018
- [j15]Erzhou Zhu, Ruhui Ma:
An effective partitional clustering algorithm based on new clustering validity index. Appl. Soft Comput. 71: 608-621 (2018) - [c13]Erzhou Zhu, Zeren Zhou, Zhujuan Ma, Xuejun Li, Feng Liu:
Secure and Efficient Collaborative Auction Scheme for Spectrum Resource Reallocation. CSCWD 2018: 396-400 - [c12]Erzhou Zhu, Peng Li, Zhujuan Ma, Xuejun Li, Feng Liu:
Effective and Optimal Clustering Based on New Clustering Validity Index. CSCWD 2018: 529-534 - [c11]Erzhou Zhu, Peng Wen, Binbin Zhu, Feng Liu, Futian Wang, Xuejun Li:
Effective Clustering Analysis Based on New Designed Clustering Validity Index and Revised K-Means Algorithm for Big Data. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 96-102 - [c10]Erzhou Zhu, Dong Liu, Chengcheng Ye, Feng Liu, Xuejun Li, Hui Sun:
Effective Phishing Website Detection Based on Improved BP Neural Network and Dual Feature Evaluation. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 759-765 - [c9]Erzhou Zhu, Binbin Zhu, Peng Wen, Feng Liu, Xuejun Li, Futian Wang:
Effective Clustering Analysis Based on New Designed CVI and Improved Clustering Algorithms. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 766-772 - [c8]Erzhou Zhu, Chengcheng Ye, Dong Liu, Feng Liu, Futian Wang, Xuejun Li:
An Effective Neural Network Phishing Detection Model Based on Optimal Feature Selection. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 781-787 - 2017
- [c7]Feng Liu, Jun Zhang, Erzhou Zhu:
Test-Suite Reduction Based on K-Medoids Clustering Algorithm. CyberC 2017: 186-192 - [c6]Erzhou Zhu, Chenglong Yao, Zhujuan Ma, Feng Liu:
Study of an Improved Genetic Algorithm for Multiple Paths Automatic Software Test Case Generation. ICSI (1) 2017: 402-408 - 2016
- [j14]Yiwen Zhang, Guangming Cui, Erzhou Zhu, Qiang He:
AFOA: An Adaptive Fruit Fly Optimization Algorithm with Global Optimizing Ability. Int. J. Artif. Intell. Tools 25(6): 1650032:1-1650032:30 (2016) - [j13]Wentao Xu, Feng Liu, Erzhou Zhu:
基于MapReduce的新型微博用户影响力排名算法研究 (Research on Novel Ranking Algorithm of Microblog User's Influence Based on MapReduce). 计算机科学 43(9): 66-70 (2016) - [j12]Xuejun Li, Ruimiao Ding, Xiao Liu, Xiangjun Liu, Erzhou Zhu, Yunxiang Zhong:
A Dynamic Pricing Reverse Auction-Based Resource Allocation Mechanism in Cloud Workflow Systems. Sci. Program. 2016: 7609460:1-7609460:13 (2016) - [c5]Feng Liu, Pengpeng Luo, Zhujuan Ma, Cheng Zhang, Yiwen Zhang, Erzhou Zhu:
Security Secret Information Hiding Based on Hash Function and Invisible ASCII Characters Replacement. Trustcom/BigDataSE/ISPA 2016: 1963-1969 - 2015
- [j11]Erzhou Zhu, Feng Liu, Zuo Wang, Alei Liang, Yiwen Zhang, Xuejian Li, Xuejun Li:
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs. Comput. Secur. 52: 51-69 (2015) - [c4]Xuejun Li, Xiangjun Liu, Erzhou Zhu:
An Efficient Resource Allocation Mechanism Based on Dynamic Pricing Reverse Auction for Cloud Workflow Systems. AP-BPM 2015: 59-69 - [c3]Yuchan Li, Xing Hong, Guangming Cui, Erzhou Zhu:
Study of a Secret Information Transmission Scheme Based on Invisible ASCII Characters. ICSI (2) 2015: 144-150 - 2014
- [j10]Erzhou Zhu, Ruhui Ma, Yang Hou, Yindong Yang, Feng Liu, Haibing Guan:
Two-phase execution of binary applications on CPU/GPU machines. Comput. Electr. Eng. 40(5): 1567-1579 (2014) - [j9]Erzhou Zhu, Xuejun Li, Feng Liu, Xuejian Li, Zhujuan Ma:
Constructing a Hybrid Taint Analysis Framework for Diagnosing Attacks on Binary Programs. J. Comput. 9(3): 566-575 (2014) - [j8]Erzhou Zhu, Feng Liu, Xianyong Fang, Xuejun Li, Yindong Yang, Alei Liang:
DYBS: A Lightweight Dynamic Slicing Framework for Diagnosing Attacks on x86 Binary Programs. J. Softw. 9(3): 560-568 (2014) - 2013
- [j7]Ying Xie, Rongbin Xu, Xing Guo, Erzhou Zhu, Jianguo Wu:
Natural Bare-Hand Interaction for Remote Operating Large Touch Screen. J. Comput. 8(10): 2512-2519 (2013) - [j6]Ruhui Ma, Fanfu Zhou, Erzhou Zhu, Haibing Guan:
Performance Tuning Towards a KVM-based Embedded Real-Time Virtualization System. J. Inf. Sci. Eng. 29(5): 1021-1035 (2013) - [c2]Erzhou Zhu, Haibing Guan, Alei Liang, Rongbin Xu, Xuejian Li, Feng Liu:
HYBit: A Hybrid Taint Analyzing Framework for Binary Programs. ICSI (2) 2013: 232-239 - 2012
- [j5]Haibing Guan, Erzhou Zhu, Hongxi Wang, Ruhui Ma, Yindong Yang, Bin Wang:
SINOF: A dynamic-static combined framework for dynamic binary translation. J. Syst. Archit. 58(8): 305-317 (2012) - 2011
- [j4]Ruhui Ma, Haibing Guan, Erzhou Zhu, Yongqiang Gao, Alei Liang:
Code cache management based on working set in dynamic binary translator. Comput. Sci. Inf. Syst. 8(3): 653-671 (2011) - [j3]Ruhui Ma, Haibing Guan, Erzhou Zhu, Hongbo Yang, Yindong Yang, A.-Lei Liang:
Partitioning the Conventional DBT System for Multiprocessors. J. Comput. Sci. Technol. 26(3): 474-490 (2011) - [j2]Erzhou Zhu, Haibing Guan, Guoxing Dong, Yindong Yang, Hongbo Yang:
A Translation Framework for Executing the Sequential Binary Code on CPU/GPU Based Architectures. J. Softw. 6(12): 2331-2340 (2011) - [j1]Haibing Guan, Erzhou Zhu, Kai Chen, Ruhui Ma, Yunchao He, Haipeng Deng, Hongbo Yang:
A Dynamic-Static Combined Code Layout Reorganization Approach for Dynamic Binary Translation. J. Softw. 6(12): 2341-2349 (2011) - 2010
- [c1]Guoxing Dong, Kai Chen, Erzhou Zhu, Yichao Zhang, Zhengwei Qi, Haibing Guan:
A Translation Framework for Virtual Execution Environment on CPU/GPU Architecture. PAAP 2010: 130-137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint