Zhongru Wang

According to our database1, Zhongru Wang authored at least 21 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Framework for understanding intention-unbreakable malware.
Sci. China Inf. Sci., April, 2023

Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System.
IEEE Trans. Intell. Transp. Syst., February, 2023

2022
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism.
Proceedings of the IEEE International Conference on Trust, 2022

Automated Vulnerability Discovery System Based on Hybrid Execution.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Automated Crash Analysis and Exploit Generation with Extendable Exploit Model.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Research on network security subsystem based on digital signal.
J. Intell. Fuzzy Syst., 2020

AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020

First Step Towards Modeling Unbreakable Malware.
CoRR, 2020

Malicious Code Detection Technology Based on Metadata Machine Learning.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism.
J. Supercomput., 2019

Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019

An Attention-Based BiLSTM-CRF Model for Chinese Clinic Named Entity Recognition.
IEEE Access, 2019

AutoDE: Automated Vulnerability Discovery and Exploitation.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019

2018
Sapiens Chain: A Blockchain-based Cybersecurity Framework.
CoRR, 2018

Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method.
CoRR, 2018

The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018


  Loading...