Follow
Jianyi Zhang
Title
Cited by
Cited by
Year
A real-time automatic detection of phishing URLs
J Zhang, Y Wang
Proceedings of 2012 2nd International Conference on Computer Science and …, 2012
212012
No one can escape: A general approach to detect tampered and generated image
K Zhang, Y Liang, J Zhang, Z Wang, X Li
IEEE Access 7, 129494-129503, 2019
202019
A malicious URL detection model based on convolutional neural network
Z Wang, X Ren, S Li, B Wang, J Zhang, T Yang
Security and Communication Networks 2021, 1-12, 2021
192021
Honeynet construction based on intrusion detection
Z Wang, G Li, Y Chi, J Zhang, Q Liu, T Yang, W Zhou
Proceedings of the 3rd International Conference on Computer Science and …, 2019
162019
Efficient and provable security searchable asymmetric encryption in the cloud
J Zhang, C Song, Z Wang, T Yang, W Ma
IEEE Access 6, 68384-68393, 2018
152018
Security of medical cyber-physical systems: an empirical study on imaging devices
Z Wang, P Ma, X Zou, J Zhang, T Yang
IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020
142020
A prior-based transfer learning method for the phishing detection
J Zhang, Y Ou, D Li, Y Xin
Journal of Networks 7 (8), 1201, 2012
142012
Android malware detection based on convolutional neural networks
Z Wang, G Li, Y Chi, J Zhang, T Yang, Q Liu
Proceedings of the 3rd International Conference on Computer Science and …, 2019
122019
DICOM-Fuzzer: Research on DICOM vulnerability mining based on Fuzzing technology
Z Wang, Q Li, Q Liu, B Liu, J Zhang, T Yang, Q Liu
Communications and Networking: 14th EAI International Conference, ChinaCom …, 2020
102020
Medical protocol security: DICOM vulnerability mining based on fuzzing technology
Z Wang, Q Li, Y Wang, B Liu, J Zhang, Q Liu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
102019
DGA and DNS covert channel detection system based on machine learning
Z Wang, H Dong, Y Chi, J Zhang, T Yang, Q Liu
Proceedings of the 3rd International Conference on Computer Science and …, 2019
102019
URL based gateway side phishing detection method
J Zhang, Y Pan, Z Wang, B Liu
2016 IEEE Trustcom/BigDataSE/ISPA, 268-275, 2016
102016
Secure medical data collection via local differential privacy
Z Wang, P Ma, R Wang, J Zhang, Y Chi, Y Ma, T Yang
2018 IEEE 4th International Conference on Computer and Communications (ICCC …, 2018
92018
Parsing and detecting phishing pages based on semantic understanding of text
J Zhang, Q Li, Q Wang, T Geng, X Ouyang, Y Xin
Journal of Information &Computational Science 9 (6), 1521-1534, 2012
92012
Long-term preservation of myocardial energetic in chronic hibernating myocardium
MN Jameel, Q Li, A Mansoor, Q Xiong, C Swingen, J Zhang
American Journal of Physiology-Heart and Circulatory Physiology 300 (3 …, 2011
92011
Medical devices are at risk: Information security on diagnostic imaging system
Z Wang, P Ma, Y Chi, J Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
82018
Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm
Z Wang, H Dong, Y Chi, J Zhang, T Yang, Q Liu
Proceedings of the 9th International Conference on Computer Engineering and …, 2021
62021
Effective metabolic approaches for the energy starved failing heart: bioenergetic resiliency via redundancy or something Else?
J Zhang, ED Abel
Circulation research 123 (3), 329-331, 2018
62018
基于区块链的可监管数字货币模型
张健毅, 王志强, 徐治理, 欧阳雅菲, 杨涛
计算机研究与发展 55 (10), 2219-2232, 2018
62018
An content-analysis based large scale anti-phishing gateway
J Zhang, C Wu, H Guan, Q Wang, L Zhang, Y Ou, Y Xin, L Chen
2010 IEEE 12th International Conference on Communication Technology, 979-982, 2010
52010
The system can't perform the operation now. Try again later.
Articles 1–20