Zhi Wang

Orcid: 0000-0002-3252-9254

Affiliations:
  • Nankai University, Tianjin, China
  • Civil Aviation University of China, Tianjin, China


According to our database1, Zhi Wang authored at least 27 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
ICDF: Intrusion collaborative detection framework based on confidence.
Int. J. Intell. Syst., 2022

Boosting training for PDF malware classifier via active learning.
Int. J. Intell. Syst., 2022

LISP-TBCNN: An AutoCAD Malware Detection Approach.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
A Confidence-Guided Evaluation for Log Parsers Inner Quality.
Mob. Networks Appl., 2021

Opponent portrait for multiagent reinforcement learning in competitive environment.
Int. J. Intell. Syst., 2021

2020
Detecting Overlapping Data in System Logs Based on Ensemble Learning Method.
Wirel. Commun. Mob. Comput., 2020

Valid Probabilistic Anomaly Detection Models for System Logs.
Wirel. Commun. Mob. Comput., 2020

Reversible Information Hiding Algorithm Based on Multikey Encryption.
Wirel. Commun. Mob. Comput., 2020

BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput., 2020

LSC: Online auto-update smart contracts for fortifying blockchain-based log systems.
Inf. Sci., 2020

2019
A Pvalue-guided Anomaly Detection Approach Combining Multiple Heterogeneous Log Parser Algorithms on IIoT Systems.
CoRR, 2019

Assessment of recommendation trust for access control in open networks.
Clust. Comput., 2019

Explaining Concept Drift of Deep Learning Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

An Efficient Log Parsing Algorithm Based on Heuristic Rules.
Proceedings of the Advanced Parallel Processing Technologies, 2019

2018
Semantic-integrated software watermarking with tamper-proofing.
Multim. Tools Appl., 2018

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018

Identifying Bitcoin Users Using Deep Neural Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Hiding Fast Flux Botnet in Plain Email Sight.
Proceedings of the Security and Privacy in Communication Networks, 2017

An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2013
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Extracting Sent Message Formats from Executables Using Backward Slicing.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Branch Obfuscation Using Code Mobility and Signal.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Linear Obfuscation to Combat Symbolic Execution.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Revisiting Address Space Randomization.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Denial-of-Service Attacks on Host-Based Generic Unpackers.
Proceedings of the Information and Communications Security, 11th International Conference, 2009


  Loading...