Zixuan Zhao

ORCID: 0009-0007-1624-1510
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Topological and Geometric Data Analysis
  • IoT and Edge/Fog Computing
  • Complex Network Analysis Techniques
  • Advanced Sensor and Energy Harvesting Materials
  • Blockchain Technology Applications and Security
  • Smart Cities and Technologies
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Security and Verification in Computing
  • Software-Defined Networks and 5G
  • Video Surveillance and Tracking Methods
  • Network Time Synchronization Technologies
  • Tactile and Sensory Interactions
  • Polydiacetylene-based materials and applications
  • Cybercrime and Law Enforcement Studies
  • Hand Gesture Recognition Systems
  • Electric Vehicles and Infrastructure
  • Radiomics and Machine Learning in Medical Imaging
  • Graph theory and applications
  • Wireless Body Area Networks
  • Geometric and Algebraic Topology
  • Educational Technology and Pedagogy
  • Software Testing and Debugging Techniques

East China University of Science and Technology
2024

Chongqing University
2024

Xi’an Jiaotong-Liverpool University
2024

Hubei Normal University
2024

Beihang University
2023-2024

University of Newcastle Australia
2023

Newcastle University
2023

China Electric Power Research Institute
2023

Beijing Forestry University
2022

Beijing Jiaotong University
2021

Automatic exploit generation is an open challenge. Existing solutions usually explore in depth the crashing paths, i.e., paths taken by proof-of-concept (POC) inputs triggering vulnerabilities, and generate exploits when exploitable states are found along paths. However, do not always exist Moreover, existing heavily rely on symbolic execution scalable path exploration generation. In addition, few could heap-based vulnerabilities. this paper, we propose a new solution revery to search for...

10.1145/3243734.3243847 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

The Fermat problem is a crucial topological issue corresponding to fractal networks. In this paper, we discuss the average distance (AFD) of Vicsek polygon network and analyze structural properties. We construct based on in an iterative way. Given structure network, present elaborate analysis point under various situations. special allows way calculate AFD geodesic (AGD). Moreover, introduce its AGD AFD. Its relationship with enables us deduce above two indices directly. results show that...

10.1142/s0218348x23501177 article EN Fractals 2023-01-01

In a multi-camera system, matching the same pedestrian across different camera views is challenging problem. Pedestrian detection and ReIDentification (ReID) plays an important role in preventing traffic accidents involving pedestrians, for both conventional autonomous vehicles. To best of our knowledge, there no existing work which addresses problem ReID typical vehicle setting, where equipped with 360° surround-view fisheye cameras. this paper, we propose deep learning Seeing Pedestrians...

10.1109/ijcnn52387.2021.9533301 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18

With the continuous further development of education informatization in our country, present way and spreading knowledge have changed gradually, which has caused innovation teaching mode, method learning method. In information environment, as an important resource implementation process, digital resources become focus basic schools gradually. Schools begun to explore construction high-quality with their own characteristics, so promote reform schools. order effective measures effects...

10.1051/shsconf/202315702022 article EN cc-by SHS Web of Conferences 2023-01-01

As Large Language Models (LLMs) of Prompt Jailbreaking are getting more and attention, it is great significance to raise a generalized research paradigm evaluate attack strengths basic model conduct subtler experiments. In this paper, we propose novel approach by focusing on set target questions that inherently sensitive jailbreak prompts, aiming circumvent the limitations posed enhanced LLM security. Through designing analyzing these questions, paper reveals effective method identifying...

10.48550/arxiv.2404.08309 preprint EN arXiv (Cornell University) 2024-04-12

10.1109/iaeac59436.2024.10503599 article EN 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ) 2024-03-15

In this paper, we investigate the average geodesic distance on Sierpiński torus networks. We construct networks based classic carpet in an iterative way. By applying finite patterns integrals, deduce exact value of torus. Furthermore, asymptotic formula for corresponding can be obtained.

10.1142/s0218348x24501408 article EN Fractals 2024-10-07

10.1109/ictech63197.2024.00082 article EN 2022 11th International Conference of Information and Communication Technology (ICTech)) 2024-04-12

K-means and Gaussian mixture model (GMM) clustering, as dictionary learning procedures, lie at the heart of BoW (BoW) framework. With data scale increasing, it urgently requires efficient ways to realize these processes. In this paper, we present some new approaches calculate k-means, GMM MAP algorithms, which can be effectively accelerated by GPU, multicore CPU. The speed-up is empowered matrix-based operations, show that three procedures concisely reformulated into matrix multiplications,...

10.1109/bigmm.2018.8499099 article EN 2018-09-01

The traditional Internet uses the best-effort method to deliver, so there are problems with high packet loss rate, low throughput and large jitter. emergence of Deterministic Networking has brought new ideas alleviate these problems. This paper proposes a service protection mechanism based on p4 platform jitter in communication process. transmits packets through different paths, receiver will judge eliminate duplicate after receiving packets, thereby realizing rapid fault switching. Packets...

10.1109/ictc51749.2021.9441592 article EN 2021-05-07

Some Internet applications require the network to provide necessary low-latency performance. However, in traditional IP networks, protocols such as RIP and OSPF cannot flexible services.Currently, there are mainly two methods achieve services.The first is reserve resources for target traffic, which fully use resources. The second gating mechanism. schedule complicated calculate requires clock synchronization with high precision, so it used specific scenarios. To improve latency performance...

10.1145/3456415.3456444 article EN 2021-02-25

Cascading event detection is essential for situational awareness and the secure operation of distribution networks. In this paper, based on high-dimensional factor models (HDFMs), an approach proposed decomposition spatial localization cascading events. The HDFM divides raw online monitoring data into factors (spikes, indicating signals) residuals (a bulk, noises or normal fluctuations). estimated number employed as indicator to detect occurrence subevents. addition, autoregressive rate...

10.1109/acpee56931.2023.10135784 article EN 2022 7th Asia Conference on Power and Electrical Engineering (ACPEE) 2023-04-01

Internet of things is a new generation information technology and an important part the industry.It another leap-forward development.The most direct application Things wireless sensor network.The communication network needs support basic protocol.This paper analyzes summarizes advantages disadvantages transmission based on analysis current protocols.

10.2991/meita-16.2017.10 article EN cc-by-nc 2017-01-01

Multi-round dialogue is one of the most practical techniques in natural language processing. The current multi-round systems generally suffer from contextual information loss and lack diversity generated answers. Therefore, we propose a model based on Sequicity. We use gate recurrent unit (GRU) to encode question, response previous sentence semantic slot information. Then, encoding results are fed into context encoder generate During training procedure, two encoders input recognition...

10.1109/icccs55155.2022.9846540 article EN 2022 7th International Conference on Computer and Communication Systems (ICCCS) 2022-04-22
Coming Soon ...