default search action
Ning Zheng 0001
Person information
- affiliation: Hangzhou Dianzi University, School of Cyberspace, China
Other persons with the same name
- Ning Zheng — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Jie Jiang, Yiming Wu, Zhaoming Zhang, Ning Zheng, Wei Meng:
Determining r- and (r, s)-robustness of multiagent networks based on heuristic algorithm. Neurocomputing 598: 128025 (2024) - [j42]Jianxiang Qi, Ning Zheng, Ming Xu, Ping Chen, Wenqiang Li:
A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks. J. Inf. Secur. Appl. 81: 103699 (2024) - [j41]Shengwang Xu, Tong Qiao, Ming Xu, Wei Wang, Ning Zheng:
Robust Adversarial Watermark Defending Against GAN Synthesization Attack. IEEE Signal Process. Lett. 31: 351-355 (2024) - [j40]Chenduo Ying, Ning Zheng, Yiming Wu, Ming Xu, Wen-An Zhang:
Privacy-Preserving Adaptive Resilient Consensus for Multiagent Systems Under Cyberattacks. IEEE Trans. Ind. Informatics 20(2): 1630-1640 (2024) - 2023
- [j39]Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu, Yanli Chen, Ming Xu, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. Comput. Secur. 127: 103102 (2023) - [j38]Tong Qiao, Shengwang Xu, Shuai Wang, Xiaoshuai Wu, Bo Liu, Ning Zheng, Ming Xu, Binmin Pan:
Robust steganography in practical communication: a comparative study. EURASIP J. Image Video Process. 2023(1): 15 (2023) - [j37]Jianxiang Qi, Ning Zheng, Ming Xu, Xiaodong Wang, Yunzhi Chen:
A multi-dimensional trust model for misbehavior detection in vehicular ad hoc networks. J. Inf. Secur. Appl. 76: 103528 (2023) - [j36]Qiuyun Lyu, Hao Li, Zhining Deng, Jingyu Wang, Yizhi Ren, Ning Zheng, Junliang Liu, Huaping Liu, Kim-Kwang Raymond Choo:
A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services. IEEE Trans. Cloud Comput. 11(3): 2546-2561 (2023) - [j35]Li Zhang, Tong Qiao, Ming Xu, Ning Zheng, Shichuang Xie:
Unsupervised Learning-Based Framework for Deepfake Video Detection. IEEE Trans. Multim. 25: 4785-4799 (2023) - [j34]Tong Qiao, Jiasheng Wu, Ning Zheng, Ming Xu, Xiangyang Luo:
FGDNet: Fine-Grained Detection Network Towards Face Anti-Spoofing. IEEE Trans. Multim. 25: 7350-7363 (2023) - 2022
- [j33]Zhiming Xia, Tong Qiao, Ming Xu, Ning Zheng, Shichuang Xie:
Towards DeepFake video forensics based on facial textural disparities in multi-color channels. Inf. Sci. 607: 654-669 (2022) - [j32]Xiaoshuai Wu, Tong Qiao, Yanli Chen, Ming Xu, Ning Zheng, Xiangyang Luo:
Sign steganography revisited with robust domain selection. Signal Process. 196: 108522 (2022) - 2021
- [j31]Song Ge, Ming Xu, Tong Qiao, Ning Zheng:
A novel file carving algorithm for docker container logs recorded by json-file logging driver. Digit. Investig. 39: 301272 (2021) - [j30]Xingchen Zhou, Ming Xu, Yiming Wu, Ning Zheng:
Deep Model Poisoning Attack on Federated Learning. Future Internet 13(3): 73 (2021) - [j29]Yangxin Yu, Ning Zheng, Tong Qiao, Ming Xu, Jiasheng Wu:
Distinguishing between natural and recolored images via lateral chromatic aberration. J. Vis. Commun. Image Represent. 80: 103295 (2021) - [j28]Tong Qiao, Qianru Zhao, Ning Zheng, Ming Xu, Li Zhang:
Geographical position spoofing detection based on camera sensor fingerprint. J. Vis. Commun. Image Represent. 81: 103320 (2021) - [j27]Yuting Du, Tong Qiao, Ming Xu, Ning Zheng:
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation. Secur. Commun. Networks 2021: 6652727:1-6652727:16 (2021) - [j26]Xiaoshuai Wu, Tong Qiao, Ming Xu, Ning Zheng:
Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling. Signal Process. 188: 108200 (2021) - [j25]Shuai Wang, Ning Zheng, Ming Xu:
A Compression Resistant Steganography Based on Differential Manchester Code. Symmetry 13(2): 165 (2021) - 2020
- [j24]Yiming Wu, Ming Xu, Ning Zheng, Xiongxiong He:
Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks. IEEE Access 8: 78121-78129 (2020) - [j23]Qiang Zhang, Ming Xu, Ning Zheng, Tong Qiao, Yaru Wang:
Identifying WeChat Message Types without Using Traditional Traffic. Inf. 11(1): 18 (2020) - [j22]Qiuyun Lyu, Yizhen Qi, Xiaochen Zhang, Huaping Liu, Qiuhua Wang, Ning Zheng:
SBAC: A secure blockchain-based access control framework for information-centric networking. J. Netw. Comput. Appl. 149 (2020) - [j21]Hongwei Yao, Ming Xu, Tong Qiao, Yiming Wu, Ning Zheng:
Image Forgery Detection and Localization via a Reliability Fusion Map. Sensors 20(22): 6668 (2020) - [j20]Jian Xu, Xiaoyi Fu, Yiming Wu, Ming Luo, Ming Xu, Ning Zheng:
Personalized top-n influential community search over large social networks. World Wide Web 23(3): 2153-2184 (2020) - [c44]Dong Wang, Ning Zheng, Ming Xu, Yiming Wu, Qinling Hu, Gangyang Wang:
Resilient Privacy-Preserving Average Consensus for Multi-agent Systems under Attacks. ICARCV 2020: 1399-1405 - [c43]Hao Yuan, Jian Xu, Ning Zheng, Ming Xu, Wei Li, Rujia Shen:
PRPOIR: Exploiting the Region-Level Interest for POI Recommendation. ICTAI 2020: 59-66 - [c42]Qianru Zhao, Ning Zheng, Qing Bao:
Location Spoofing Detection for Social Network Service using Camera Fingerprint. ICVISP 2020: 20:1-20:6
2010 – 2019
- 2019
- [j19]Qiuyun Lyu, Ning Zheng, Huaping Liu, Can Gao, Si Chen, Junliang Liu:
Remotely Access "My" Smart Home in Private: An Anti-Tracking Authentication and Key Agreement Scheme. IEEE Access 7: 41835-41851 (2019) - [j18]Quanqi Liu, Tong Qiao, Ming Xu, Ning Zheng:
Fuzzy Localization of Steganographic Flipped Bits via Modification Map. IEEE Access 7: 74157-74167 (2019) - [j17]Shuling Huang, Ning Zheng, Yiming Wu, Ming Xu:
Resilient Consensus-Based Time Synchronization in Asynchronous Sensor Networks. IEEE Access 7: 115650-115661 (2019) - [j16]Zhiqiang Zhu, Ning Zheng, Tong Qiao, Ming Xu:
Robust Steganography by Modifying Sign of DCT Coefficients. IEEE Access 7: 168613-168628 (2019) - [j15]Mingying Huang, Ming Xu, Tong Qiao, Ting Wu, Ning Zheng:
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images. J. Univers. Comput. Sci. 25(9): 1151-0 (2019) - [j14]Yihua Zhao, Ning Zheng, Tong Qiao, Ming Xu:
