​
Login / Signup
Zhi Xue
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 52
Top Topics
Intrusion Detection
Lightweight
Email
Detection Scheme
Top Venues
IEEE Access
TrustCom
USENIX Security Symposium
IEEE Consumer Electron. Mag.
</>
Publications
</>
Haojie He
,
Xingwei Lin
,
Ziang Weng
,
Ruijie Zhao
,
Shuitao Gan
,
Libo Chen
,
Yuede Ji
,
Jiashui Wang
,
Zhi Xue
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
USENIX Security Symposium
(2024)
Ruijie Zhao
,
Mingwei Zhan
,
Xianwen Deng
,
Fangqi Li
,
Yanhao Wang
,
Yijun Wang
,
Guan Gui
,
Zhi Xue
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification.
IEEE/ACM Trans. Netw.
32 (3) (2024)
Libo Chen
,
Yanhao Wang
,
Jiaqi Linghu
,
Qinsheng Hou
,
Quanpu Cai
,
Shanqing Guo
,
Zhi Xue
SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems.
IEEE Trans. Dependable Secur. Comput.
21 (4) (2024)
Xianwen Deng
,
Yijun Wang
,
Zhi Xue
AN-Net: an Anti-Noise Network for Anonymous Traffic Classification.
WWW
(2024)
Wenlong Du
,
Jian Li
,
Yanhao Wang
,
Libo Chen
,
Ruijie Zhao
,
Junmin Zhu
,
Zhengguang Han
,
Yijun Wang
,
Zhi Xue
Vulnerability-oriented Testing for RESTful APIs.
USENIX Security Symposium
(2024)
Han Zhang
,
Libo Chen
,
Ming Liu
,
Yong Shi
,
Songyang Wu
,
Zhi Xue
Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC.
MSN
(2023)
Ruijie Zhao
,
Mingwei Zhan
,
Xianwen Deng
,
Yanhao Wang
,
Yijun Wang
,
Guan Gui
,
Zhi Xue
Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation.
AAAI
(2023)
Han Zhang
,
Dengke Mi
,
Libo Chen
,
Ming Liu
,
Yong Shi
,
Zhi Xue
Subdomain Protection is Needed: An SPF and DMARC-Based Empirical Measurement Study and Proactive Solution of Email Security.
SRDS
(2023)
Yuwei Liu
,
Siqi Chen
,
Yuchong Xie
,
Yanhao Wang
,
Libo Chen
,
Bin Wang
,
Yingming Zeng
,
Zhi Xue
,
Purui Su
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device.
ASE
(2023)
Junmin Zhu
,
Yizhao Yao
,
Xianwen Deng
,
Yaoguang Yong
,
Yanhao Wang
,
Libo Chen
,
Zhi Xue
,
Ruijie Zhao
SAWD: Structural-Aware Webshell Detection System with Control Flow Graph.
SEKE
(2023)
Ruijie Zhao
,
Yiteng Huang
,
Xianwen Deng
,
Yong Shi
,
Jiabin Li
,
Zijing Huang
,
Yijun Wang
,
Zhi Xue
A Novel Traffic Classifier With Attention Mechanism for Industrial Internet of Things.
IEEE Trans. Ind. Informatics
19 (11) (2023)
Ruijie Zhao
,
Xianwen Deng
,
Yanhao Wang
,
Zhicong Yan
,
Zhengguang Han
,
Libo Chen
,
Zhi Xue
,
Yijun Wang
GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.
SP
(2023)
Ruijie Zhao
,
Yijun Wang
,
Zhi Xue
,
Tomoaki Ohtsuki
,
Bamidele Adebisi
,
Guan Gui
Semisupervised Federated-Learning-Based Intrusion Detection Method for Internet of Things.
IEEE Internet Things J.
10 (10) (2023)
Xianwen Deng
,
Ruijie Zhao
,
Yanhao Wang
,
Libo Chen
,
Yijun Wang
,
Zhi Xue
3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.
IJCAI
(2022)
Zilong Lin
,
Yong Shi
,
Zhi Xue
IDSGAN: Generative Adversarial Networks for Attack Generation Against Intrusion Detection.
