关注
Zhengwei JIANG
标题
引用次数
引用次数
年份
Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields
P Ma, B Jiang, Z Lu, N Li, Z Jiang
Tsinghua Science and Technology 26 (3), 259-265, 2020
762020
Towards network anomaly detection using graph embedding
Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
452020
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network
F Ren, Z Jiang, X Wang, J Liu
Cybersecurity 3 (1), 4, 2020
432020
Dnrti: A large-scale dataset for named entity recognition in threat intelligence
X Wang, X Liu, S Ao, N Li, Z Jiang, Z Xu, Z Xiong, M Xiong, X Zhang
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
282020
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
Y You, J Jiang, Z Jiang, P Yang, B Liu, H Feng, X Wang, N Li
Cybersecurity 5 (1), 3, 2022
272022
Framework of cyber attack attribution based on threat intelligence
L Qiang, Y Zeming, L Baoxu, J Zhengwei, Y Jian
Interoperability, Safety and Security in IoT: Second International …, 2017
272017
FEW-NNN: A fuzzy entropy weighted natural nearest neighbor method for flow-based network traffic attack detection
L Chen, S Gao, B Liu, Z Lu, Z Jiang
China Communications 17 (5), 151-167, 2020
252020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection
L Chen, S Gao, B Liu, Z Lu, Z Jiang
The Journal of Supercomputing 76, 7489-7518, 2020
222020
A bi-directional LSTM model with attention for malicious URL detection
F Ren, Z Jiang, J Liu
2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019
192019
A quality evaluation method of cyber threat intelligence in user perspective
L Qiang, J Zhengwei, Y Zeming, L Baoxu, W Xin, Z Yunan
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
182018
Assessing the security of campus networks: the case of seven universities
R Zheng, H Ma, Q Wang, J Fu, Z Jiang
Sensors 21 (1), 306, 2021
172021
A meta-synthesis approach for cloud service provider selection based on secsla
J Zhengwei, D Ran, L Zhigang, W Xihong, L Baoxu
2013 International Conference on Computational and Information Sciences …, 2013
172013
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network
J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang, N Li
Cybersecurity 5 (1), 8, 2022
162022
Retweet prediction using social-aware probabilistic matrix factorization
B Jiang, Z Lu, N Li, J Wu, Z Jiang
Computational Science–ICCS 2018: 18th International Conference, Wuxi, China …, 2018
162018
Aptner: A specific dataset for ner missions in cyber threat intelligence field
X Wang, S He, Z Xiong, X Wei, Z Jiang, S Chen, J Jiang
2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022
122022
Towards comprehensive detection of DNS tunnels
M Luo, Q Wang, Y Yao, X Wang, P Yang, Z Jiang
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
122020
基于等级保护的云计算安全评估模型
姜政伟, 赵文瑞, 刘宇, 刘宝旭
计算机科学 40 (8), 151-156, 2013
122013
Producing more with less: a GAN-based network attack detection approach for imbalanced data
X Hao, Z Jiang, Q Xiao, Q Wang, Y Yao, B Liu, J Liu
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
112021
A method for extracting unstructured threat intelligence based on dictionary template and reinforcement learning
X Wang, R Chen, B Song, J Yang, Z Jiang, X Zhang, X Li, S Ao
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
112021
Integrating an attention mechanism and deep neural network for detection of DGA domain names
F Ren, Z Jiang, J Liu
2019 IEEE 31st International Conference on Tools with Artificial …, 2019
112019
系统目前无法执行此操作,请稍后再试。
文章 1–20