No one can escape: A general approach to detect tampered and generated image K Zhang, Y Liang, J Zhang, Z Wang, X Li IEEE Access 7, 129494-129503, 2019 | 21 | 2019 |
A real-time automatic detection of phishing URLs J Zhang, Y Wang Proceedings of 2012 2nd International Conference on Computer Science and …, 2012 | 21 | 2012 |
A malicious URL detection model based on convolutional neural network Z Wang, X Ren, S Li, B Wang, J Zhang, T Yang Security and Communication Networks 2021, 1-12, 2021 | 19 | 2021 |
Honeynet construction based on intrusion detection Z Wang, G Li, Y Chi, J Zhang, Q Liu, T Yang, W Zhou Proceedings of the 3rd International Conference on Computer Science and …, 2019 | 17 | 2019 |
Efficient and provable security searchable asymmetric encryption in the cloud J Zhang, C Song, Z Wang, T Yang, W Ma IEEE Access 6, 68384-68393, 2018 | 16 | 2018 |
Security of medical cyber-physical systems: an empirical study on imaging devices Z Wang, P Ma, X Zou, J Zhang, T Yang IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 14 | 2020 |
A prior-based transfer learning method for the phishing detection J Zhang, Y Ou, D Li, Y Xin Journal of Networks 7 (8), 1201, 2012 | 14 | 2012 |
Android malware detection based on convolutional neural networks Z Wang, G Li, Y Chi, J Zhang, T Yang, Q Liu Proceedings of the 3rd International Conference on Computer Science and …, 2019 | 12 | 2019 |
DICOM-Fuzzer: Research on DICOM vulnerability mining based on Fuzzing technology Z Wang, Q Li, Q Liu, B Liu, J Zhang, T Yang, Q Liu Communications and Networking: 14th EAI International Conference, ChinaCom …, 2020 | 10 | 2020 |
Medical protocol security: DICOM vulnerability mining based on fuzzing technology Z Wang, Q Li, Y Wang, B Liu, J Zhang, Q Liu Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 10 | 2019 |
DGA and DNS covert channel detection system based on machine learning Z Wang, H Dong, Y Chi, J Zhang, T Yang, Q Liu Proceedings of the 3rd International Conference on Computer Science and …, 2019 | 10 | 2019 |
URL based gateway side phishing detection method J Zhang, Y Pan, Z Wang, B Liu 2016 IEEE Trustcom/BigDataSE/ISPA, 268-275, 2016 | 10 | 2016 |
Secure medical data collection via local differential privacy Z Wang, P Ma, R Wang, J Zhang, Y Chi, Y Ma, T Yang 2018 IEEE 4th International Conference on Computer and Communications (ICCC …, 2018 | 9 | 2018 |
Parsing and detecting phishing pages based on semantic understanding of text J Zhang, Q Li, Q Wang, T Geng, X Ouyang, Y Xin Journal of Information &Computational Science 9 (6), 1521-1534, 2012 | 9 | 2012 |
Long-term preservation of myocardial energetic in chronic hibernating myocardium MN Jameel, Q Li, A Mansoor, Q Xiong, C Swingen, J Zhang American Journal of Physiology-Heart and Circulatory Physiology 300 (3 …, 2011 | 9 | 2011 |
Medical devices are at risk: Information security on diagnostic imaging system Z Wang, P Ma, Y Chi, J Zhang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 8 | 2018 |
Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm Z Wang, H Dong, Y Chi, J Zhang, T Yang, Q Liu Proceedings of the 9th International Conference on Computer Engineering and …, 2021 | 7 | 2021 |
Effective metabolic approaches for the energy starved failing heart: bioenergetic resiliency via redundancy or something Else? J Zhang, ED Abel Circulation research 123 (3), 329-331, 2018 | 6 | 2018 |
基于区块链的可监管数字货币模型 张健毅, 王志强, 徐治理, 欧阳雅菲, 杨涛 计算机研究与发展 55 (10), 2219-2232, 2018 | 6 | 2018 |
An content-analysis based large scale anti-phishing gateway J Zhang, C Wu, H Guan, Q Wang, L Zhang, Y Ou, Y Xin, L Chen 2010 IEEE 12th International Conference on Communication Technology, 979-982, 2010 | 5 | 2010 |