Zhengwei Jiang
Orcid: 0000-0002-0843-4482
According to our database1,
Zhengwei Jiang
authored at least 55 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent.
CoRR, 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
From Fine-Grained to Refined: APT Malware Knowledge Graph Construction and Attribution Analysis Driven by Multi-stage Graph Computation.
Proceedings of the Computational Science - ICCS 2024, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Comput. Networks, May, 2023
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Cybersecur., 2022
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022
Comput. Networks, 2022
Cryptocurrency malware detection in real-world environment: Based on multi-results stacking learning.
Appl. Soft Comput., 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Sensors, 2021
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks.
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network.
Cybersecur., 2020
IEEE Access, 2020
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020
Proceedings of the Natural Language Processing and Chinese Computing, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
2019
Hierarchical Graph Neural Networks for Personalized Recommendations with User-Session Context.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019
Proceedings of the Knowledge Science, Engineering and Management, 2019
Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the 2019 IEEE International Conference on Computational Science and Engineering, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
2016
Proceedings of the Interoperability, Safety and Security in IoT, 2016
2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
2006
Int. J. Wavelets Multiresolution Inf. Process., 2006