default search action
Lidong Zhai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Quan Hong, Jiaqi Li, Wen Zhang, Lidong Zhai:
NanoHook: An Efficient System Call Hooking Technique with One-Byte Invasive. SETTA 2024: 363-381 - [i1]Lvyang Zhang, Wen Lu, Yang Zhao, Jiaqi Li, Lidong Zhai:
Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern. CoRR abs/2410.10248 (2024) - 2023
- [c19]Quan Hong, Jiaqi Li, Xizhong Guo, Pan Xie, Lidong Zhai:
Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim. ICDF2C (2) 2023: 224-243 - [c18]Peng Wang, Guangxiang Dai, Lidong Zhai:
Event-Based Threat Intelligence Ontology Model. SciSec 2023: 261-282 - [c17]Yu Chen, Yang Yu, Lidong Zhai:
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack. USENIX Security Symposium 2023: 2027-2041 - 2022
- [c16]Quan Hong, Yang Zhao, Jian Chang, Yuxin Du, Jun Li, Lidong Zhai:
Shock Trap: An active defense architecture based on trap vulnerabilities. DSC 2022: 24-31 - [c15]Cheng Fang, Wenjie Mi, Ping Han, Lidong Zhai:
A method of network traffic anomaly detection based on Packet Window Transformer. DSC 2022: 199-205 - 2021
- [c14]Shiwen Song, Qiong Wu, Xin Zheng, Peng Wang, Yuchen Dou, Zhongwen Li, Lidong Zhai:
Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat Intelligence. DSC 2021: 445-449
2010 – 2019
- 2019
- [j7]Cong Zhang, Yuanan Liu, Fan Wu, Lidong Zhai, Hui Lu:
Analysis of WeChat Subscription Influence Based on Topic Diffusion. Int. J. Digit. Crime Forensics 11(4): 130-148 (2019) - 2018
- [j6]Lidong Zhai, Jingya Wang, Chaojian Hu, Jun Li:
Research Notes: User Influence in Microblog Based on Interest Graph. Int. J. Softw. Eng. Knowl. Eng. 28(2): 207-218 (2018) - [c13]Zhihong Nan, Lichao Zhai, Lidong Zhai, Huiming Liu:
Botnet homology method based on symbolic approximation algorithm of communication characteristic curve. AVSS 2018: 1-6 - 2016
- [j5]Fenggang Sun, Lidong Zhai, Yue-Jin Du, Peng Wang, Jun Li:
Design of Mobile Botnet Based on Open Service. Int. J. Digit. Crime Forensics 8(3): 1-10 (2016) - 2015
- [j4]Song He, Can Zhang, Wei Guo, Lidong Zhai:
Worms Propagation Modeling and Analysis in Big Data Environment. Int. J. Distributed Sens. Networks 11: 985856:1-985856:8 (2015) - [c12]Chunlin Lu, Lidong Zhai, Tao Liu, Na Li:
Network Intrusion Detection Based on Neural Networks and D-S Evidence. PSIVT Workshops 2015: 332-343 - 2014
- [j3]Yue-Jin Du, Hui Lu, Lidong Zhai:
Digraph Spectral Clustering with Applications in Distributed Sensor Validation. Int. J. Distributed Sens. Networks 10 (2014) - [c11]Xupeng Fang, Lidong Zhai, Zhaopeng Jia, Wenyan Bai:
A Game Model for Predicting the Attack Path of APT. DASC 2014: 491-495 - [c10]Fan Yang, Yue Li, Lidong Zhai:
RayDroid: A Framework for Discovering Anomaly in Android. ISCTCS 2014: 33-40 - [c9]Fangjiao Zhang, Lidong Zhai, Jincui Yang, Xiang Cui:
Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks. ITQM 2014: 711-720 - [c8]Yujia Zhu, Lidong Zhai:
Location Privacy in Buildings: A 3-Dimensional K-Anonymity Model. MSN 2014: 195-200 - [c7]Daiyong Quan, Lidong Zhai, Fan Yang, Peng Wang:
Detection of Android Malicious Apps Based on the Sensitive Behaviors. TrustCom 2014: 877-883 - 2013
- [c6]Fangfang Yuan, Lidong Zhai, Yanan Cao, Li Guo:
Research of Intrusion Detection System on Android. SERVICES 2013: 312-316 - 2012
- [c5]Wei Guo, Lidong Zhai, Li Guo, Jinqiao Shi:
Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. APWeb Workshops 2012: 68-77 - [c4]Lidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo, Jinqiao Shi:
Worm Propagation Model for Heterogeneous Network. CyberC 2012: 151-154 - [c3]Zhilei Wang, Lidong Zhai, Yongqiang Ma, Yue Li:
Analysis of Public Sentiment Based on SMS Content. ISCTCS 2012: 637-643 - [c2]Yue Li, Lidong Zhai, Zhilei Wang, Yunlong Ren:
Control Method of Twitter- and SMS-Based Mobile Botnet. ISCTCS 2012: 644-650 - [c1]Fangjiao Zhang, Wei Guo, Jincui Yang, Fangfang Yuan, Lidong Zhai:
Research on Redundant Channel Model Based on Spatial Correlation in IOT. ISCTCS 2012: 666-672 - 2011
- [j2]Lidong Zhai, Zhaoyun Ding, Yan Jia, Bin Zhou:
A Word Position-Related LDA Model. Int. J. Pattern Recognit. Artif. Intell. 25(6): 909-925 (2011) - [j1]Lidong Zhai, Li Guo, Xiang Cui, Shuhao Li:
Research on Real-time Publish/Subscribe System supported by Data-Integration. J. Softw. 6(6): 1133-1139 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint