default search action
Zhengwei Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. CSCWD 2024: 1687-1694 - [c42]Shuwei Wang, Xiao Chen, Molan Long, Qiuyun Wang, Rongqi Jing, Zhengwei Jiang:
A Novel Detection System for Multi-Architecture IoT Malware. CSCWD 2024: 1758-1763 - [c41]Chen Ling, Bin Liu, Wei Xia, Shuangze He, Zhengwei Jiang, Qiuyun Wang:
Automated Anti-malware Detection Rules Converter Based on SIMIOC. CSCWD 2024: 1770-1775 - [c40]Shang Shang, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang:
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts. ESORICS (4) 2024: 146-165 - [c39]Rongqi Jing, Zhengwei Jiang, Qiuyun Wang, Shuwei Wang, Hao Li, Xiao Chen:
From Fine-Grained to Refined: APT Malware Knowledge Graph Construction and Attribution Analysis Driven by Multi-stage Graph Computation. ICCS (1) 2024: 78-93 - [c38]HuanZhou Yue, Xuren Wang, Rong Chen, Zhengwei Jiang, Yuxia Fu, Jun Jiang:
HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence. KSEM (5) 2024: 214-223 - [i1]Shang Shang, Xinqiang Zhao, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang:
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent. CoRR abs/2405.03654 (2024) - 2023
- [j10]Jian Liu, Qingsai Xiao, Liling Xin, Qiuyun Wang, Yepeng Yao, Zhengwei Jiang:
M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting. Comput. Networks 227: 109723 (2023) - [c37]Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang:
Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain. CSCWD 2023: 909-916 - [c36]Meng Luo, Liling Xin, Yepeng Yao, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi:
Who Are Querying For Me? Egress Measurement For Open DNS Resolvers. CSCWD 2023: 1544-1550 - [c35]Chunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. TrustCom 2023: 531-538 - 2022
- [j9]Rui Zheng, Qiuyun Wang, Zhuopang Lin, Zhengwei Jiang, Jianming Fu, Guojun Peng:
Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning. Appl. Soft Comput. 124: 109044 (2022) - [j8]Meng Luo, Yepeng Yao, Liling Xin, Zhengwei Jiang, Qiuyun Wang, Wenchang Shi:
Measurement for encrypted open resolvers: Applications and security. Comput. Networks 213: 109081 (2022) - [j7]Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecur. 5(1): 3 (2022) - [j6]Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang, Ning Li:
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecur. 5(1): 8 (2022) - [c34]Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng:
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*. COMPSAC 2022: 272-279 - [c33]Xuren Wang, Songheng He, Zihan Xiong, Xinxin Wei, Zhengwei Jiang, Sihan Chen, Jun Jiang:
APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field. CSCWD 2022: 1233-1238 - [c32]Binghua Song, Rong Chen, Baoxu Liu, Zhengwei Jiang, Xuren Wang:
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. CSCWD 2022: 1353-1359 - [c31]Jian Liu, Junjie Yan, Zhengwei Jiang, Xuren Wang, Jun Jiang:
A Graph Learning Approach with Audit Records for Advanced Attack Investigation. GLOBECOM 2022: 897-902 - [c30]Binghua Song, Rong Chen, Baoxu Liu, Zhengwei Jiang, Xuren Wang:
Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. ICCS (4) 2022: 17-30 - [c29]Xiao Chen, Zhengwei Jiang, Shuwei Wang, Rongqi Jing, Chen Ling, Qiuyun Wang:
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning. SciSec 2022: 302-314 - [c28]Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan, Fangming Dong, Ning Li, Baoxu Liu:
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment. SciSec 2022: 421-436 - [c27]Jian Liu, Qingsai Xiao, Zhengwei Jiang, Yepeng Yao, Qiuyun Wang:
Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection. WCNC 2022: 1158-1163 - 2021
- [j5]Rui Zheng, Hao Ma, Qiuyun Wang, Jianming Fu, Zhengwei Jiang:
Assessing the Security of Campus Networks: The Case of Seven Universities. Sensors 21(1): 306 (2021) - [c26]Xuren Wang, Rong Chen, Binghua Song, Jie Yang, Zhengwei Jiang, Xiaoqing Zhang, Xiaomeng Li, Shengqin Ao:
A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning. CSCWD 2021: 262-267 - [c25]Xiong Ding, Baoxu Liu, Zhengwei Jiang, Qiuyun Wang, Liling Xin:
Spear Phishing Emails Detection Based on Machine Learning. CSCWD 2021: 354-359 - [c24]Xingran Hao, Zhengwei Jiang, Qingsai Xiao, Qiuyun Wang, Yepeng Yao, Baoxu Liu, Jian Liu:
Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data. CSCWD 2021: 384-390 - [c23]Shengqin Ao, Yitong He, Ning Luo, Xuren Wang, Zhengwei Jiang, Jun Jiang:
Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests. CSCWD 2021: 391-396 - [c22]Ning Luo, Xiangyu Du, Yitong He, Jun Jiang, Xuren Wang, Zhengwei Jiang, Kai Zhang:
A Framework for Document-level Cybersecurity Event Extraction from Open Source Data. CSCWD 2021: 422-427 - [c21]Zijing Fan, Chao Yuan, Liling Xin, Xuren Wang, Zhengwei Jiang, Qiuyun Wang:
HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest. CSCWD 2021: 1141-1147 - [c20]Zijian Jia, Yepeng Yao, Qiuyun Wang, Xuren Wang, Baoxu Liu, Zhengwei Jiang:
Trojan Traffic Detection Based on Meta-learning. ICCS (2) 2021: 167-180 - [c19]Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang:
Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks. IFIP Int. Conf. Digital Forensics 2021: 193-211 - [c18]Xuren Wang, Mengbo Xiong, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong:
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction. SEKE 2021: 79-85 - [c17]Yali Luo, Zhengwei Jiang, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang:
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce. WCNC 2021: 1-6 - 2020
- [j4]Hua Zhang, Xueqi Jin, Ying Li, Zhengwei Jiang, Ye Liang, Zhengping Jin, Qiaoyan Wen:
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System. IEEE Access 8: 1031-1047 (2020) - [j3]Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu:
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network. Cybersecur. 3(1): 4 (2020) - [j2]Liangchen Chen, Shu Gao, Baoxu Liu, Zhigang Lu, Zhengwei Jiang:
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection. J. Supercomput. 76(9): 7489-7518 (2020) - [c16]Qingsai Xiao, Jian Liu, Qiuyun Wang, Zhengwei Jiang, Xuren Wang, Yepeng Yao:
Towards Network Anomaly Detection Using Graph Embedding. ICCS (4) 2020: 156-169 - [c15]Shuwei Wang, Qiuyun Wang, Zhengwei Jiang, Xuren Wang, Rongqi Jing:
A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification. ICPR 2020: 3775-3782 - [c14]Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. ISCC 2020: 1-7 - [c13]Xuren Wang, Zihan Xiong, Xiangyu Du, Jun Jiang, Zhengwei Jiang, Mengbo Xiong:
NER in Threat Intelligence Domain with TSFL. NLPCC (1) 2020: 157-169 - [c12]Yaopeng Han, Zhigang Lu, Bo Jiang, Yuling Liu, Chen Zhang, Zhengwei Jiang, Ning Li:
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. NPC 2020: 43-54 - [c11]Zhengwei Jiang, Jianhua Yang, Xueqi Jin, Qunchao Bi, Jiajia Huang, Fan Chen, Huanhuan Lai, Weiwei Chen:
An Automatic Asset Life-Cycle Monitoring System Based on RFID Radio Frequency. SmartBlock 2020: 180-184 - [c10]Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. TrustCom 2020: 584-591 - [c9]Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang:
DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence. TrustCom 2020: 1842-1848
2010 – 2019
- 2019
- [c8]Zhijun Zhao, Zhengwei Jiang, Yueqiang Wang, Guoen Chen, Bo Li:
Experimental Verification of Security Measures in Industrial Environments. CSE/EUC 2019: 498-502 - [c7]Fangli Ren, Zhengwei Jiang, Jian Liu:
Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names. ICTAI 2019: 848-855 - [c6]Ming Du, Jun Jiang, Zhengwei Jiang, Zhigang Lu, Xiangyu Du:
PRTIRG: A Knowledge Graph for People-Readable Threat Intelligence Recommendation. KSEM (1) 2019: 47-59 - [c5]Xiang Shen, Caiming Yang, Zhengwei Jiang, Dong Xie, Yingtao Sun, Shuibiao Chen, Bo Li:
Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context. SmartCom 2019: 341-348 - 2018
- [c4]Bo Jiang, Zhigang Lu, Ning Li, Jianjun Wu, Zhengwei Jiang:
Retweet Prediction Using Social-Aware Probabilistic Matrix Factorization. ICCS (1) 2018: 316-327 - [c3]Qiang Li, Zhengwei Jiang, Zeming Yang, Baoxu Liu, Xin Wang, Yunan Zhang:
A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective. TrustCom/BigDataSE 2018: 269-276 - 2016
- [c2]Qiang Li, Zeming Yang, Baoxu Liu, Zhengwei Jiang, Jian Yan:
Framework of Cyber Attack Attribution Based on Threat Intelligence. InterIoT/SaSeIoT 2016: 92-103 - 2010
- [c1]Zhengwei Jiang, Teng Joon Lim, Roya Doostnejad, Taiwen Tang:
MIMO Channel Estimation Using the Variational Expectation-Maximization Method. VTC Fall 2010: 1-5
2000 – 2009
- 2006
- [j1]Yuantao Gu, Yilun Chen, Zhengwei Jiang, Kun Tang:
Particle Filter Based Multi-Camera Integration for Face 3D-Pose Tracking. Int. J. Wavelets Multiresolution Inf. Process. 4(4): 677-690 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint