


default search action
Xinran Zheng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j9]Wenyi Xie
, Jianchen Li, Yi Mu, Hanyu Zhang, Shiwen Zhao
, Xinran Zheng, Karissa Song
:
The Power of Personalized Datasets: Advancing Chinese Composition Writing for Elementary School through Targeted Model Fine-Tuning. Int. J. Asian Lang. Process. 35(2): 2450017:1-2450017:19 (2025)
[j8]Shuo Yang
, Xinran Zheng, Jinze Li
, Jinfeng Xu
, Xinchen Zhang
, Edith C. H. Ngai
:
Self-Supervised Adaptation Method to Concept Drift for Network Intrusion Detection. IEEE Trans. Dependable Secur. Comput. 22(6): 7632-7646 (2025)
[c13]Rujie Ma, Xinran Zheng, Shuo Yang, Xingjun Wang:
FLB: A Novel Video-on-Demand Broadcasting Scheme Over Channel Limitation. BMSB 2025: 1-6
[c12]Yangning Li, Yinghui Li, Xinyu Wang, Yong Jiang, Zhen Zhang, Xinran Zheng, Hui Wang, Hai-Tao Zheng, Fei Huang, Jingren Zhou, Philip S. Yu:
Benchmarking Multimodal Retrieval Augmented Generation with Dynamic VQA Dataset and Self-adaptive Planning Agent. ICLR 2025
[c11]Yiling He
, Hongyu She
, Xingzhi Qian
, Xinran Zheng
, Zhuo Chen
, Zhan Qin
, Lorenzo Cavallaro
:
On Benchmarking Code LLMs for Android Malware Analysis. ISSTA Companion 2025: 153-160
[c10]Xingzhi Qian, Xinran Zheng, Yiling He, Shuo Yang, Lorenzo Cavallaro
:
LAMD: Context-Driven Android Malware Detection and Classification with LLMs. SP (Workshops) 2025: 126-136
[i12]Xinran Zheng, Shuo Yang, Edith C. H. Ngai, Suman Jana, Lorenzo Cavallaro:
Learning Temporal Invariance in Android Malware Detectors. CoRR abs/2502.05098 (2025)
[i11]Xingzhi Qian, Xinran Zheng, Yiling He, Shuo Yang, Lorenzo Cavallaro:
LAMD: Context-driven Android Malware Detection and Classification with LLMs. CoRR abs/2502.13055 (2025)
[i10]Yiling He, Hongyu She, Xingzhi Qian, Xinran Zheng, Zhuo Chen, Zhan Qin, Lorenzo Cavallaro:
On Benchmarking Code LLMs for Android Malware Analysis. CoRR abs/2504.00694 (2025)
[i9]Shuo Yang, Yuqin Dai, Guoqing Wang, Xinran Zheng, Jinfeng Xu, Jinze Li, Zhenzhe Ying, Weiqiang Wang, Edith C. H. Ngai:
RealFactBench: A Benchmark for Evaluating Large Language Models in Real-World Fact-Checking. CoRR abs/2506.12538 (2025)
[i8]Shuo Yang, Xinran Zheng, Jinfeng Xu, Jinze Li, Danyang Song, Zheyu Chen, Edith C. H. Ngai:
Generative AI for Vulnerability Detection in 6G Wireless Networks: Advances, Case Study, and Future Directions. CoRR abs/2506.20488 (2025)
[i7]Shuo Yang, Xinran Zheng, Xinchen Zhang, Jinfeng Xu, Jinze Li, Donglin Xie, Weicai Long, Edith C. H. Ngai:
Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions. CoRR abs/2507.04752 (2025)
[i6]Xinran Zheng, Xingzhi Qian, Yiling He, Shuo Yang, Lorenzo Cavallaro:
Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing. CoRR abs/2509.14335 (2025)
[i5]Xinran Zheng, Leonardo Massai, Massimo Franceschetti, Behrouz Touri:
U-centrality: A Network Centrality Measure Based on Minimum Energy Control for Laplacian Dynamics. CoRR abs/2511.00339 (2025)
[i4]Yiling He, Junchi Lei, Hongyu She, Shuo Shao, Xinran Zheng, Yiping Liu, Zhan Qin, Lorenzo Cavallaro:
Retrofit: Continual Learning with Bounded Forgetting for Security Applications. CoRR abs/2511.11439 (2025)- 2024
[j7]Xinran Zheng
, Tara Javidi
, Behrouz Touri
:
A General Framework for Approximate and Delayed Gradient Descent for Decomposable Cost Functions. IEEE Control. Syst. Lett. 8: 1229-1234 (2024)
[j6]Yi Zhang
, Xinran Zheng:
