Follow
Jun Zhang
Jun Zhang
Verified email at swin.edu.au
Title
Cited by
Cited by
Year
Software vulnerability detection using deep neural networks: a survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE 108 (10), 1825-1848, 2020
4552020
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2015
4442015
Network Traffic Classification Using Correlation Information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (1), 104-117, 2013
4312013
Detecting and preventing cyber insider threats: A survey
L Liu, O De Vel, QL Han, J Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 20 (2), 1397-1417, 2018
4252018
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection
T Chen, X Li, H Yin, J Zhang
Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 …, 2018
4182018
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019
3522019
Security and privacy in 6G networks: New areas and new challenges
M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou
Digital Communications and Networks 6 (3), 281-291, 2020
3382020
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2020
3142020
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021
3112021
A survey of android malware detection with deep neural models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020
3012020
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
J Zhang, C Chen, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
2392013
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
2332018
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
2002016
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
1892017
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1702017
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
1692015
A performance evaluation of machine learning-based streaming spam tweets detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational social systems 2 (3), 65-76, 2015
1632015
Addressing the class imbalance problem in twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
1542017
An effective network traffic classification method with unknown flow detection
J Zhang, C Chen, Y Xiang, W Zhou, AV Vasilakos
IEEE transactions on network and service management 10 (2), 133-147, 2013
1542013
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang
IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023
1412023
The system can't perform the operation now. Try again later.
Articles 1–20