default search action
Bing Zhang 0011
Person information
- affiliation (PhD 2018): Yanshan University, College of Information Science and Engineering, Qinhuangdao, China
Other persons with the same name
- Bing Zhang — disambiguation page
- Bing Zhang 0001 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China (and 1 more)
- Bing Zhang 0002 — National Institute of Information and Communications Technology (NICT), Wireless Network Research Institute, Kyoto, Japan
- Bing Zhang 0003 — Baylor College of Medicine, Houston, TX, USA (and 1 more)
- Bing Zhang 0004 — Raytheon BBN Technologies
- Bing Zhang 0005 — Kansai Advanced Research Center, Communications Research Laboratory
- Bing Zhang 0006 — Shandong Water Polytechnic
- Bing Zhang 0007 — CAS Key Laboratory of Genome Sciences and Information, Beijing Institute of Genomics
- Bing Zhang 0008 — National Computer Network Emergency Response Technical Team, Coordination Center of China
- Bing Zhang 0009 — National Engineering Laboratory for Offshore Oil Exploration, Wave and Information Institute, Xi'an Jiao Tong University
- Bing Zhang 0010 — Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- Bing Zhang 0012 — Nanjing University Medical School Affiliated Drum Tower Hospital, Department of Radiology, China
- Bing Zhang 0013 — Jilin University, State Key Laboratory of Automotive Simulation and Control, Changchun, China
- Bing Zhang 0014 — Shanghai University, School of Mechatronic Engineering and Automation, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Bing Zhang, Xuyang Zhao, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. ACM Comput. Surv. 56(8): 203:1-203:39 (2024) - [j23]Qian Wang, Haiyang Jiang, Jiadong Ren, Han Liu, Xuehang Wang, Bing Zhang:
An intrusion detection algorithm based on joint symmetric uncertainty and hyperparameter optimized fusion neural network. Expert Syst. Appl. 244: 123014 (2024) - [j22]Bing Zhang, Hongchang Zhang, Rong Ren, Zhen Wen, Qian Wang:
Approach to Detect Windows Malware Based on Malicious Tendency Image and ResNet Algorithm. Int. J. Softw. Eng. Knowl. Eng. 34(7): 1173-1197 (2024) - [j21]Bing Zhang, Rong Ren, Jia Liu, Mingcai Jiang, Jiadong Ren, Jingyue Li:
SQLPsdem: A Proxy-Based Mechanism Towards Detecting, Locating and Preventing Second-Order SQL Injections. IEEE Trans. Software Eng. 50(7): 1807-1826 (2024) - 2023
- [j20]Yuxuan Zhao, Jiadong Ren, Bing Zhang, Jinxiao Wu, Yongqiang Lyu:
An explainable attention-based TCN heartbeats classification model for arrhythmia detection. Biomed. Signal Process. Control. 80(Part): 104337 (2023) - [j19]Guoquan Wu, Bing Zhang, Ya Li:
Intelligent and survivable resource slicing for 6G-oriented UAV-assisted edge computing networks. Comput. Commun. 202: 154-165 (2023) - [j18]Qian Wang, Yuying Gao, Jiadong Ren, Bing Zhang:
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. Comput. Secur. 126: 103070 (2023) - [j17]Jiadong Ren, Mingyou Wu, Bing Zhang, Ke Xu, Shangyang Li, Qian Wang, Yue Chang, Tao Cheng:
DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation. Int. J. Softw. Eng. Knowl. Eng. 33(9): 1327-1354 (2023) - [j16]Zhangqi Zheng, Yongshan Liu, Bing Zhang, Xinqian Liu, Hongyan He, Xiang Gong:
A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network. Inf. Softw. Technol. 160: 107246 (2023) - [j15]Zhangqi Zheng, Yongshan Liu, Bing Zhang, Jiadong Ren, Yongsheng Zong, Qian Wang, Xiaolei Yang, Qian Liu:
