Jun Zhang
Title
Cited by
Cited by
Year
Network Traffic Classification Using Correlation Information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan
IEEE Transactions on Parallel and Distributed Systems 24 (1), 104-117, 2013
2712013
Robust network traffic classification
J Zhang, X Chen, Y Xiang, W Zhou, J Wu
IEEE/ACM transactions on networking 23 (4), 1257-1270, 2014
1912014
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions
J Zhang, C Chen, Y Xiang, W Zhou
IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013
1432013
Modeling Propagation Dynamics of Social Network Worms
S Wen, W Zhou, J Zhang, Y Xiang, W Jia
IEEE, 2012
992012
An effective network traffic classification method with unknown flow detection
J Zhang, C Chen, Y Xiang, W Zhou, AV Vasilakos
IEEE Transactions on Network and Service Management 10 (2), 133-147, 2013
872013
Detecting and preventing cyber insider threats: A survey
L Liu, O De Vel, QL Han, J Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 20 (2), 1397-1417, 2018
852018
6 million spam tweets: A large ground truth for timely Twitter spam detection
C Chen, J Zhang, X Chen, Y Xiang, W Zhou
2015 IEEE international conference on communications (ICC), 7065-7070, 2015
832015
Secure buyer–seller watermarking protocol
J Zhang, W Kou, K Fan
IEE Proceedings-Information Security 153 (1), 15-18, 2006
812006
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
792013
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection
T Chen, X Li, H Yin, J Zhang
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 40-52, 2018
632018
Effective watermarking scheme in the encrypted domain for buyer–seller watermarking protocol
B Zhao, W Kou, H Li, L Dang, J Zhang
Information Sciences 180 (23), 4672-4684, 2010
632010
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
622016
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
562017
A performance evaluation of machine learning-based streaming spam tweets detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational social systems 2 (3), 65-76, 2015
522015
Modeling and analysis on the propagation dynamics of modern email malware
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou
IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013
512013
Unsupervised traffic classification using flow statistical properties and IP packet payload
J Zhang, Y Xiang, W Zhou, Y Wang
Journal of Computer and System Sciences 79 (5), 573-585, 2013
512013
A novel semi-supervised approach for network traffic clustering
Y Wang, Y Xiang, J Zhang, S Yu
2011 5th International Conference on Network and System Security, 169-175, 2011
462011
Data-driven cybersecurity incident prediction: A survey
N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang
IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2018
452018
Investigating the deceptive information in Twitter spam
C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, MM Hassan
Future Generation Computer Systems 72, 319-326, 2017
342017
Lazy collaborative filtering for data sets with missing values
Y Ren, G Li, J Zhang, W Zhou
IEEE transactions on cybernetics 43 (6), 1822-1834, 2013
332013
The system can't perform the operation now. Try again later.
Articles 1–20