PAKDD (3)
(2022)
Ruijie Zhao
,
Linbo Yang
,
Yijun Wang
,
Zhi Xue
,
Guan Gui
,
Tomoaki Ohtsuki
A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection.
ICC
(2022)
Libo Chen
,
Quanpu Cai
,
Zhenbang Ma
,
Yanhao Wang
,
Hong Hu
,
Minghang Shen
,
Yue Liu
,
Shanqing Guo
,
Haixin Duan
,
Kaida Jiang
,
Zhi Xue
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
CCS
(2022)
Li-Bo Chen
,
Yihang Xia
,
Zhenbang Ma
,
Ruijie Zhao
,
Yanhao Wang
,
Yue Liu
,
Wenqi Sun
,
Zhi Xue
SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection.
J. Inf. Secur. Appl.
71 (2022)
Ruijie Zhao
,
Xianwen Deng
,
Zhicong Yan
,
Jun Ma
,
Zhi Xue
,
Yijun Wang
MT-FlowFormer: A Semi-Supervised Flow Transformer for Encrypted Traffic Classification.
KDD
(2022)
Ruijie Zhao
,
Guan Gui
,
Zhi Xue
,
Jie Yin
,
Tomoaki Ohtsuki
,
Bamidele Adebisi
,
Haris Gacanin
A Novel Intrusion Detection Method Based on Lightweight Neural Network for Internet of Things.
IEEE Internet Things J.
9 (12) (2022)
Ruijie Zhao
,
Xianwen Deng
,
Yanhao Wang
,
Libo Chen
,
Ming Liu
,
Zhi Xue
,
Yijun Wang
Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks.
IWQoS
(2022)
Ruijie Zhao
,
Tiantian Tang
,
Guan Gui
,
Zhi Xue
A Lightweight Semi-Supervised Learning Method Based on Consistency Regularization for Intrusion Detection.
ICC
(2022)
Ruijie Zhao
,
Zhaojie Li
,
Zhi Xue
,
Tomoaki Ohtsuki
,
Guan Gui
A Novel Approach based on Lightweight Deep Neural Network for Network Intrusion Detection.
WCNC
(2021)
Ruijie Zhao
,
Jie Yin
,
Zhi Xue
,
Guan Gui
,
Bamidele Adebisi
,
Tomoaki Ohtsuki
,
Haris Gacanin
,
Hikmet Sari
An Efficient Intrusion Detection Method Based on Dynamic Autoencoder.
IEEE Wirel. Commun. Lett.
10 (8) (2021)
Ruijie Zhao
,
Yu Chen
,
Yijun Wang
,
Yong Shi
,
Zhi Xue
An Efficient and Lightweight Approach for Intrusion Detection based on Knowledge Distillation.
ICC
(2021)
Xianwen Deng
,
Ruijie Zhao
,
Zhi Xue
,
Ming Liu
,
Libo Chen
,
Yijun Wang
A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs.
TrustCom
(2021)
Libo Chen
,
Yanhao Wang
,
Quanpu Cai
,
Yunfan Zhan
,
Hong Hu
,
Jiaqi Linghu
,
Qinsheng Hou
,
Chao Zhang
,
Haixin Duan
,
Zhi Xue
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
USENIX Security Symposium
(2021)
Ruijie Zhao
,
Yiteng Huang
,
Xianwen Deng
,
Zhi Xue
,
Jiabin Li
,
Zijing Huang
,
Yijun Wang
Flow Transformer: A Novel Anonymity Network Traffic Classifier with Attention Mechanism.
MSN
(2021)
Ming Liu
,
Zhi Xue
,
Xiangjian He
Two-Tier Intrusion Detection Framework for Embedded Systems.
IEEE Consumer Electron. Mag.
10 (5) (2021)
Ming Liu
,
Zhi Xue
A Fuzzy Post-project Evaluation Approach for Security Video Surveillance System.
CoRR
(2021)
Jiabin Li
,
Zhi Xue
,
Changlian Li
,
Ming Liu
RTED-SD: A Real-Time Edge Detection Scheme for Sybil DDoS in the Internet of Vehicles.
IEEE Access
9 (2021)
Ming Liu
,
Zhi Xue
,
Xiangjian He
,
Jinjun Chen
SCADS: A Scalable Approach Using Spark in Cloud for Host-based Intrusion Detection System with System Calls.
