Hongsong Zhu

ORCID: 0000-0003-3720-7403
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Natural Language Processing Techniques
  • Software Testing and Debugging Techniques
  • Indoor and Outdoor Localization Technologies
  • Text and Document Classification Technologies
  • Security and Verification in Computing
  • Spam and Phishing Detection
  • Vehicular Ad Hoc Networks (VANETs)
  • Information and Cyber Security
  • Advanced Graph Neural Networks
  • Anomaly Detection Techniques and Applications
  • Caching and Content Delivery
  • Software Engineering Research
  • Human Mobility and Location-Based Analysis
  • Context-Aware Activity Recognition Systems
  • Sentiment Analysis and Opinion Mining
  • Advanced Text Analysis Techniques
  • Web Data Mining and Analysis
  • Cybercrime and Law Enforcement Studies

Institute of Information Engineering
2016-2025

Chinese Academy of Sciences
2014-2025

University of Chinese Academy of Sciences
2014-2025

Beihang University
2024-2025

China People's Public Security University
2022

China Information Technology Security Evaluation Center
2015-2016

State Key Laboratory of Information Security
2013

Institute of Software
2005-2011

Shanghai Institute of Optics and Fine Mechanics
2009

Institute of Computing Technology
2006-2008

Extracting entities and relations from unstructured text has attracted increasing attention in recent years but remains challenging, due to the intrinsic difficulty identifying overlapping with shared entities. Prior works show that joint learning can result a noticeable performance gain. However, they usually involve sequential interrelated steps suffer problem of exposure bias. At training time, predict ground truth conditions while at inference it make extraction scratch. This discrepancy...

10.18653/v1/2020.coling-main.138 article EN Proceedings of the 17th international conference on Computational linguistics - 2020-01-01

Abstract The rapid development of large language models (LLMs) has opened new avenues across various fields, including cybersecurity, which faces an evolving threat landscape and demand for innovative technologies. Despite initial explorations into the application LLMs in there is a lack comprehensive overview this research area. This paper addresses gap by providing systematic literature review, covering analysis over 300 works, encompassing 25 more than 10 downstream scenarios. Our three...

10.1186/s42400-025-00361-w article EN cc-by Cybersecurity 2025-02-05

Social engineering has posed a serious security threat to infrastructure, user, data and operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as inconsistent intensions, vague boundary, confusing instances, overgeneralization abuse) the term making negative impacts on understanding, analysis defense social attacks. In this paper, an in-depth literature survey is conducted, original meaning in cybersecurity traced, evolution technical development analysed...

10.1109/access.2020.2992807 article EN cc-by IEEE Access 2020-01-01

Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we yet know regarding what and how lead the success of social attacks. This paper proposes conceptual model which provides an integrative structural perspective describe work. Three core entities (effect mechanism, human vulnerability attack method) are identified help understanding take effect. Then, beyond familiar scope, analyze discuss effect mechanisms involving 6 aspects <italic...

10.1109/access.2021.3051633 article EN cc-by-nc-nd IEEE Access 2021-01-01

Underwater sensor networks are envisioned to enable a wide range of underwater applications such as pollution monitoring, offshore exploration, and oil/gas spill monitoring. Such require precise location information otherwise the sensed data might be meaningless. On other hand, security privacy critical issues typically deployed in harsh environments. Nevertheless, most localization schemes vulnerable many attacks suffer from potential violations they designed for benign However, scheme that...

10.1109/mcom.2015.7321972 article EN IEEE Communications Magazine 2015-11-01

Binary code similarity detection is a fundamental technique for many security applications such as vulnerability search, patch analysis, and malware detection. There an increasing need to detect similar search across architectures with the increase of critical vulnerabilities in IoT devices. The variety hardware software platforms requires capture semantic equivalence fragments However, existing approaches are insufficient capturing similarity. We notice that abstract syntax tree (AST)...

10.1109/dsn48987.2021.00036 preprint EN 2021-06-01

Yucheng Wang, Bowen Yu, Hongsong Zhu, Tingwen Liu, Nan Limin Sun. Proceedings of the 59th Annual Meeting Association for Computational Linguistics and 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers). 2021.

10.18653/v1/2021.acl-long.63 article EN cc-by 2021-01-01

Abstract Social engineering has posed a serious threat to cyberspace security. To protect against social attacks, fundamental work is know what constitutes engineering. This paper first develops domain ontology of in cybersecurity and conducts evaluation by its knowledge graph application. The defines 11 concepts core entities that significantly constitute or affect domain, together with 22 kinds relations describing how these related each other. It provides formal explicit schema...

