Follow
Zhi Wang
Zhi Wang
Zhongguancun Laboratory
Verified email at zgclab.edu.cn - Homepage
Title
Cited by
Cited by
Year
A novel approach for detecting browser-based silent miner
J Liu, Z Zhao, X Cui, Z Wang, Q Liu
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
512018
Evilmodel: hiding malware inside of neural network models
Z Wang, C Liu, X Cui
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
342021
Evilmodel 2.0: bringing neural network models into malware attacks
Z Wang, C Liu, X Cui, J Yin, X Wang
Computers & Security 120, 102807, 2022
212022
CoinBot: A covert botnet in the cryptocurrency network
J Yin, X Cui, C Liu, Q Liu, T Cui, Z Wang
Information and Communications Security: 22nd International Conference …, 2020
152020
DeepC2: Ai-powered covert command and control on OSNs
Z Wang, C Liu, X Cui, J Yin, J Liu, D Wu, Q Liu
International Conference on Information and Communications Security, 394-414, 2022
12*2022
Wsld: detecting unknown webshell using fuzzy matching and deep learning
Z Zhao, Q Liu, T Song, Z Wang, X Wu
Information and Communications Security: 21st International Conference …, 2020
72020
Malicescript: a novel browser-based intranet threat
C Liu, X Cui, Z Wang, X Wang, Y Feng, X Li
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
62018
Practical metrics for evaluating anonymous networks
Z Wang, J Zhang, Q Liu, X Cui, J Su
Science of Cyber Security: First International Conference, SciSec 2018 …, 2018
32018
C-BEDIM and S-BEDIM: lateral movement detection in enterprise network through behavior deviation measurement
C Dong, J Yang, S Liu, Z Wang, Y Liu, Z Lu
Computers & Security 130, 103267, 2023
22023
Make data reliable: An explanation-powered cleaning on malware dataset against backdoor poisoning attacks
X Wang, C Liu, X Hu, Z Wang, J Yin, X Cui
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
22022
A Systematic Study of AI Applications in Cybersecurity Competitions
F Zhang, X Cui, Z Wang, S Chen, Q Liu, C Liu
2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020
12020
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning
Y Chen, Y Feng, Z Wang, J Zhao, C Wang, Q Liu
ICC 2023-IEEE International Conference on Communications, 790-796, 2023
2023
针对 DDoS 攻击的检测与控制系统
金伟, 崔鸿, 王志, 郭发勤, 汪屹文, 贺帅
网络空间安全 8 (6), 19-22, 2017
2017
Poster: An anonymity metric of anonymous network
J Zhang, Z Wang
Poster: A Web Server Identified Model based on Mean Shift
J Su, Q Liu, Z Wang, X Li
人工智能赋能网络威胁研究进展
王志, 尹捷, 崔翔, 刘奇旭, 刘潮歌, 汪旭童
信息安全学报, 0
The system can't perform the operation now. Try again later.
Articles 1–16