2008 |
19 | EE | Zonghua Zhang,
Farid Naït-Abdesselam,
Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
ARES 2008: 352-359 |
18 | EE | Zonghua Zhang,
Ruo Ando,
Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster.
Inscrypt 2008: 348-369 |
17 | EE | Haibo Zhang,
Hong Shen,
Yawen Chen,
Zonghua Zhang:
Balancing energy consumption for uniform data gathering wireless sensor networks.
PODC 2008: 436 |
16 | EE | Zonghua Zhang,
Farid Naït-Abdesselam,
Xiaodong Lin,
Pin-Han Ho:
A model-based semi-quantitative approach for evaluating security of enterprise networks.
SAC 2008: 1069-1074 |
15 | EE | Zonghua Zhang,
Farid Naït-Abdesselam,
Pin-Han Ho,
Xiaodong Lin:
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
WCNC 2008: 2621-2626 |
14 | EE | Pin-Han Ho,
Zonghua Zhang,
Rongxing Lu:
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Security and Communication Networks 1(3): 191-193 (2008) |
13 | EE | Soufiene Djahel,
Farid Naït-Abdesselam,
Zonghua Zhang,
Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks.
Security and Communication Networks 1(3): 245-258 (2008) |
2007 |
12 | EE | Zonghua Zhang,
Hong Shen:
Constructing a Multilayered Boundary to Defend against Intrusive Anomalies.
IEICE Transactions 90-D(2): 490-499 (2007) |
11 | EE | Zonghua Zhang,
Nikolaus F. Troje:
3D Periodic Human Motion Reconstruction from 2D Motion Sequences.
Neural Computation 19(5): 1400-1421 (2007) |
2006 |
10 | EE | Zonghua Zhang,
Pin-Han Ho,
Xiaodong Lin,
Hong Shen:
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.
ICISC 2006: 136-154 |
2005 |
9 | EE | Zonghua Zhang,
Hong Shen:
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator.
DSN 2005: 118-127 |
8 | EE | Zonghua Zhang,
Hong Shen:
Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts.
ICN (2) 2005: 989-996 |
7 | EE | Zonghua Zhang,
Hong Shen:
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.
ISPEC 2005: 178-191 |
6 | EE | Yingpeng Sang,
Hong Shen,
Zonghua Zhang:
An Efficient Protocol for the Problem of Secure Two-party Vector Dominance.
PDCAT 2005: 488-492 |
5 | EE | Zonghua Zhang,
Hong Shen,
Xavier Défago,
Yingpeng Sang:
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security.
PDCAT 2005: 493-497 |
4 | EE | Zonghua Zhang,
Hong Shen:
Application of online-training SVMs for real-time intrusion detection with different considerations.
Computer Communications 28(12): 1428-1442 (2005) |
3 | EE | Zonghua Zhang,
Nikolaus F. Troje:
View-independent person identification from human gait.
Neurocomputing 69(1-3): 250-256 (2005) |
2004 |
2 | EE | Zonghua Zhang,
Hong Shen:
Online Training of SVMs for Real-time Intrusion Detection.
AINA (1) 2004: 568-573 |
1 | EE | Zonghua Zhang,
Hong Shen:
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method.
EEE 2004: 163-166 |