CoRR
(2021)
Han Zhang
,
Ming Liu
,
Zihan Yue
,
Zhi Xue
,
Yong Shi
,
Xiangjian He
A PHP and JSP Web Shell Detection System With Text Processing Based On Machine Learning.
TrustCom
(2020)
Ming Liu
,
Zhi Xue
,
Xiangjian He
A Unified Host-based Intrusion Detection Framework using Spark in Cloud.
TrustCom
(2020)
Ruijie Zhao
,
Yue Yin
,
Yong Shi
,
Zhi Xue
Intelligent intrusion detection based on federated learning aided long short-term memory.
Phys. Commun.
42 (2020)
Jiabin Li
,
Ming Liu
,
Zhi Xue
,
Xiaochen Fan
,
Xiangjian He
RTVD: A Real-Time Volumetric Detection Scheme for DDoS in the Internet of Things.
IEEE Access
8 (2020)
Ming Liu
,
Yuxuan He
,
Zhi Xue
,
Xiangjian He
,
Jinjun Chen
MultiScan: A Private Online Virus Detection System.
IEEE Consumer Electron. Mag.
8 (6) (2019)
Ming Liu
,
Zhi Xue
,
Xianghua Xu
,
Changmin Zhong
,
Jinjun Chen
Host-Based Intrusion Detection System with System Calls: Review and Future Trends.
ACM Comput. Surv.
51 (5) (2019)
Xiao Chen
,
Liang Pang
,
Pengze Guo
,
Xingping Sun
,
Zhi Xue
,
N. Arunkumar
New upper degree of freedom in transmission system based on wireless G-MIMO communication channel.
Clust. Comput.
22 (Supplement) (2019)
Ming Liu
,
Zhi Xue
,
Xiangjian He
,
Jinjun Chen
Cyberthreat-Intelligence Information Sharing: Enhancing Collaborative Security.
IEEE Consumer Electron. Mag.
8 (3) (2019)
Sambit Kumar Mishra
,
Deepak Puthal
,
Bibhudatta Sahoo
,
Suraj Sharma
,
Zhi Xue
,
Albert Y. Zomaya
Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT.
IEEE Access
6 (2018)
Steven Z. Lin
,
Yong Shi
,
Zhi Xue
Character-Level Intrusion Detection Based On Convolutional Neural Networks.
IJCNN
(2018)
Pengze Guo
,
Ming Liu
,
Jun Wu
,
Zhi Xue
,
Xiangjian He
Energy-Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks in Cloud-Based 5G Networks.
IEEE Access
6 (2018)
Zilong Lin
,
Yong Shi
,
Zhi Xue
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection.
CoRR
(2018)
Liang Pang
,
Xiao Chen
,
Yong Shi
,
Zhi Xue
,
Rida Khatoun
Localization of multiple jamming attackers in vehicular ad hoc network.
Int. J. Distributed Sens. Networks
13 (8) (2017)
Liang Pang
,
Xiao Chen
,
Zhi Xue
,
Rida Khatoun
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm.
ICPCSEE (2)
(2017)
Liang Pang
,
Zhi Xue
A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer.
ICSAI
(2017)
Liang Pang
,
Pengze Guo
,
Xiao Chen
,
Zhi Xue
Tracking the Mobile Jammer Continuously in Time by Using Moving Vector.
ISCID (1)
(2017)
Pengze Guo
,
Zhi Xue
Improved task partition based fault-tolerant rate-monotonic scheduling algorithm.
SSIC
(2016)
Shuang Li
,
Wei Hu
,
Yaoxue Zhang
,
Yue-Zhi Zhou
,
Zhi Xue
Personalised content recommendation based on field authorities in transparent computing.
Int. J. Ad Hoc Ubiquitous Comput.
21 (2) (2016)
Nan Run Zhou
,
Xiao Rong Liang
,
Zhi Juan Kang
,
Lihua Gong
,
Zhi Xue
Secrecy Outage Probability of a Distributed Multi-Antenna Cooperative Communication System.
Wirel. Pers. Commun.
90 (4) (2016)
Pengze Guo
,
Zhi Xue
Real-Time Fault-Tolerant Scheduling Algorithm in Virtualized Clouds.
ChinaCom (2)
(2016)
Xiao Chen
,
Liang Pang
,
Yuhuan Tang
,
Hongpeng Yang
,
Zhi Xue
Security in MIMO wireless hybrid channel with artificial noise.
SSIC
(2015)
Fangbiao Li
,
Zhi Xue
An inner bound on the capacity region of multiple-access channel with side information.
BMEI
(2014)
Xinxing Yin
,
Zhi Xue
Wiretap Channel with Information Embedding on Actions.
Entropy
16 (4) (2014)
Yongkai Zhou
,
Yan Zhu
,
Zhi Xue
Enhanced MIMOME wiretap channel via adopting full-duplex MIMO radios.
GLOBECOM
(2014)
Xinxing Yin
,
Yan Zhu
,
Xiao Chen
,
Liang Pang
,
Zhi Xue
Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States.
CIT
(2014)
Nanrun Zhou
,
Xun Chen
,
Chisheng Li
,
Zhi Xue
Secrecy Rate of Two-Hop AF Relaying Networks with an Untrusted Relay.
Wirel. Pers. Commun.
75 (1) (2014)
Yongkai Zhou
,
Fangbiao Li
,
Pengze Guo
,
Zhi Xue
Robust MIMO beamforming and power allocation for artificial noise generated by both transmitter and receiver.
ChinaCom
(2014)
Xinxing Yin
,
Xiao Chen
,
Pengze Guo
,
Zhi Xue
The role of feedback in channels with information embedding on actions.
ICCC
(2014)
Xinxing Yin
,
Liang Pang
,
Zhi Xue
Information embedding on actions in wiretap channel.
ICC Workshops
(2014)
Yongkai Zhou
,
Zheng Zheng Xiang
,
Yan Zhu
,
Zhi Xue
Application of Full-Duplex Wireless Technique into Secure MIMO Communication: Achievable Secrecy Rate based Optimization.
IEEE Signal Process. Lett.
21 (7) (2014)
Yongkai Zhou
,
Pengze Guo
,
Yan Zhu
,
Zhi Xue
,
Jianhua Li
,
Yi Yuan
Integrated Network Service to Enhance Multicast Communication.
DASC
(2013)
Yan Zhu
,
Yongkai Zhou
,
Shivani Patel
,
Xiao Chen
,
Liang Pang
,
Zhi Xue
Artificial Noise Generated in MIMO Scenario: Optimal Power Design.
IEEE Signal Process. Lett.
20 (10) (2013)
Yongkai Zhou
,
Zhi Xue
,
Chong Fu
,
Jianhua Li
,
Yue Wu
,
Yi Yuan
,
Yun Zhu
,
Yong Shi
A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.
CSE
(2013)
Wei Hu
,
Yaoxue Zhang
,
Yuezhi Zhou
,
Zhi Xue
Contribution-Based User Reputation Modeling in Collaborative Recommender Systems.
UIC/ATC
(2012)
Yexia Cheng
,
Yuejin Du
,
Junfeng Xu
,
Chunyang Yuan
,
Zhi Xue
Research on security evaluation of cloud computing based on attack graph.
CCIS
(2012)
Jie Gu
,
Zhi Xue
An Improved Efficient Secret Handshakes Scheme with Unlinkability.
IEEE Commun. Lett.
15 (2) (2011)
Jie Gu
,
Zhi Xue
An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks.
ICC
(2010)
Yinqian Zhang
,
Xun Fan
,
Zhi Xue
,
Hao Xu
Two Stochastic Models for Security Evaluation Based on Attack Graph.
ICYCS
(2008)
Yinqian Zhang
,
Xun Fan
,
Yijun Wang
,
Zhi Xue
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences.
ACSAC
(2008)
Baowen Zhang
,
William Zhu
,
Zhi Xue
Mining Privilege Escalation Paths for Network Vulnerability Analysis.
FSKD (4)
(2007)
Ming Zhao
,
Shilin Wang
,
Shenghong Li
,
Xiang Li
,
Zhi Xue
Feature Analysis and Classification for Filtering Junk Information in Animation.
ICNC (3)
(2007)