Source camera identification via low dimensional PRNU features. Multim. Tools Appl. 78(7): 8247-8269 (2019) - [j13]Yaru Wang, Ning Zheng, Ming Xu, Tong Qiao, Qiang Zhang, Feipeng Yan, Jian Xu:
Hierarchical Identifier: Application to User Privacy Eavesdropping on Mobile Payment App. Sensors 19(14): 3052 (2019) - [j12]Tong Qiao, Ran Shi, Xiangyang Luo, Ming Xu, Ning Zheng, Yiming Wu:
Statistical Model-Based Detector via Texture Weight Map: Application in Re-Sampling Authentication. IEEE Trans. Multim. 21(5): 1077-1092 (2019) - [c41]Guanhua Zhan, Jian Xu, Zhifeng Huang, Qiang Zhang, Ming Xu, Ning Zheng:
A Semantic Sequential Correlation Based LSTM Model for Next POI Recommendation. MDM 2019: 128-137 - [c40]Zhifeng Huang, Jian Xu, Guanhua Zhan, Ning Zheng, Ming Xu, Liming Tu:
Passenger Searching from Taxi Traces Using HITS-Based Inference Model. MDM 2019: 144-149 - [c39]Na Huang, Ming Xu, Ning Zheng, Tong Qiao, Kim-Kwang Raymond Choo:
Deep Android Malware Classification with API-Based Feature Graph. TrustCom/BigDataSE 2019: 296-303 - 2018
- [j11]Hongwei Yao, Tong Qiao, Ming Xu, Ning Zheng:
Robust Multi-Classifier for Camera Model Identification Based on Convolution Neural Network. IEEE Access 6: 24973-24982 (2018) - [c38]Jian Xu, Xiaoyi Fu, Liming Tu, Ming Luo, Ming Xu, Ning Zheng:
Personalized Top-n Influential Community Search over Large Social Networks. APWeb/WAIM (1) 2018: 105-120 - [c37]Chaoping Ding, Ting Wu, Tong Qiao, Ning Zheng, Ming Xu, Yiming Wu, Wenjing Xia:
A Location Spoofing Detection Method for Social Networks (Short Paper). CollaborateCom 2018: 138-150 - [c36]Yang Wu, Jian Xu, Liming Tu, Ming Luo, Zhi Chen, Ning Zheng:
Reverse Collective Spatial Keyword Querying (Short Paper). CollaborateCom 2018: 211-221 - [c35]Jian Xu, Yang Wu, Ning Zheng, Liming Tu, Ming Luo:
Improved Affinity Propagation Clustering for Business Districts Mining. ICTAI 2018: 387-394 - [c34]Dongsheng Zhao, Ning Zheng, Ming Xu, Xue Yang, Jian Xu:
An Improved User Identification Method Across Social Networks Via Tagging Behaviors. ICTAI 2018: 616-622 - [c33]Guang Wang, Ming Xu, Yiming Wu, Ning Zheng, Jian Xu, Tong Qiao:
Using Machine Learning for Determining Network Robustness of Multi-Agent Systems Under Attacks. PRICAI 2018: 491-498 - [c32]Hongbin Liu, Ming Xu, Yiming Wu, Ning Zheng, Yuangfang Chen, Md. Zakirul Alam Bhuiyan:
Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic Interactions. TrustCom/BigDataSE 2018: 1262-1269 - [c31]Feipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng, Kim-Kwang Raymond Choo:
Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic. TrustCom/BigDataSE 2018: 1426-1432 - 2017
- [j10]Kai Shi, Ming Xu, Haoxia Jin, Tong Qiao, Xue Yang, Ning Zheng, Jian Xu, Kim-Kwang Raymond Choo:
A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics. Digit. Investig. 23: 11-21 (2017) - [c30]Haoxia Jin, Ming Xu, Xue Yang, Ting Wu, Ning Zheng, Tao Yang:
An Efficient Black-Box Vulnerability Scanning Method for Web Application. CollaborateCom 2017: 444-455 - [c29]Haidong Ge, Ning Zheng, Lin Cai, Ming Xu, Tong Qiao, Tao Yang, Jinkai Sun, Sudeng Hu:
