A novel approach for detecting browser-based silent miner J Liu, Z Zhao, X Cui, Z Wang, Q Liu 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 51 | 2018 |
Evilmodel: hiding malware inside of neural network models Z Wang, C Liu, X Cui 2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021 | 34 | 2021 |
Evilmodel 2.0: bringing neural network models into malware attacks Z Wang, C Liu, X Cui, J Yin, X Wang Computers & Security 120, 102807, 2022 | 21 | 2022 |
CoinBot: A covert botnet in the cryptocurrency network J Yin, X Cui, C Liu, Q Liu, T Cui, Z Wang Information and Communications Security: 22nd International Conference …, 2020 | 15 | 2020 |
DeepC2: Ai-powered covert command and control on OSNs Z Wang, C Liu, X Cui, J Yin, J Liu, D Wu, Q Liu International Conference on Information and Communications Security, 394-414, 2022 | 12* | 2022 |
Wsld: detecting unknown webshell using fuzzy matching and deep learning Z Zhao, Q Liu, T Song, Z Wang, X Wu Information and Communications Security: 21st International Conference …, 2020 | 7 | 2020 |
Malicescript: a novel browser-based intranet threat C Liu, X Cui, Z Wang, X Wang, Y Feng, X Li 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 6 | 2018 |
Practical metrics for evaluating anonymous networks Z Wang, J Zhang, Q Liu, X Cui, J Su Science of Cyber Security: First International Conference, SciSec 2018 …, 2018 | 3 | 2018 |
C-BEDIM and S-BEDIM: lateral movement detection in enterprise network through behavior deviation measurement C Dong, J Yang, S Liu, Z Wang, Y Liu, Z Lu Computers & Security 130, 103267, 2023 | 2 | 2023 |
Make data reliable: An explanation-powered cleaning on malware dataset against backdoor poisoning attacks X Wang, C Liu, X Hu, Z Wang, J Yin, X Cui Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 2 | 2022 |
A Systematic Study of AI Applications in Cybersecurity Competitions F Zhang, X Cui, Z Wang, S Chen, Q Liu, C Liu 2020 IEEE 14th International Conference on Big Data Science and Engineering …, 2020 | 1 | 2020 |
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning Y Chen, Y Feng, Z Wang, J Zhao, C Wang, Q Liu ICC 2023-IEEE International Conference on Communications, 790-796, 2023 | | 2023 |
针对 DDoS 攻击的检测与控制系统 金伟, 崔鸿, 王志, 郭发勤, 汪屹文, 贺帅 网络空间安全 8 (6), 19-22, 2017 | | 2017 |
Poster: An anonymity metric of anonymous network J Zhang, Z Wang | | |
Poster: A Web Server Identified Model based on Mean Shift J Su, Q Liu, Z Wang, X Li | | |
人工智能赋能网络威胁研究进展 王志, 尹捷, 崔翔, 刘奇旭, 刘潮歌, 汪旭童 信息安全学报, 0 | | |