Transcend: Detecting concept drift in malware classification models R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ... 26th USENIX security symposium (USENIX security 17), 625-642, 2017 | 311 | 2017 |
Linear obfuscation to combat symbolic execution Z Wang, J Ming, C Jia, D Gao Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 97 | 2011 |
Multi-user searchable encryption with coarser-grained access control in hybrid cloud Z Liu, Z Wang, X Cheng, C Jia, K Yuan 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 66 | 2013 |
M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices C Gao, S Lv, Y Wei, Z Wang, Z Liu, X Cheng IEEE Access 6, 38860-38869, 2018 | 53 | 2018 |
A novel approach for detecting browser-based silent miner J Liu, Z Zhao, X Cui, Z Wang, Q Liu 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 52 | 2018 |
Identifying Bitcoin Users Using Deep Neural Network ZW Wei Shao, Hang Li, Mengqi Chen, Chunfu Jia, Chunbo Liu International Conference on Algorithms and Architectures for Parallel Processing, 2018 | 47* | 2018 |
Evilmodel: hiding malware inside of neural network models Z Wang, C Liu, X Cui 2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021 | 34 | 2021 |
Boosting training for PDF malware classifier via active learning Y Li, X Wang, Z Shi, R Zhang, J Xue, Z Wang International Journal of Intelligent Systems 37 (4), 2803-2821, 2022 | 29 | 2022 |
LSC: Online auto-update smart contracts for fortifying blockchain-based log systems W Shao, Z Wang, X Wang, K Qiu, C Jia, C Jiang Information Sciences 512, 506-517, 2020 | 29 | 2020 |
Conformal clustering and its application to botnet traffic G Cherubin, I Nouretdinov, A Gammerman, R Jordaney, Z Wang, D Papini, ... Statistical Learning and Data Sciences: Third International Symposium, SLDS …, 2015 | 25 | 2015 |
Evilmodel 2.0: bringing neural network models into malware attacks Z Wang, C Liu, X Cui, J Yin, X Wang Computers & Security 120, 102807, 2022 | 22 | 2022 |
Opponent portrait for multiagent reinforcement learning in competitive environment Y Ma, M Shen, Y Zhao, Z Li, X Tong, Q Zhang, Z Wang International Journal of Intelligent Systems 36 (12), 7461-7474, 2021 | 19 | 2021 |
Misleading metrics: On evaluating machine learning for malware with confidence R Jordaney, Z Wang, D Papini, I Nouretdinov, L Cavallaro Tech. Rep., 2016 | 19 | 2016 |
Branch obfuscation using code mobility and signal Z Wang, C Jia, M Liu, X Yu 2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012 | 19 | 2012 |
Extracting sent message formats from executables using backward slicing M Liu, C Jia, L Liu, Z Wang 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 16 | 2013 |
CoinBot: A covert botnet in the cryptocurrency network J Yin, X Cui, C Liu, Q Liu, T Cui, Z Wang Information and Communications Security: 22nd International Conference …, 2020 | 15 | 2020 |
Assessment of recommendation trust for access control in open networks B Zhao, C Xiao, Y Zhang, P Zhai, Z Wang Cluster Computing 22, 565-571, 2019 | 14 | 2019 |
A learning evasive email-based P2P-like botnet Z Wang, M Qin, M Chen, C Jia, Y Ma China Communications 15 (2), 15-24, 2018 | 14 | 2018 |
Semantic-integrated software watermarking with tamper-proofing Z Chen, Z Wang, C Jia Multimedia Tools and Applications 77 (9), 11159-11178, 2018 | 13 | 2018 |
Hiding fast flux botnet in plain email sight Z Wang, M Qin, M Chen, C Jia Security and Privacy in Communication Networks: SecureComm 2017 …, 2018 | 13 | 2018 |