Bin Zhang(张宾)
Bin Zhang(张宾)
Pengcheng Laboratory, Shen Zhen, China
Verified email at
Cited by
Cited by
Maintaining discrimination and fairness in class incremental learning
B Zhao, X Xiao, G Gan, B Zhang, ST Xia
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2020
Ransomware classification using patch-based CNN and self-attention network on embedded N-grams of opcodes
B Zhang, W Xiao, X Xiao, AK Sangaiah, W Zhang, J Zhang
Future Generation Computer Systems 110, 708-720, 2020
An IoT honeynet based on multiport honeypots for capturing IoT attacks
W Zhang, B Zhang, Y Zhou, H He, Z Ding
IEEE Internet of Things Journal 7 (5), 3991-3999, 2019
Internet 流量模型分析与评述
张宾, 杨家海, 吴建平
软件学报 1, 2011
Exploiting unintended property leakage in blockchain-assisted federated learning for intelligent edge computing
M Shen, H Wang, B Zhang, L Zhu, K Xu, Q Li, X Du
IEEE Internet of Things Journal 8 (4), 2265-2275, 2020
DGA domain name classification method based on long short-term memory with attention mechanism
Y Qiao, B Zhang, W Zhang, AK Sangaiah, H Wu
Applied sciences 9 (20), 4205, 2019
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets
X Xiao, W Xiao, D Zhang, B Zhang, G Hu, Q Li, S Xia
Computers & Security 108, 102372, 2021
A consortium blockchain-based access control framework with dynamic orderer node selection for 5G-enabled industrial IoT
Y Feng, W Zhang, X Luo, B Zhang
IEEE Transactions on Industrial Informatics 18 (4), 2840-2848, 2021
PCA-subspace method—Is it good enough for network-wide anomaly detection
B Zhang, J Yang, J Wu, D Qin, L Gao
2012 IEEE Network Operations and Management Symposium, 359-367, 2012
AMIR: Another multipath interdomain routing
D Qin, J Yang, Z Liu, H Wang, B Zhang, W Zhang
2012 IEEE 26th International Conference on Advanced Information Networking …, 2012
IP traffic classification based on machine learning
D Qin, J Yang, J Wang, B Zhang
2011 IEEE 13th International Conference on Communication Technology, 882-886, 2011
ALBFL: A novel neural ranking model for software fault localization via combining static and dynamic features
X Xiao, Y Pan, B Zhang, G Hu, Q Li, R Lu
Information and Software Technology 139, 106653, 2021
文坤, 杨家海, 张宾
软件学报 25 (3), 591-605, 2013
Mbst: detecting packet-level traffic anomalies by feature stability
B Zhang, J Yang, J Wu, Z Wang
The Computer Journal 56 (10), 1176-1188, 2013
Differentially private convolutional neural networks with adaptive gradient descent
X Huang, J Guan, B Zhang, S Qi, X Wang, Q Liao
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC …, 2019
Multipath interdomain routing via deviation from primary path
D Qin, J Yang, H Wang, B Zhang, L Gao, Z Liu
The International Conference on Information Network 2012, 222-227, 2012
SAMLDroid: a static taint analysis and machine learning combined high-accuracy method for identifying android apps with location privacy leakage risks
G Hu, B Zhang, X Xiao, W Zhang, L Liao, Y Zhou, X Yan
Entropy 23 (11), 1489, 2021
Malware classification method based on word vector of bytes and multilayer perception
Y Qiao, B Zhang, W Zhang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
What's going on in Chinese IPv6 world
L Gao, J Yang, H Zhang, D Qin, B Zhang
2012 IEEE Network Operations and Management Symposium, 534-537, 2012
Diagnosing traffic anomalies using a two-phase model
B Zhang, JH Yang, JP Wu, YW Zhu
Journal of Computer Science and Technology 27 (2), 313-327, 2012
The system can't perform the operation now. Try again later.
Articles 1–20