Yunchun Zhang

ORCID: 0000-0001-9738-4802
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Adversarial Robustness in Machine Learning
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Natural Language Processing Techniques
  • Digital Media Forensic Detection
  • Topic Modeling
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Neural Network Applications
  • Multimodal Machine Learning Applications
  • Brain Tumor Detection and Classification
  • Advanced Image Fusion Techniques
  • Cryptography and Data Security
  • UAV Applications and Optimization
  • Advanced Software Engineering Methodologies
  • Cloud Computing and Resource Management
  • Data Management and Algorithms
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Network Packet Processing and Optimization
  • Digital and Cyber Forensics
  • Remote-Sensing Image Classification
  • Caching and Content Delivery

Yunnan University
2012-2024

Kunming University of Science and Technology
2011

10.1007/s11416-021-00378-y article EN Journal of Computer Virology and Hacking Techniques 2021-03-10

Deep-learning-based malware-detection models are threatened by adversarial attacks. This paper designs a robust and secure convolutional neural network (CNN) for malware classification. First, three CNNs with different pooling layers, including global average (GAP), max (GMP), spatial pyramid (SPP), proposed. Second, we designed an executable attack to construct changing the meaningless unimportant segments within Portable Executable (PE) header file. Finally, consolidate GMP-based CNN,...

10.3390/electronics13050989 article EN Electronics 2024-03-05

Due to high flexibility and ease of deployment, Unmanned Aerial Vehicle (UAV)-enabled mobile edge computing (MEC) has recently emerged provide services for users meet the demands computing-intensive tasks at edge. However, MEC-server mounted UAV is inappropriate heavy-computation owing limitation energy supply hardware cost, which may make excessively CPU temperature. To tackle this issue, paper considers a UAV-and-basestation (BS) hybrid-assisted MEC network, where hover-fly-hover mode...

10.1109/wcnc55385.2023.10118953 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2023-03-01

Although numerous state-of-the-art deep neural networks have recently been proposed for malware classification, effectively detecting on a large-scale sample set and identifying zero-day or new variants still pose significant challenges. To address this issue, hashing-based classification model is designed identification, including two parts: ResNet50-based hashing retrieval voting-based classification. Specifically, multiple models are developed by extracting the high-layer outputs (feature...

10.1109/jiot.2024.3353250 article EN IEEE Internet of Things Journal 2024-01-12

Although several cloud storage systems have been proposed, most of them can provide highly efficient point queries only because the key-value pairs storing mechanism. For these systems, satisfying complex multi-dimensional means scanning whole dataset, which is inefficient. In this paper, we propose a multidimensional index framework, based on Skip-list and Octree, refer to as Skip-Octree. Using randomized skip list makes hierarchical Octree structure easier implement in system. To support...

10.1186/s13677-016-0060-1 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2016-07-15

A typical stateful (resp. stateless) group key distribution (GKD) protocol is composed of a secret assignment algorithm, and join/leave rekeying algorithms stateless algorithm). Any design flaw in any these could lead to attacks on GKD protocols. We show how two recently-proposed protocols based asymmetric cryptographic primitives suffer from collusion due security flaws either or leave algorithms. variety single-user improvements number Shamir's Secret-Sharing Scheme (SSS) have been put...

10.1093/comjnl/bxw061 article EN The Computer Journal 2016-09-12

Automated essay scoring (AES) gains momentum recently in English-based environment. However, the development of Chinese AES system is slow and fruitless. Many foreign students participate Proficiency Test (HSK) so a HSK automated (HSK AES) high demand. To develop an effective reliable system, this paper proposes three machine learning deep models that take essays as input. We apply Word2vec TF-IDF (term frequency-inverse document frequency) methods to extract important features from original...

10.1145/3443279.3443299 article EN 2020-12-18

With the vast popularity of IoT (Internet-of-Things), cloud computing and edge computing, botnet attacks are flourishing nowadays. Meanwhile, deep learning-powered models widely deployed to secure network applications. However, learning-based detection is a challenging problem due its extensive traffic volume, complex feature engineering lack benchmark dataset for evaluation. aim improving performance detection, this paper firstly designs extraction method by using effective payload from...

10.1109/scset55041.2022.00066 article EN 2022-01-01

Centered around the model of ESDDM, a software evolution process based on behavior interface, and knowledge component classification retrieval evaluation, this paper furthered previous work by proposing reusability evaluation method fuzzy mathematics. The provides an effective way evaluating reusable ability certain during evolution.

10.1109/urke.2012.6319548 article EN 2012-08-01

The adversarial examples show the vulnerability of deep neural networks, which makes attacks widely concerned. However, most attack methods are based on image classification model. In this paper, we use Momentum Iterative Fast Gradient Sign Method (MI-FGSM), stabilize optimization and escape from poor local maxima, to generate Faster R-CNN object detector. We have made some improvements previous detection methods. best current method, Project Descent (PGD) detection, starts a random value,...

10.1145/3447450.3447455 article EN 2020-12-25

10.1007/s12652-023-04522-y article EN Journal of Ambient Intelligence and Humanized Computing 2023-02-02

With the wide popularity of Internet-of-Things (IoT), machine learning-based malware detection systems are incapable being installed on IoT devices due to restricted computing power and resources. To bridging above gap, this paper proposes an integrated deep learning system for based features extracted from network packet, NetFlow samples. By referring models popular in natural language processing domain, 7 neural networks with attention mechanism designed both character-level word-level...

10.1109/nana53684.2021.00059 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2021-10-01

While deep learning models are widely adopted in malware detection, ResNet has been proved to be the most effective model many researches. However, existing models, including ResNet, failed detect packed with satisfactory accuracy. To solve this problem, a neural network framework by optimizing fragmented image and extracting key textual feature patterns is proposed for detection. Each into multiple slices points extraction two point locating algorithms, SIFT (Scale-Invariant Feature...

10.1109/icites53477.2021.9637103 article EN 2021-10-31

Backdoor attacks targeting the deep neural network are flourishing recently and more stealthy because attacked model behaviors normal on clean samples. A understanding of backdoor malware detection models is still missing. We first design a highly transferable attack method different convolutional networks (CNNs) for detection. Based computation most effective byte sub-sequence from samples, trigger patterns generated by training class activation mapping-based (CAM-DNN). The mapping applied...

10.2139/ssrn.4142326 article EN SSRN Electronic Journal 2022-01-01

Many tasks have been solved by deep neural networks in the field of natural language processing (NLP) and generation (NLG). However, some critical issues teaching Chinese as a foreign or second for students are still unsolved. The learning dynamic auxiliary words (le, zhe guo) seldom considered learning-powered applications. Taking three typical inputs, models designed evaluated our work. models, including BERT, BERT-WWM RoBERTa, optimized observing characteristics two corpora. experimental...

10.1109/icnlp55136.2022.00067 article EN 2022 4th International Conference on Natural Language Processing (ICNLP) 2022-03-01
Coming Soon ...