Adaptive Carving Method for Live FLV Streaming. CollaborateCom 2017: 554-566 - [c28]Yidong Shen, Ming Xu, Ning Zheng, Jian Xu, Wenjing Xia, Yiming Wu, Tong Qiao, Tao Yang:
Android App Classification and Permission Usage Risk Assessment. CollaborateCom 2017: 567-577 - [c27]Lijun Chen, Ming Xu, Xue Yang, Ning Zheng, Yiming Wu, Jian Xu, Tong Qiao, Hongbin Liu:
A Privacy Settings Prediction Model for Textual Posts on Social Networks. CollaborateCom 2017: 578-588 - [c26]Yiming Wu, Ming Xu, Ning Zheng, Xiongxiong He:
Attack tolerant finite-time consensus for multi-agent networks. ICCA 2017: 1010-1014 - [c25]Ming Xu, Jinkai Sun, Ning Zheng, Tong Qiao, Yiming Wu, Kai Shi, Haidong Ge, Tao Yang:
A Novel File Carving Algorithm for EVTX Logs. ICDF2C 2017: 97-105 - [c24]Jian Xu, Jianliang Xu, Guanjie Cao, Haitao Xu, Ming Xu, Ning Zheng:
Towards Optimal Free-of-Charge Trip Planning in Bike-Sharing Systems. MDM 2017: 92-101 - 2016
- [c23]Chong Jiang, Ting Wu, Jian Xu, Ning Zheng, Ming Xu, Tao Yang:
A MapReduce-Based Distributed SVM for Scalable Data Type Classification. CollaborateCom 2016: 115-126 - [c22]Lin Zeng, Ming Xu, Jian Xu, Ning Zheng, Tao Yang:
A Method of Recovering HBase Records from HDFS Based on Checksum File. CollaborateCom 2016: 127-139 - [c21]Enquan Ge, Jian Xu, Ming Xu, Ning Zheng, Youcheng Wang, Jingsheng Jiang:
MCSS: A Model for Car-Sharing System. EDBT/ICDT Workshops 2016 - [c20]Youcheng Wang, Jian Xu, Ming Xu, Ning Zheng, Jingsheng Jiang, Kaiwei Kong:
A feature-based method for traffic anomaly detection. UrbanGIS@SIGSPATIAL 2016: 5:1-5:8 - [c19]Jingsheng Jiang, Chong Xu, Jian Xu, Ming Xu, Ning Zheng, Kaiwei Kong:
Route planning for locations based on trajectory segments. UrbanGIS@SIGSPATIAL 2016: 6:1-6:8 - [c18]Enquan Ge, Jian Xu, Ming Xu, Ning Zheng, Weige Wang, Xinyu Zhang:
Finding Most Frequent Path based on Stratified Urban Roads. GISTAM 2016: 51-60 - [c17]Xinyu Zhang, Ning Zheng, Jian Xu, Ming Xu:
Topic Detection in Group Chat Based on Implicit Reply. PRICAI 2016: 673-680 - [c16]Yao Liu, Ming Xu, Jian Xu, Ning Zheng, Xiaodong Lin:
SQLite Forensic Analysis Based on WAL. SecureComm 2016: 557-574 - 2015
- [j9]Ning Zheng, Chen Tao, Lin Fei, Haitao Xu:
A Hybrid Heuristic Algorithm for the Intelligent Transportation Scheduling Problem of the BRT System. J. Intell. Syst. 24(4): 437-448 (2015) - [c15]Ning Zheng, Jinlong Wang, Ting Wu, Ming Xu:
A Fragment Classification Method Depending on Data Type. CIT/IUCC/DASC/PICom 2015: 1948-1953 - [c14]Ming Xu, Wenbo Zhu, Jian Xu, Ning Zheng:
Towards selecting optimal features for flow statistical based network traffic classification. APNOMS 2015: 479-482 - [c13]Weige Wang, Jian Xu, Ming Xu, Ning Zheng, Enquan Ge:
Probabilistic Group Nearest Neighbors query based on Voronoi diagram. UrbanGIS@SIGSPATIAL 2015: 36-41 - [c12]Lu Ding, Ning Zheng, Jiang Xu, Ming Xu:
An Improved Content-Based Music Recommending Method with Weighted Tags. MMM (1) 2015: 360-371 - 2014
