Zhenyu Zhong

Learn More
While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. First and foremost, since emails may contain confidential information, any collaborative anti-spam approach has to guarantee(More)
While the concept of collaboration provides a natural defense against massive spam e-mails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. First and foremost, since e-mails may contain confidential information, any collaborative anti-spam approach has to guarantee(More)
Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain(More)
Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce the volume of spam messages being generated. In this paper, we present a system that dynamically throttles emails based on the message content at the email server provider (ESP)(More)
When hundreds of thousands of applications need to be analyzed within a short period of time, existing static and dynamic malware detection methods may become less desirable because they could quickly exhaust system and human resources. Additionally, many behavioral malware detection methods may not be practical because they require the collection of(More)
Statistical-based Bayesian filters have become a popular and important defense against spam. However, despite their effectiveness, their greater processing overhead can prevent them from scaling well for enterprise level mail servers. For example, the dictionary lookups that are characteristic of this approach are limited by the memory access rate,(More)
As large energy consumers, base stations need energy-efficient wireless access networks. An advanced energy efficiency measure was developed in this paper, considering throughput, the number of served users, and actual coverage area. The actual coverage area considered in the proposed measure is also in harmony with the measured network coverage area(More)
The delay and bandwidth are the two most fundamental factors in the network. In the delay and bandwidth constrained circumstances, we present a problem of maximizing the number of nodes and then prove the problem is NP-complete. Next, we propose a comprehensive evaluation of delay and bandwidth heuristic algorithm. According to the heuristic algorithm,(More)
  • 1