Follow
Zhi Wang
Title
Cited by
Cited by
Year
Transcend: Detecting concept drift in malware classification models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
26th USENIX security symposium (USENIX security 17), 625-642, 2017
3052017
Linear obfuscation to combat symbolic execution
Z Wang, J Ming, C Jia, D Gao
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
972011
Multi-user searchable encryption with coarser-grained access control in hybrid cloud
Z Liu, Z Wang, X Cheng, C Jia, K Yuan
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
662013
M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices
C Gao, S Lv, Y Wei, Z Wang, Z Liu, X Cheng
IEEE Access 6, 38860-38869, 2018
532018
A novel approach for detecting browser-based silent miner
J Liu, Z Zhao, X Cui, Z Wang, Q Liu
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
512018
Identifying Bitcoin Users Using Deep Neural Network
ZW Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia, Chunbo Liu
International Conference on Algorithms and Architectures for Parallel Processing, 2018
47*2018
Evilmodel: hiding malware inside of neural network models
Z Wang, C Liu, X Cui
2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021
322021
Boosting training for PDF malware classifier via active learning
Y Li, X Wang, Z Shi, R Zhang, J Xue, Z Wang
International Journal of Intelligent Systems 37 (4), 2803-2821, 2022
282022
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems
W Shao, Z Wang, X Wang, K Qiu, C Jia, C Jiang
Information Sciences 512, 506-517, 2020
282020
Conformal clustering and its application to botnet traffic
G Cherubin, I Nouretdinov, A Gammerman, R Jordaney, Z Wang, D Papini, ...
Statistical Learning and Data Sciences: Third International Symposium, SLDS …, 2015
252015
Evilmodel 2.0: bringing neural network models into malware attacks
Z Wang, C Liu, X Cui, J Yin, X Wang
Computers & Security 120, 102807, 2022
202022
Opponent portrait for multiagent reinforcement learning in competitive environment
Y Ma, M Shen, Y Zhao, Z Li, X Tong, Q Zhang, Z Wang
International Journal of Intelligent Systems 36 (12), 7461-7474, 2021
192021
Branch obfuscation using code mobility and signal
Z Wang, C Jia, M Liu, X Yu
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
192012
Misleading metrics: On evaluating machine learning for malware with confidence
R Jordaney, Z Wang, D Papini, I Nouretdinov, L Cavallaro
Tech. Rep., 2016
182016
Extracting sent message formats from executables using backward slicing
M Liu, C Jia, L Liu, Z Wang
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
162013
CoinBot: A covert botnet in the cryptocurrency network
J Yin, X Cui, C Liu, Q Liu, T Cui, Z Wang
Information and Communications Security: 22nd International Conference …, 2020
152020
Assessment of recommendation trust for access control in open networks
B Zhao, C Xiao, Y Zhang, P Zhai, Z Wang
Cluster Computing 22, 565-571, 2019
142019
A learning evasive email-based P2P-like botnet
Z Wang, M Qin, M Chen, C Jia, Y Ma
China Communications 15 (2), 15-24, 2018
142018
Semantic-integrated software watermarking with tamper-proofing
Z Chen, Z Wang, C Jia
Multimedia Tools and Applications 77 (9), 11159-11178, 2018
132018
An efficient log parsing algorithm based on heuristic rules
L Zhang, X Xie, K Xie, Z Wang, Y Lu, Y Zhang
Advanced Parallel Processing Technologies: 13th International Symposium …, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20