Further remarks on absorbing Markov decision processes. Oper. Res. Lett. 57: 107191 (2024)
[j5]Fahong Zhang, Chen Yang
, Rui Zong
, Xinran Zheng, Jianfei Wang
, Yishuo Meng
:
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm. IEEE Trans. Inf. Forensics Secur. 19: 2258-2272 (2024)
[j4]Linjie Nie
, Shuo Yang, Xinran Zheng, Xingjun Wang
:
An Efficient and Adaptive Content Delivery System Based on Hybrid Network. ACM Trans. Knowl. Discov. Data 18(2): 904-915 (2024)
[c9]Shuo Yang
, Xinran Zheng
, Jinze Li
, Jinfeng Xu
, Edith C. H. Ngai
:
Multi-Scale Contrastive Attention Representation Learning for Encrypted Traffic Classification. CIKM 2024: 4173-4177
[c8]Wenyi Xie, Jiachen Li, Yi Mu, Hanyu Zhang, Shiwen Zhao, Xinran Zheng:
The Power of Personalized Datasets: Advancing Chinese Composition Writing for Elementary School through Targeted Model Fine-Tuning. IALP 2024: 344-349
[c7]Shuo Yang
, Xinran Zheng
, Jinze Li
, Jinfeng Xu
, Xingjun Wang
, Edith C. H. Ngai
:
ReCDA: Concept Drift Adaptation with Representation Enhancement for Network Intrusion Detection. KDD 2024: 3818-3828
[c6]Wenhui Kong, Pengfei Wen, Xinran Zheng, Shuo Yang, Ning Hu, Xingjun Wang:
An Efficient (t, n) Threshold Authentication Scheme for Vehicular Ad Hoc Networks. WCNC 2024: 1-6
[c5]Biao Zhang, Shuo Yang, Xinran Zheng, Xingjun Wang:
STCA: Stacked Token-based Continuous Authentication Protocol for Zero Trust IoT. WCNC 2024: 1-6
[i3]Yangning Li, Yinghui Li, Xinyu Wang, Yong Jiang, Zhen Zhang, Xinran Zheng, Hui Wang, Hai-Tao Zheng, Pengjun Xie, Philip S. Yu, Fei Huang, Jingren Zhou:
Benchmarking Multimodal Retrieval Augmented Generation with Dynamic VQA Dataset and Self-adaptive Planning Agent. CoRR abs/2411.02937 (2024)- 2023
[j3]Shuo Yang, Xinran Zheng
, Guining Liu
, Xingjun Wang:
IBA: A secure and efficient device-to-device interaction-based authentication scheme for Internet of Things. Comput. Commun. 200: 171-181 (2023)
[j2]Xinran Zheng
, Tara Javidi
, Behrouz Touri
:
Zeroth-Order Non-Convex Optimization for Cooperative Multi-Agent Systems With Diminishing Step Size and Smoothing Radius. IEEE Control. Syst. Lett. 7: 2785-2790 (2023)
[c4]Shiyang Wang, Xinran Zheng, Shuo Yang, Xingjun Wang:
Towards Efficient Blockchain-Based Cross-Domain Trust Reputation Management for LS-HetNet. GLOBECOM 2023: 5129-5134
[c3]Xinran Zheng, Shuo Yang, Xingjun Wang:
SF-IDS: An Imbalanced Semi-Supervised Learning Framework for Fine-Grained Intrusion Detection. ICC 2023: 2988-2993
[c2]Shuo Yang, Xinran Zheng, Zhengzhuo Xu, Xingjun Wang:
A Lightweight Approach for Network Intrusion Detection Based on Self-Knowledge Distillation. ICC 2023: 3000-3005
[c1]Xinran Zheng, Shuo Yang, Xingjun Wang:
A Reliable and Decentralized Trust Management Model for Fog Computing in Industrial IoT. NOMS 2023: 1-6
[i2]Shuo Yang, Xinran Zheng, Zhengzhuo Xu, Xingjun Wang:
A Lightweight Approach for Network Intrusion Detection based on Self-Knowledge Distillation. CoRR abs/2307.10191 (2023)
[i1]Xinran Zheng, Shuo Yang, Xingjun Wang:
SF-IDS: An Imbalanced Semi-Supervised Learning Framework for Fine-grained Intrusion Detection. CoRR abs/2308.00542 (2023)
2010 – 2019
- 2018
[j1]Rui Li
, Pengcheng Wang, Xinran Zheng, Bo Wang
:
New benchmark solutions for free vibration of clamped rectangular thick plates and their variants. Appl. Math. Lett. 78: 88-94 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-10 23:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







