default search action
Yujia Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Liang Jiao, Yujia Zhu, Wenxiu Zhang, Lei Zhao, Yi Zhou, Qingyun Liu:
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information. CSCWD 2024: 1079-1085 - [c38]Baiyang Li, Yujia Zhu, Yong Ding, Yong Sun, Yuedong Zhang, Qingyun Liu, Li Guo:
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures. ESORICS (2) 2024: 45-64 - [c37]Xiaoou Zhang, Yang Gao, Yang Liu, Yujia Zhu, Peng Zhang, Chuan Zhou, Qingyun Liu, Hongyang Chen:
Meta Structure Search for Link Weight Prediction in Heterogeneous Graphs. ICASSP 2024: 5195-5199 - [c36]Liang Jiao, Jianqiang Li, Wenxiu Zhang, Tianyu Cui, Yi Zhou, Yujia Zhu, Qingyun Liu:
Measuring Encrypted DNS Service with TLS1.3 Support over IPv6. ISCC 2024: 1-7 - 2023
- [j9]Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia, Guoquan Han:
A framework for deep neural network multiuser authorization based on channel pruning. Concurr. Comput. Pract. Exp. 35(21) (2023) - [c35]Dingkang Han, Yujia Zhu, Liang Jiao, Dikai Mo, Yong Sun, Yuedong Zhang, Qingyun Liu:
DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution. CollaborateCom (3) 2023: 347-364 - [c34]Xinyan Li, Yujia Zhu, Xiaoou Zhang, Zhen Jie, Qingyun Liu:
SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph. CSCWD 2023: 1098-1105 - [c33]Dikai Mo, Yujia Zhu, Zhen Jie, Yong Sun, Qingyun Liu, Binxing Fang:
Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking. GLOBECOM 2023: 6024-6029 - [c32]Yujia Zhu, Geyong Min, Yulei Wu, Haozhe Wang:
Automatic Anomaly Detection Using Unlabelled Log Data. HPCC/DSS/SmartCity/DependSys 2023: 507-514 - [c31]Yujia Zhu, Geyong Min, Yulei Wu, Haozhe Wang:
A Time Series Clustering Method for Network Big Data. ICPADS 2023: 1516-1521 - [c30]Yuqi Qiu, Baiyang Li, Zhiqian Li, Liang Jiao, Yujia Zhu, Qingyun Liu:
Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk. ISCC 2023: 1149-1155 - [c29]Yifei Cheng, Yujia Zhu, Rui Qin, Jiang Xie, Yitong Cai:
DRDoSHunter: A Novel Approach Based on FDA and Inter-flow Features for DRDoS Detection. ISCC 2023: 1248-1254 - [c28]Liang Jiao, Yujia Zhu, Xingyu Fu, Yi Zhou, Fenglin Qin, Qingyun Liu:
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6. ISCC 2023: 1327-1330 - [c27]Hongwu Li, Xingyu Fu, Yujia Zhu, Rong Yang, Chao Li:
MetaIoT: Few Shot Malicious Traffic Detection in Internet of Things Networks Based on HIN. IFIP Networking 2023: 1-9 - [c26]Baiyang Li, Yujia Zhu, Qingyun Liu, Yong Sun, Yuedong Zhang, Li Guo:
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications. IFIP Networking 2023: 1-9 - [c25]Linkang Zhang, Yunyang Qin, Yujia Zhu, Yifei Cheng, Zhen Jie, Qingyun Liu:
SeeStar: An Efficient Starlink Asset Detection Framework. SciSec 2023: 139-156 - [c24]Liang Jiao, Yujia Zhu, Baiyang Li, Qingyun Liu:
Measuring DNS-over-Encryption Performance Over IPv6. TrustCom 2023: 444-451 - 2022
- [j8]Yujia Zhu, Yijiao Zhao, Yong Wang:
A Review of Three-Dimensional Facial Asymmetry Analysis Methods. Symmetry 14(7): 1414 (2022) - [c23]Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia:
Active Authorization Control of Deep Models Using Channel Pruning. ChineseCSCW (2) 2022: 530-542 - [c22]Hanwu Sun, Chengwei Peng, Yafei Sang, Shuhao Li, Yongzheng Zhang, Yujia Zhu:
Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic. CollaborateCom (2) 2022: 153-173 - [c21]Yuqi Qiu, Baiyang Li, Liang Jiao, Yujia Zhu, Qingyun Liu:
Detection of DoH Tunnels with Dual-Tier Classifier. MSN 2022: 417-421 - 2021
- [c20]Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. TrustCom 2021: 783-790 - 2020
- [c19]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model. HPCC/DSS/SmartCity 2020: 465-474 - [c18]Xiaoou Zhang, Zhao Li, Yujia Zhu, Qingyun Liu, Chao Zheng:
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively. ICT 2020: 1-6
2010 – 2019
- 2019
- [j7]Li Kuang, Han Yan, Yujia Zhu, Shenmei Tu, Xiaoliang Fan:
Predicting duration of traffic accidents based on cost-sensitive Bayesian network and weighted K-nearest neighbor. J. Intell. Transp. Syst. 23(2): 161-174 (2019) - [c17]Baiyang Li, Yujia Zhu, Qingyun Liu, Zhou Zhou, Li Guo:
Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis. ICC 2019: 1-7 - [c16]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Qingyun Liu, Yong Sun:
MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic. ICCS (2) 2019: 318-331 - [c15]Caiyun Huang, Peng Zhang, Yong Sun, Yujia Zhu, Yang Liu:
SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation. ICT 2019: 238-243 - [c14]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic. ISCC 2019: 1-7 - 2018
- [j6]Li Kuang, Yujia Zhu, Shuqi Li, Xuejin Yan, Han Yan, Shuiguang Deng:
A Privacy Protection Model of Data Publication Based on Game Theory. Secur. Commun. Networks 2018: 3486529:1-3486529:13 (2018) - [j5]Li Kuang, Long Yu, Lan Huang, Yin Wang, Pengju Ma, Chuanbin Li, Yujia Zhu:
A Personalized QoS Prediction Approach for CPS Service Recommendation Based on Reputation and Location-Aware Collaborative Filtering. Sensors 18(5): 1556 (2018) - [c13]Zhou Zhou, Xi Zhang, Qingyun Liu, Yujia Zhu, Da Li, Li Guo:
SASD: A Self-Adaptive Stateful Decompression Architecture. GLOBECOM 2018: 206-212 - [c12]Lingjing Yu, Tao Liu, Zhaoyu Zhou, Yujia Zhu, Qingyun Liu, Jianlong Tan:
WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process. MASS 2018: 19-27 - [c11]Xiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu:
VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic. TrustCom/BigDataSE 2018: 783-789 - [c10]Yujia Zhu, Xuejin Yan, Shuqi Li, Yuyou Fan, Li Kuang:
An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1112-1117 - 2017
- [j4]Zan Gao, Su-hua Li, Yujia Zhu, Chao Wang, Hua Zhang:
Collaborative sparse representation leaning model for RGBD action recognition. J. Vis. Commun. Image Represent. 48: 442-452 (2017) - [j3]Zan Gao, Su-hua Li, Guotai Zhang, Yujia Zhu, Chao Wang, Hua Zhang:
Evaluation of regularized multi-task leaning algorithms for single/multi-view human action recognition. Multim. Tools Appl. 76(19): 20125-20148 (2017) - [c9]Xiang Tian, Yu Wang, Yujia Zhu, Yong Sun, Qingyun Liu:
De-anonymous and Anonymous Technologies for Network Traffic Release. ATIS 2017: 193-200 - [c8]Yan Hua, Jianke Du, Yujia Zhu, Ping Shi:
Semantics and locality preserving correlation projections. ICME 2017: 913-918 - [c7]Yujia Zhu, Yu Wang, Qingyun Liu, Yang Liu, Peng Zhang:
WiFi fingerprint releasing for indoor localization based on differential privacy. PIMRC 2017: 1-6 - 2016
- [c6]Biao Mao, Daniel Shawhan, Ray Zimmerman, Jubo Yan, Yujia Zhu, William Schulze, Richard E. Schuler, Daniel J. Tylavsky:
The Engineering, Economic and Environmental Electricity Simulation Tool (E4ST): Description and an Illustration of Its Capability and Use as a Planning/Policy Analysis Tool. HICSS 2016: 2317-2325 - 2014
- [c5]Yujia Zhu, Lidong Zhai:
Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model. MSN 2014: 195-200 - 2013
- [j2]Yujia Zhu:
Sentence length and syntactic complexity in spoken and written English. Glottometrics 26: 9-16 (2013) - 2012
- [c4]Yujia Zhu, Zhong-liang Deng:
AP Selection for Indoor Localization Based on Neighborhood Rough Sets. VTC Fall 2012: 1-5 - 2011
- [j1]Lianming Xu, Zhongliang Deng, Ling Fang, Yujia Zhu, Wenlong Liu:
Research on an Anti-Perturbation Kalman Filter Algorithm. J. Networks 6(10): 1430-1436 (2011) - [c3]Hao Ji, Fei Su, Yujia Zhu:
Robust head pose estimation via semi-supervised manifold learning with ℓ1-graph regularization. IJCB 2011: 1-6 - [c2]Hao Ji, Fei Su, Yujia Zhu:
Incremental nonparametric discriminant analysis for robust object tracking. ICME 2011: 1-6
2000 – 2009
- 2001
- [c1]Fuliang Weng, Naiyong Jin, Jie Meng, Yujia Zhu:
A Novel Probabilistic Model for Link Unification Grammar. IWPT 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint