Zhengwei Jiang

Orcid: 0000-0002-0843-4482

According to our database1, Zhengwei Jiang authored at least 46 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting.
Comput. Networks, May, 2023

Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Who Are Querying For Me? Egress Measurement For Open DNS Resolvers.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
Cybersecur., 2022

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022

Measurement for encrypted open resolvers: Applications and security.
Comput. Networks, 2022

Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022

Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022

A Graph Learning Approach with Audit Records for Advanced Attack Investigation.
Proceedings of the IEEE Global Communications Conference, 2022

APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Assessing the Security of Campus Networks: The Case of Seven Universities.
Sensors, 2021

CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks.
Proceedings of the Advances in Digital Forensics XVII, 2021

Trojan Traffic Detection Based on Meta-learning.
Proceedings of the Computational Science - ICCS 2021, 2021

A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Framework for Document-level Cybersecurity Event Extraction from Open Source Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Spear Phishing Emails Detection Based on Machine Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020

A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network.
Cybersecur., 2020

A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System.
IEEE Access, 2020

Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN.
Proceedings of the 19th IEEE International Conference on Trust, 2020

DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence.
Proceedings of the 19th IEEE International Conference on Trust, 2020

An Automatic Asset Life-Cycle Monitoring System Based on RFID Radio Frequency.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020

NER in Threat Intelligence Domain with TSFL.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

Towards Comprehensive Detection of DNS Tunnels.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Towards Network Anomaly Detection Using Graph Embedding.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

PRTIRG: A Knowledge Graph for People-Readable Threat Intelligence Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Experimental Verification of Security Measures in Industrial Environments.
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019

2018
A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Retweet Prediction Using Social-Aware Probabilistic Matrix Factorization.
Proceedings of the Computational Science - ICCS 2018, 2018

2016
Framework of Cyber Attack Attribution Based on Threat Intelligence.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

2010
MIMO Channel Estimation Using the Variational Expectation-Maximization Method.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

2006
Particle Filter Based Multi-Camera Integration for Face 3D-Pose Tracking.
Int. J. Wavelets Multiresolution Inf. Process., 2006


  Loading...