Software defect prediction method based on the heterogeneous integration algorithm. J. Intell. Fuzzy Syst. 45(3): 4807-4824 (2023) - [i1]Bing Zhang, Xuyang Zhao, Jiangtian Nie, Jianhang Tang, Yuling Chen, Yang Zhang, Dusit Niyato:
Epidemic Model-based Network Influential Node Ranking Methods: A Ranking Rationality Perspective. CoRR abs/2303.12588 (2023) - 2022
- [j14]Zhangqi Zheng, Bing Zhang, Yongshan Liu, Jiadong Ren, Xuyang Zhao, Qian Wang:
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm. Comput. Secur. 114: 102572 (2022) - [j13]Bing Zhang, Jingyue Li, Jiadong Ren, Guoyan Huang:
Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A Review. ACM Comput. Surv. 54(9): 190:1-190:35 (2022) - [j12]Qian Wang, Wenfang Zhao, Xiaoyu Wei, Jiadong Ren, Yuying Gao, Bing Zhang:
Intrusion Detection Algorithm Based on Convolutional Neural Network and Light Gradient Boosting Machine. Int. J. Softw. Eng. Knowl. Eng. 32(8): 1229-1245 (2022) - [j11]Bing Zhang, Yuan Gao, Jingyi Wu, Ning Wang, Qian Wang, Jiadong Ren:
Approach to Predict Software Vulnerability Based on Multiple-Level N-gram Feature Extraction and Heterogeneous Ensemble Learning. Int. J. Softw. Eng. Knowl. Eng. 32(10): 1559-1582 (2022) - [c2]Qian Wang, Jiadong Ren, Honghao Zhang, Yu Wang, Bing Zhang:
Identifying Influential Spreaders in Complex Networks Based on Degree Centrality. WISA 2022: 314-326 - 2021
- [j10]Xinqian Liu, Jiadong Ren, Haitao He, Bing Zhang, Chen Song, Yunxue Wang:
A fast all-packets-based DDoS attack detection approach based on network graph and graph kernel. J. Netw. Comput. Appl. 185: 103079 (2021) - [c1]Sindre Beba, Magnus Melseth Karlsen, Jingyue Li, Bing Zhang:
Critical Understanding of Security Vulnerability Detection Plugin Evaluation Reports. APSEC 2021: 275-284 - 2020
- [j9]Bing Zhang, Chun Shan, Munawar Hussain, Jiadong Ren, Guoyan Huang:
Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns. Int. J. Softw. Eng. Knowl. Eng. 30(5): 695-719 (2020)
2010 – 2019
- 2019
- [j8]Bing Zhang, Jiadong Ren, Yongqiang Cheng, Bing Wang, Zhiyao Wei:
Health Data Driven on Continuous Blood Pressure Prediction Based on Gradient Boosting Decision Tree Algorithm. IEEE Access 7: 32423-32433 (2019) - [j7]Chen Song, Guoyan Huang, Bing Zhang, Bo Yin, Huifang Lu:
Modeling Air Pollution Transmission Behavior as Complex Network and Mining Key Monitoring Station. IEEE Access 7: 121245-121254 (2019) - [j6]Bing Zhang, Huihui Ren, Guoyan Huang, Yongqiang Cheng, Changzhen Hu:
Predicting blood pressure from physiological index data using the SVR algorithm. BMC Bioinform. 20(1): 109:1-109:15 (2019) - 2018
- [j5]Qian Wang, Jiadong Ren, Yu Wang, Bing Zhang, Yongqiang Cheng, Xiaolin Zhao:
CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network. IEEE Access 6: 19550-19559 (2018) - [j4]Bing Zhang, Zhiyao Wei, Jiadong Ren, Yongqiang Cheng, Zhangqi Zheng:
An Empirical Study on Predicting Blood Pressure Using Classification and Regression Trees. IEEE Access 6: 21758-21768 (2018) - [j3]Bing Zhang, Guoyan Huang, Zhangqi Zheng, Jiadong Ren, Changzhen Hu:
Approach to Mine the Modularity of Software Network Based on the Most Vital Nodes. IEEE Access 6: 32543-32553 (2018) - [j2]Bing Zhang, Zhiyang Liu, Yanguo Jia, Jiadong Ren, Xiaolin Zhao:
Network Intrusion Detection Method Based on PCA and Bayes Algorithm. Secur. Commun. Networks 2018: 1914980:1-1914980:11 (2018) - 2017
- [j1]Bing Zhang, Guoyan Huang, Haitao He, Jiadong Ren:
Approach to mine influential functions based on software execution sequence. IET Softw. 11(2): 48-54 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint