


default search action
Zhi Wang 0014
Person information
- affiliation: Nankai University, Tianjin, China
- affiliation: Civil Aviation University of China, Tianjin, China
Other persons with the same name
- Zhi Wang — disambiguation page
- Zhi Wang 0001
— Tsinghua University, Graduate School, Shenzhen, China
- Zhi Wang 0002
— Xi'an Jiaotong University, School of Software Engineering, China
- Zhi Wang 0003
— Zhejiang University, State Key Laboratory of Industrial Control Technology, Hangzhou, China
- Zhi Wang 0004 — Florida State University, Tallahassee, FL, USA (and 1 more)
- Zhi Wang 0005 — LIP6, Sorbonne University, Paris, France
- Zhi Wang 0006 — Shanghai Jiaotong University School of Medicine, Shanghai, China
- Zhi Wang 0008 — Nanyang Technological University, Singapore
- Zhi Wang 0009 — Northeastern University, Shenyang, China
- Zhi Wang 0010
— Beijing University of Posts and Telecommunications, Beijing, China
- Zhi Wang 0011 — Dalian University of Technology, China
- Zhi Wang 0012 — Jiangsu University of Science of Technology, Zhenjiang, China
- Zhi Wang 0013 — University of Wisconsin-Madison, WI, USA (and 2 more)
- Zhi Wang 0015
— Southwest University, School of Mathematics and Statistics, Chongqing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c15]Jianwen Tian, Wei Kong, Debin Gao, Tong Wang, Taotao Gu, Kefan Qiu, Zhi Wang, Xiaohui Kuang:
Density Boosts Everything: A One-stop Strategy for Improving Performance, Robustness, and Sustainability of Malware Detectors. NDSS 2025 - 2023
- [c14]Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao:
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. USENIX Security Symposium 2023: 2689-2706 - 2022
- [j12]Yuanzhang Li, Xinxin Wang, Zhiwei Shi, Ruyun Zhang, Jingfeng Xue, Zhi Wang
:
Boosting training for PDF malware classifier via active learning. Int. J. Intell. Syst. 37(4): 2803-2821 (2022) - [j11]Zhi Wang
, Leshi Shao, Kai Cheng, Yuanzhao Liu, Jianan Jiang, Yuanping Nie, Xiang Li, Xiaohui Kuang
:
ICDF: Intrusion collaborative detection framework based on confidence. Int. J. Intell. Syst. 37(10): 7180-7199 (2022) - [c13]Huanyu Chi, Zekun Fei, Peinuo Li, Boyu Yang, Zhi Wang, Li Gu:
LISP-TBCNN: An AutoCAD Malware Detection Approach. DSC 2022: 353-359 - 2021
- [j10]Yuxi Ma
, Meng Shen
, Yuhang Zhao
, Zhao Li
, Xiaoyao Tong
, Quanxin Zhang
, Zhi Wang
:
Opponent portrait for multiagent reinforcement learning in competitive environment. Int. J. Intell. Syst. 36(12): 7461-7474 (2021) - [j9]Xueshuo Xie, Zhi Wang
, Xuhang Xiao, Ye Lu, Shenwei Huang, Tao Li:
A Confidence-Guided Evaluation for Log Parsers Inner Quality. Mob. Networks Appl. 26(4): 1638-1649 (2021) - 2020
- [j8]Wei Shao, Zhi Wang
, Xiaolu Wang, Kefan Qiu, Chunfu Jia, Chong Jiang
:
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems. Inf. Sci. 512: 506-517 (2020) - [j7]Chunbo Liu
, Lanlan Pan
, Zhaojun Gu, Jialiang Wang
, Yitong Ren
, Zhi Wang
:
Valid Probabilistic Anomaly Detection Models for System Logs. Wirel. Commun. Mob. Comput. 2020: 8827185:1-8827185:12 (2020) - [j6]Zhaohui Li
, Yiqing Wang, Zhi Wang
, Zheli Liu, Jian Zhang, Min Li
:
Reversible Information Hiding Algorithm Based on Multikey Encryption. Wirel. Commun. Mob. Comput. 2020: 8847559:1-8847559:10 (2020) - [j5]Chunbo Liu
, Yitong Ren
, Mengmeng Liang
, Zhaojun Gu, Jialiang Wang
, Lanlan Pan
, Zhi Wang
:
Detecting Overlapping Data in System Logs Based on Ensemble Learning Method. Wirel. Commun. Mob. Comput. 2020: 8853971:1-8853971:8 (2020) - [j4]Xiang Li
, Yuanping Nie
, Zhi Wang
, Xiaohui Kuang, Kefan Qiu
, Cheng Qian
, Gang Zhao:
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features. Wirel. Commun. Mob. Comput. 2020: 8876632:1-8876632:11 (2020)
2010 – 2019
- 2019
- [j3]Bin Zhao
, Chuangbai Xiao, Yu Zhang, Peng Zhai, Zhi Wang:
Assessment of recommendation trust for access control in open networks. Clust. Comput. 22(Suppl 1): 565-571 (2019) - [c12]Lin Zhang, Xueshuo Xie, Kunpeng Xie, Zhi Wang, Ye Lu, Yujun Zhang:
An Efficient Log Parsing Algorithm Based on Heuristic Rules. APPT 2019: 123-134 - [c11]Xiaolu Wang, Zhi Wang, Wei Shao, Chunfu Jia, Xiang Li:
Explaining Concept Drift of Deep Learning Models. CSS (2) 2019: 524-534 - [i1]Xueshuo Xie, Zhi Wang, Xuhang Xiao, Lei Yang, Shenwei Huang, Tao Li:
A Pvalue-guided Anomaly Detection Approach Combining Multiple Heterogeneous Log Parser Algorithms on IIoT Systems. CoRR abs/1907.02765 (2019) - 2018
- [j2]Chongzhi Gao, Siyi Lv, Yu Wei, Zhi Wang, Zheli Liu, Xiaochun Cheng
:
M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices. IEEE Access 6: 38860-38869 (2018) - [j1]Zhe Chen, Zhi Wang, Chunfu Jia:
Semantic-integrated software watermarking with tamper-proofing. Multim. Tools Appl. 77(9): 11159-11178 (2018) - [c10]Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia, Chunbo Liu, Zhi Wang:
Identifying Bitcoin Users Using Deep Neural Network. ICA3PP (4) 2018: 178-192 - 2017
- [c9]Zhi Wang, Meiqi Tian, Chunfu Jia:
An Active and Dynamic Botnet Detection Approach to Track Hidden Concept Drift. ICICS 2017: 646-660 - [c8]Zhi Wang, Meiqi Tian, Junnan Wang, Chunfu Jia:
An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper). ISPEC 2017: 747-758 - [c7]Zhi Wang, Meilin Qin, Mengqi Chen, Chunfu Jia:
Hiding Fast Flux Botnet in Plain Email Sight. ATCS/SePrIoT@SecureComm 2017: 182-197 - 2013
- [c6]Zheli Liu, Zhi Wang, Xiaochun Cheng
, Chunfu Jia, Ke Yuan:
Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud. EIDWT 2013: 249-255 - [c5]Min Liu, Chunfu Jia, Lu Liu, Zhi Wang:
Extracting Sent Message Formats from Executables Using Backward Slicing. EIDWT 2013: 377-384 - 2012
- [c4]Zhi Wang, Chunfu Jia, Min Liu, Xiaoxu Yu:
Branch Obfuscation Using Code Mobility and Signal. COMPSAC Workshops 2012: 553-558 - 2011
- [c3]Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
:
Linear Obfuscation to Combat Symbolic Execution. ESORICS 2011: 210-226 - 2010
- [c2]Zhi Wang, Renquan Cheng, Debin Gao
:
Revisiting Address Space Randomization. ICISC 2010: 207-221
2000 – 2009
- 2009
- [c1]Limin Liu, Jiang Ming, Zhi Wang, Debin Gao
, Chunfu Jia:
Denial-of-Service Attacks on Host-Based Generic Unpackers. ICICS 2009: 241-253
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-27 01:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint