Zhiqiang Wang

Orcid: 0000-0002-1789-8414

Affiliations:
  • Beijing Electronic Science and Technology Institute, China
  • Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an China (PhD)


According to our database1, Zhiqiang Wang authored at least 38 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Study of Delayed Competitive Influence Propagation Based on Shortest Path Calculation.
Inf., July, 2024

XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning.
Digit. Commun. Networks, 2024

A federated learning scheme for hierarchical protection and multiple aggregation.
Comput. Electr. Eng., 2024

Privacy Policy Compliance in Miniapps: An Analytical Study.
Proceedings of the ACM Workshop on Secure and Trustworthy Superapps, SaTS 2024, 2024

2023
SAFTE: A self-injection based anti-fuzzing technique.
Comput. Electr. Eng., November, 2023

Systematic Analysis of Security and Vulnerabilities in Miniapps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

An Android Malware Detection Method Based on Optimized Feature Extraction Using Graph Convolutional Network.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
Deep Learning-Based Multi-Classification for Malware Detection in IoT.
J. Circuits Syst. Comput., 2022

XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning.
CoRR, 2022

Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
A Malicious URL Detection Model Based on Convolutional Neural Network.
Secur. Commun. Networks, 2021

GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing.
Secur. Commun. Networks, 2021

2020
Review of Android Malware Detection Based on Deep Learning.
IEEE Access, 2020

A Malicious URL Detection Model Based on Convolutional Neural Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Multi-classification of Android Applications Based on Convolutional Neural Networks.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating.
CoRR, 2019

Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices.
CoRR, 2019

No One Can Escape: A General Approach to Detect Tampered and Generated Image.
IEEE Access, 2019

SC-BiCapsNet: A Sentiment Classification Model Based on Bi-Channel Capsule Network.
IEEE Access, 2019

Differentially Private Reinforcement Learning.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Quantitative Approach for Medical Imaging Device Security Assessment.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

DGA and DNS Covert Channel Detection System based on Machine Learning.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Android Malware Detection Based on Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Honeynet Construction Based on Intrusion Detection.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the Communications and Networking, 2019

Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud.
IEEE Access, 2018

A New Cryptosystem Based on Positive Braids.
Proceedings of the 2018 IEEE SmartWorld, 2018

VulAware: Towards Massive-Scale Vulnerability Detection in Cyberspace.
Proceedings of the Machine Learning and Intelligent Communications, 2018

Large-scale Malware Automatic Detection Based On Multiclass Features and Machine Learning.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

Medical Devices are at Risk: Information Security on Diagnostic Imaging System.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

2016
URL Based Gateway Side Phishing Detection Method.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

2013
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013

2012
A research on vulnerability discovering for router protocols based on fuzzing.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012


  Loading...