default search action
Zhiqiang Wang 0006
Person information
- affiliation: Beijing Electronic Science and Technology Institute, China
- affiliation (PhD): Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an China
Other persons with the same name
- Zhiqiang Wang — disambiguation page
- Zhiqiang Wang 0001 — State Grid Shaanxi Electric Power Company Telematics, Xi'an, China (and 1 more)
- Zhiqiang Wang 0002 — Tianjin Polytechnic University, Tianjin Engineering Center of Electric Machine System Design and Control, China (and 1 more)
- Zhiqiang Wang 0003 — South China University of Technology, School of Computer Science and Engineering, Guangzhou, China
- Zhiqiang Wang 0004 — Dalian University of Technology, School of Management Science and Engineering, Liaoning, China
- Zhiqiang Wang 0005 — Shanxi University, School of Computer and Information Technology, MOE Key Laboratory of Computational Intelligence and Chinese Information Processing, China
- Zhiqiang Wang 0007 — Northeastern University, College of Information Science and Engineering, Shenyang, China
- Zhiqiang Wang 0008 — Yanshan University, School of Electrical Engineering, Qinhuangdao, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Zhiqiang Wang, Xinyue Yu, Haoyu Wang, Peiyang Xue:
A federated learning scheme for hierarchical protection and multiple aggregation. Comput. Electr. Eng. 117: 109240 (2024) - [j12]Jianyi Zhang, Fangjiao Zhang, Qichao Jin, Zhiqiang Wang, Xiaodong Lin, Xiali Hei:
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning. Digit. Commun. Networks 10(4): 1154-1167 (2024) - [j11]Yang Li, Zhiqiang Wang:
A Study of Delayed Competitive Influence Propagation Based on Shortest Path Calculation. Inf. 15(7): 370 (2024) - [c22]Yuyang Han, Zilong Xiao, Zhiqiang Wang, Jianyi Zhang:
Privacy Policy Compliance in Miniapps: An Analytical Study. SaTS@CCS 2024: 11-17 - 2023
- [j10]Jianyi Zhang, Zhenkui Li, Yudong Liu, Zezheng Sun, Zhiqiang Wang:
SAFTE: A self-injection based anti-fuzzing technique. Comput. Electr. Eng. 111(Part B): 108980 (2023) - [c21]Zhiqiang Wang, Zhuoyue Wang, Ying Zhang:
An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network. ICDF2C (2) 2023: 283-299 - [c20]Yuyang Han, Xu Ji, Zhiqiang Wang, Jianyi Zhang:
Systematic Analysis of Security and Vulnerabilities in Miniapps. SaTS@CCS 2023: 1-9 - [i5]Yuyang Han, Xu Ji, Zhiqiang Wang, Jianyi Zhang:
Systematic Analysis of Security and Vulnerabilities in Miniapps. CoRR abs/2311.11382 (2023) - 2022
- [j9]Zhiqiang Wang, Qian Liu, Zhuoyue Wang, Yaping Chi:
Deep Learning-Based Multi-Classification for Malware Detection in IoT. J. Circuits Syst. Comput. 31(17): 2250297:1-2250297:24 (2022) - [c19]Yaping Chi, Defan Xue, Ziyan Yue, Zhiqiang Wang, Liang Jiaming:
Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning. CSS 2022: 225-243 - [i4]Jianyi Zhang, Fangjiao Zhang, Qichao Jin, Zhiqiang Wang, Xiaodong Lin, Xiali Hei:
XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning. CoRR abs/2212.13675 (2022) - 2021
- [j8]Zhiqiang Wang, Xiaorui Ren, Shuhao Li, Bingyan Wang, Jianyi Zhang, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. Secur. Commun. Networks 2021: 5518528:1-5518528:12 (2021) - [j7]Zhiqiang Wang, Yuheng Lin, Zihan Zhuo, Jieming Gu, Tao Yang:
GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing. Secur. Commun. Networks 2021: 9946022:1-9946022:14 (2021) - 2020
- [j6]Zhiqiang Wang, Qian Liu, Yaping Chi:
Review of Android Malware Detection Based on Deep Learning. IEEE Access 8: 181102-181126 (2020) - [c18]Zhiqiang Wang, Gefei Li, Yaping Chi:
Multi-classification of Android Applications Based on Convolutional Neural Networks. CSAE 2020: 27:1-27:5 - [c17]Jianyi Zhang, Pengju Li, Zhili Xu, Anqi Wang, Jin Liu, Zhiqiang Wang:
Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain. INFOCOM Workshops 2020: 760-765 - [c16]Zhiqiang Wang, Pingchuan Ma, Xiaoxiang Zou, Jianyi Zhang, Tao Yang:
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices. INFOCOM Workshops 2020: 997-1002 - [c15]Zhiqiang Wang, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. SocialSec 2020: 34-40
2010 – 2019
- 2019
- [j5]Kejun Zhang, Yu Liang, Jianyi Zhang, Zhiqiang Wang, Xinxin Li:
No One Can Escape: A General Approach to Detect Tampered and Generated Image. IEEE Access 7: 129494-129503 (2019) - [j4]Kejun Zhang, Meng Jiao, Xiaoming Chen, Zhiqiang Wang, Biao Liu, Lei Liu:
SC-BiCapsNet: A Sentiment Classification Model Based on Bi-Channel Capsule Network. IEEE Access 7: 171801-171813 (2019) - [c14]Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu:
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. CCS 2019: 2549-2551 - [c13]Zhiqiang Wang, Quanqi Li, Qian Liu, Biao Liu, Jianyi Zhang, Tao Yang, Qixu Liu:
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology. ChinaCom (1) 2019: 509-524 - [c12]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Qixu Liu, Tao Yang, Wei Zhou:
Honeynet Construction Based on Intrusion Detection. CSAE 2019: 80:1-80:5 - [c11]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
Android Malware Detection Based on Convolutional Neural Networks. CSAE 2019: 151:1-151:6 - [c10]Zhiqiang Wang, Hongyu Dong, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
DGA and DNS Covert Channel Detection System based on Machine Learning. CSAE 2019: 156:1-156:5 - [c9]Pingchuan Ma, Zhiqiang Wang, Xiali Hei, Xiaoxiang Zou, Jianyi Zhang, Qixu Liu, Xin Lyu, Zihan Zhuo:
A Quantitative Approach for Medical Imaging Device Security Assessment. DSN (Supplements) 2019: 5-6 - [c8]Pingchuan Ma, Zhiqiang Wang, Le Zhang, Ruming Wang, Xiaoxiang Zou, Tao Yang:
Differentially Private Reinforcement Learning. ICICS 2019: 668-683 - [i3]Zhiqiang Wang, Pingchuan Ma, Xiaoxiang Zou, Tao Yang:
Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices. CoRR abs/1904.00224 (2019) - [i2]Jianyi Zhang, Xiali Hei, Zhiqiang Wang:
Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating. CoRR abs/1904.12542 (2019) - [i1]Xiaoming Chen, Weiqing You, Meng Jiao, Kejun Zhang, Shuang Qing, Zhiqiang Wang:
A New Cryptosystem Based on Positive Braids. CoRR abs/1910.04346 (2019) - 2018
- [j3]Jianyi Zhang, Chenggen Song, Zhiqiang Wang, Tao Yang, Wenming Ma:
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud. IEEE Access 6: 68384-68393 (2018) - [c7]Zhiqiang Wang, Pingchuan Ma, Yaping Chi, Jianyi Zhang:
Medical Devices are at Risk: Information Security on Diagnostic Imaging System. CCS 2018: 2309-2311 - [c6]Zhiqiang Wang, Yao Tang, Jing Yao, Rong Qian, Zheng Zhang, Pingchuan Ma:
Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning. CSAE 2018: 174:1-174:5 - [c5]Zhiqiang Wang, Pingchuan Ma, Ruming Wang, Shichun Gao, Xuying Zhao, Tao Yang:
VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace. MLICOM 2018: 144-149 - [c4]Xiaoming Chen, Weiqing You, Meng Jiao, Kejun Zhang, Shuang Qing, Zhiqiang Wang:
A New Cryptosystem Based on Positive Braids. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1260-1264 - 2017
- [j2]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu:
A static technique for detecting input validation vulnerabilities in Android apps. Sci. China Inf. Sci. 60(5): 052111:1-052111:16 (2017) - 2016
- [c3]Jianyi Zhang, Yang Pan, Zhiqiang Wang, Biao Liu:
URL Based Gateway Side Phishing Detection Method. Trustcom/BigDataSE/ISPA 2016: 268-275 - 2015
- [c2]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. ISPEC 2015: 378-392 - 2013
- [j1]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. KSII Trans. Internet Inf. Syst. 7(8): 1989-2009 (2013) - 2012
- [c1]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
A research on vulnerability discovering for router protocols based on fuzzing. CHINACOM 2012: 245-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint