Zhi Wang

Orcid: 0000-0003-4711-4251

Affiliations:
  • Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China


According to our database1, Zhi Wang authored at least 13 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.
Comput. Secur., 2023

IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning.
Proceedings of the IEEE International Conference on Communications, 2023

2022
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks.
Comput. Secur., 2022

DeepC2: AI-Powered Covert Command and Control on OSNs.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
EvilModel: Hiding Malware Inside of Neural Network Models.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2020
AI-powered Covert Botnet Command and Control on OSNs.
CoRR, 2020

CoinBot: A Covert Botnet in the Cryptocurrency Network.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Systematic Study of AI Applications in Cybersecurity Competitions.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Practical Metrics for Evaluating Anonymous Networks.
Proceedings of the Science of Cyber Security - First International Conference, 2018

A Novel Approach for Detecting Browser-Based Silent Miner.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

MaliceScript: A Novel Browser-Based Intranet Threat.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018


  Loading...