Xiaosong Zhang

ORCID: 0000-0001-9028-9562
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • Wireless Communication Security Techniques
  • Adversarial Robustness in Machine Learning
  • Surface Modification and Superhydrophobicity
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Icing and De-icing Technologies
  • Digital Media Forensic Detection
  • Cryptographic Implementations and Security
  • Building Energy and Comfort Optimization
  • Organic Light-Emitting Diodes Research
  • Space Satellite Systems and Control
  • Privacy-Preserving Technologies in Data
  • Security and Verification in Computing
  • Quantum-Dot Cellular Automata
  • Fluid Dynamics and Thin Films
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Security in Wireless Sensor Networks
  • Geothermal Energy Systems and Applications
  • Spacecraft Dynamics and Control
  • Cybersecurity and Cyber Warfare Studies
  • High voltage insulation and dielectric phenomena

Tangshan College
2020

University of Electronic Science and Technology of China
2019

Beijing Institute of Technology
2017-2018

Southeast University
2011-2016

Covert channels represent unforeseen communication methods that exploit authorized overt as the carrier medium for covert messages. can be a secure and effective means of transmitting confidential information hidden in traffic. For timing channel, message is usually modulated into inter-packet delays (IPDs) legitimate traffic, which not suitable voice over LTE (VoLTE) since IPDs VoLTE traffic are fixed to lose possibility being modulated. this reason, we propose channel via adjusting silence...

10.1109/access.2018.2802783 article EN cc-by-nc-nd IEEE Access 2018-01-01

Various security threats have prompted covert timing channels to become an important alternative for the transmission of confidential information in untrusted Internet Things (IoT). This article aims demonstrate susceptibility IoT over mobile networks. It presents system model a channel and then analyzes whether traditional based on inter-packet delays apply 4G/5G Given that there are so many proposed computer networks, we investigate different kinds construction approaches illustrate...

10.1109/mwc.2017.1800062 article EN IEEE Wireless Communications 2018-12-01

Voice over Long-Term Evolution enables reliable transmission among enormous Internet of Things devices, by providing end-to-end quality service for protocol–based services such as audio, video, and multimedia messaging. The research covert timing channels aims at transmitting message stealthily to the receiver using variations behavior. Existing approaches mainly modulate into inter-packet delays overt traffic, which are not suitable Evolution, since most traffic regular distribution, any...

10.1177/1550147718779568 article EN cc-by International Journal of Distributed Sensor Networks 2018-05-01

Wireless communication is the most important carrier for covert channels because increasing security threats have made an alternative to transmitting confidential information in untrusted wireless communications. As a solution next-generation mobile communication, voice over LTE (VoLTE) developed using high-speed packet-switched core network provide high-quality end-to-end services. Unlike traditional circuit-switched technologies, both inter-packet delays and packet orders VoLTE traffic are...

10.1109/mwc.001.1900431 article EN IEEE Wireless Communications 2020-06-01

In the existing network covert channel research, transmission of secret messages is one-way, lacking confirmation feedback on whether message successfully accepted. However, voice over LTE (VoLTE) has real-time interactive features, and data packets between sender receiver are transmitted in both directions, which facilitates construction a two-way with feedback. Therefore, we propose VoLTE adaptive to mobile environment, includes sender-to-receiver timing that modulates through actively...

10.1109/access.2019.2937969 article EN cc-by IEEE Access 2019-01-01

Covert communication in this regard has been widely used for protecting the secrecy of communication. Voice over Long Term Evolution (VoLTE) is a packet-switched core network solution high-speed and high-quality end-to-end services which usually applied to between intelligent systems. However, covert channels using inter-packet delays packet order VoLTE are limited by specific rules. Since minor modifications overt traffic can be detected, existing channel solutions cannot directly VoLTE....

10.1002/int.22868 article EN International Journal of Intelligent Systems 2022-03-07

Mobile device forensics is an interdisciplinary field consisting of techniques applied to a wide range computing devices. Android devices are among the most disruptive technologies last years, gaining even more diffusion and success in daily life people categories. became important forensic due rich amount personal information they store. However, tools often used acquire privacy by attackers. This papar presents anti-forensics approach for which protects AES keys from being acquired tools....

10.1109/cse-euc.2017.45 article EN 2017-07-01

Recent studies have highlighted audio adversarial examples as a ubiquitous threat to state-of-the-art automatic speech recognition systems. Thorough on how effectively generate are essential prevent potential attacks. Despite many research this, the efficiency and robustness of existing works not yet satisfactory. In this paper, we propose~\textit{weighted-sampling examples}, focusing numbers weights distortion reinforce attack. Further, apply denoising method in loss function make attack...

10.48550/arxiv.1901.10300 preprint EN other-oa arXiv (Cornell University) 2019-01-01
Coming Soon ...