10.1186/s42400-021-00094-6 article EN cc-by Cybersecurity 2021-08-01

The rapid advancements in large language models (LLMs) have opened new avenues across various fields, including cybersecurity, which faces an ever-evolving threat landscape and need for innovative technologies. Despite initial explorations into the application of LLMs there is a lack comprehensive overview this research area. This paper bridge gap by providing systematic literature review, encompassing analysis over 180 works, spanning 25 more than 10 downstream scenarios. Our addresses...

10.48550/arxiv.2405.03644 preprint EN arXiv (Cornell University) 2024-05-06

Concolic execution follows the paths of concrete inputs, capable generating new inputs for unexplored code by solving negated path constraints. However, implicit flows can hinder concolic execution, reducing coverage. Implicit occur when influence control flow, and flow variation affects values some variables. During preceding selections limit potential these This limitation may result in unsolvable constraints, subsequently restricting generation paths. Our insight is that following same...

10.1145/3712194 article EN ACM Transactions on Software Engineering and Methodology 2025-01-16

Abstract A reasonable construction of hollow structures to obtain high‐performance absorbers is widely studied, but it still a challenge select suitable materials improve the low‐frequency attenuation performance. Here, Fe 3 O 4 @C@NiO nanoprisms with unique tip shapes, asymmetric multi‐path cavity, and core–shell heteroepitaxy structure are designed synthesized based on anisotropy intrinsic physical characteristics. Impressively, by changing load NiO, composites achieve strong absorption,...

10.1002/smll.202410308 article EN Small 2025-01-23

Federated learning is an essential distributed model training technique. However, threats such as gradient inversion attacks and poisoning pose significant risks to the privacy of data correctness. We propose a novel approach called SMTFL achieve secure in federated without relying on trusted participants. To safeguard gradients against attacks, clients are dynamically grouped, allowing one client's be divided obfuscate other within group. This method incorporates checks balances reduce...

10.48550/arxiv.2502.02038 preprint EN arXiv (Cornell University) 2025-02-04

10.1109/icassp49660.2025.10887736 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

The Internet of Things (IoT) has been considered as the third revolution in digital technology after computer and Internet, it brings significant advantages to smart grid. Disaster prediction prevention power-lines is one most difficult problems for electricity transmission companies. Advanced sensing communication technologies IoT can effectively avoid or reduce damage natural disasters power-lines, hence improve reliability stability power transmission. In this paper, a three-layer...

10.1109/cyberc.2012.77 article EN 2012-10-01

Clock synchronization is critical for Wireless Sensor Networks (WSNs) due to the need of inter-node coordination and collaborative information processing. Although many message passing protocols can achieve satisfactory clock accuracy, they incur prohibitively high overhead when network scales more than tens nodes. An alternative approach take advantage global time reference induced by existing infrastructures including GPS, timekeeping radio stations, or power grid. However, consumption...

10.1145/1999995.2000012 article EN 2011-06-28

Greybox fuzzing has become one of the most effective vulnerability discovery techniques. However, greybox techniques cannot be directly applied to applications in IoT devices. The main reason is that executing these highly relies on specific system environments and hardware. To execute Linux-based devices, existing use full-system emulation for purpose maximizing compatibility. compared with user-mode emulation, suffersfrom great overhead. Therefore, some previous works, such as Firm-AFL,...

10.1145/3533767.3534414 article EN 2022-07-15

Although the importance of using static taint analysis to detect taint-style vulnerabilities in Linux-based embedded firmware is widely recognized, existing approaches are plagued by following major limitations: (a) Existing works cannot properly handle indirect call on path from attacker-controlled sources security-sensitive sinks, resulting lots false negatives. (b) They employ heuristics identify mediate source and it not accurate enough, which leads high positives.

10.1145/3597926.3598062 article EN 2023-07-12

10.1016/s1005-8885(13)60002-3 article EN The Journal of China Universities of Posts and Telecommunications 2013-02-01

In the field of Cyber Physical Systems and Pervasive Computing, physical resources web can be easily handled seamlessly integrated into our life. However, due to heterogeneity devices tight coupling individual information systems, developers cannot create their specific applications by combining with resources. this paper, we proposed Rest Thing which is a restful service infrastructure based on REST principles in order hide provide seamless way integrate embedded existing applications....

10.1109/euc.2011.59 article EN 2011-10-01

In recent years, the capacity of cellular networks has hardly kept pace with dramatic explosion traffic from emerging mobile applications. To address this issue, a number studies have been proposed to offload using delay-tolerant (DTNs) opportunistically formed by devices. These off-loading schemes rely on assumption small-size content, which can be entirely transmitted over single DTN contact. However, such an assumption, was probably valid in past, no longer hold increasing popularity...

10.1109/tvt.2014.2381220 article EN IEEE Transactions on Vehicular Technology 2014-12-19
Coming Soon ...