- [j8]Xia Wang, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Location Inferring Model Based on Tweets and Bilateral Follow Friends. J. Comput. 9(2): 315-321 (2014) - [j7]Tantan Xu, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A File Fragment Classification Method Based on Grayscale Image. J. Comput. 9(8): 1863-1870 (2014) - [j6]Ming Xu, Jun Yao, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng, Shiyue Ling:
A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite. J. Comput. 9(10): 2294-2302 (2014) - [j5]Ming Xu, Xiaowei Xu, Jian Xu, Yizhi Ren, Haiping Zhang, Ning Zheng:
A Forensic Analysis Method for Redis Database based on RDB and AOF File. J. Comput. 9(11): 2538-2544 (2014) - [c11]Jie Yang, Jian Xu, Ming Xu, Ning Zheng, Yu Chen:
Predicting next location using a variable order Markov model. IWGS 2014: 37-42 - 2013
- [j4]Ming Xu, Xue Yang, Beibei Wu, Jun Yao, Haiping Zhang, Jian Xu, Ning Zheng:
A metadata-based method for recovering files and file traces from YAFFS2. Digit. Investig. 10(1): 62-72 (2013) - [j3]Shuhui Qi, Ming Xu, Ning Zheng:
A Malware Variant Detection Method Based on Byte Randomness Test. J. Comput. 8(10): 2469-2477 (2013) - [j2]Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, Ning Zheng:
A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1): 35-47 (2013) - [c10]Shenzhu Feng, Jian Xu, Ming Xu, Ning Zheng, Xiaofei Zhang:
EHSTC: an enhanced method for semantic trajectory compression. IWGS 2013: 43-49 - [c9]Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng:
A Recovery Approach for SQLite History Recorders from YAFFS2. ICT-EurAsia 2013: 295-299 - [c8]Fei Kong, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Webmail Reconstructing Method from Windows XP Memory Dumps. MUE 2013: 211-217 - [c7]Ning Zheng, Yixing Wang, Ming Xu:
A LBP-Based Method for Detecting Copy-Move Forgery with Rotation. MUE 2013: 261-267 - 2011
- [c6]Wen Wu, Jian Xu, Ming Xu, Ning Zheng:
An Enhanced Vector-Based Update Algorithm for Network-Constrained Moving Clients. GreenCom 2011: 152-158 - [c5]Haitao Xu, Hao Wu, Wanjun Zhang, Ning Zheng:
Busy stations recognition of Hangzhou public free-bicycle system based on sixth order polynomial smoothing support vector machine. ICMLC 2011: 699-704 - 2010
- [j1]Ming Xu, Hong-Rong Yang, Jian Xu, Ye Xu, Ning Zheng:
An adaptive method to identify disk cluster size based on block content. Digit. Investig. 7(1-2): 48-55 (2010) - [c4]Jian Xu, Z. P. Jin, Ming Xu, Ning Zheng:
Mobile-Aware Anonymous Peer Selecting Algorithm for Enhancing Privacy and Connectivity in Location-Based Service. ICEBE 2010: 172-177 - [c3]Shanhu Shang, Ning Zheng, Jian Xu, Ming Xu, Haiping Zhang:
Detecting malware variants via function-call graph similarity. MALWARE 2010: 113-120
2000 – 2009
- 2008
- [c2]Yongtao Hu, Liang Chen, Ming Xu, Ning Zheng, Yanhua Guo:
Unknown Malicious Executables Detection Based on Run-Time Behavior. FSKD (4) 2008: 391-395 - [c1]Hong-Rong Yang, Ming Xu, Ning Zheng:
An Improved Method for Ranking of Search Results Based on User Interest. NPC Workshops 2008: 132-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint