Cybersecurity named entity recognition using bidirectional long short-term memory with conditional random fields P Ma, B Jiang, Z Lu, N Li, Z Jiang Tsinghua Science and Technology 26 (3), 259-265, 2020 | 102 | 2020 |
Towards network anomaly detection using graph embedding Q Xiao, J Liu, Q Wang, Z Jiang, X Wang, Y Yao Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 66 | 2020 |
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network F Ren, Z Jiang, X Wang, J Liu Cybersecurity 3 (1), 4, 2020 | 57 | 2020 |
Dnrti: A large-scale dataset for named entity recognition in threat intelligence X Wang, X Liu, S Ao, N Li, Z Jiang, Z Xu, Z Xiong, M Xiong, X Zhang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 49 | 2020 |
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data Y You, J Jiang, Z Jiang, P Yang, B Liu, H Feng, X Wang, N Li Cybersecurity 5 (1), 3, 2022 | 46 | 2022 |
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang, N Li Cybersecurity 5 (1), 8, 2022 | 41 | 2022 |
Framework of cyber attack attribution based on threat intelligence L Qiang, Y Zeming, L Baoxu, J Zhengwei, Y Jian Interoperability, Safety and Security in IoT: Second International …, 2017 | 36 | 2017 |
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection L Chen, S Gao, B Liu, Z Lu, Z Jiang The Journal of Supercomputing 76, 7489-7518, 2020 | 33 | 2020 |
Aptner: A specific dataset for ner missions in cyber threat intelligence field X Wang, S He, Z Xiong, X Wei, Z Jiang, S Chen, J Jiang 2022 IEEE 25th international conference on computer supported cooperative …, 2022 | 32 | 2022 |
FEW-NNN: A fuzzy entropy weighted natural nearest neighbor method for flow-based network traffic attack detection L Chen, S Gao, B Liu, Z Lu, Z Jiang China Communications 17 (5), 151-167, 2020 | 29 | 2020 |
A bi-directional lstm model with attention for malicious url detection F Ren, Z Jiang, J Liu 2019 IEEE 4th Advanced Information Technology, Electronic and Automation …, 2019 | 25 | 2019 |
Spear phishing emails detection based on machine learning X Ding, B Liu, Z Jiang, Q Wang, L Xin 2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021 | 24 | 2021 |
A quality evaluation method of cyber threat intelligence in user perspective L Qiang, J Zhengwei, Y Zeming, L Baoxu, W Xin, Z Yunan 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 22 | 2018 |
Assessing the security of campus networks: the case of seven universities R Zheng, H Ma, Q Wang, J Fu, Z Jiang Sensors 21 (1), 306, 2021 | 20 | 2021 |
Retweet prediction using social-aware probabilistic matrix factorization B Jiang, Z Lu, N Li, J Wu, Z Jiang Computational Science–ICCS 2018: 18th International Conference, Wuxi, China …, 2018 | 18 | 2018 |
A method for extracting unstructured threat intelligence based on dictionary template and reinforcement learning X Wang, R Chen, B Song, J Yang, Z Jiang, X Zhang, X Li, S Ao 2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021 | 17 | 2021 |
Joint learning for document-level threat intelligence relation extraction and coreference resolution based on gcn X Wang, M Xiong, Y Luo, N Li, Z Jiang, Z Xiong 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 17 | 2020 |
A meta-synthesis approach for cloud service provider selection based on secsla J Zhengwei, D Ran, L Zhigang, W Xihong, L Baoxu 2013 International Conference on Computational and Information Sciences …, 2013 | 17 | 2013 |
Towards comprehensive detection of DNS tunnels M Luo, Q Wang, Y Yao, X Wang, P Yang, Z Jiang 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 16 | 2020 |
Producing more with less: a GAN-based network attack detection approach for imbalanced data X Hao, Z Jiang, Q Xiao, Q Wang, Y Yao, B Liu, J Liu 2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021 | 15 | 2021 |