default search action
Zhongru Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j7]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Peng Liao, Shouyou Song:
Framework for understanding intention-unbreakable malware. Sci. China Inf. Sci. 66(4) (2023) - [j6]Zhongru Wang, Xinzhou Xie, Lei Chen, Shouyou Song, Zhongjie Wang:
Intrusion Detection and Network Information Security Based on Deep Learning Algorithm in Urban Rail Transit Management System. IEEE Trans. Intell. Transp. Syst. 24(2): 2135-2143 (2023) - 2020
- [j5]Tiantian Ji, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j4]Zhongru Wang, Qiang Ruan:
Research on network security subsystem based on digital signal. J. Intell. Fuzzy Syst. 38(1): 97-103 (2020) - 2019
- [j3]Guohua Wu, Guangen Tang, Zhongru Wang, Zhen Zhang, Zhen Wang:
An Attention-Based BiLSTM-CRF Model for Chinese Clinic Named Entity Recognition. IEEE Access 7: 113942-113949 (2019) - [j2]Zhongru Wang, Yuntao Zhang, Zhihong Tian, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j1]Zhongru Wang, Binxing Fang:
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J. Supercomput. 75(9): 5965 (2019)
Conference and Workshop Papers
- 2022
- [c11]Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. DSC 2022: 71-78 - [c10]Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang:
Automated Vulnerability Discovery System Based on Hybrid Execution. DSC 2022: 234-241 - [c9]Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. TrustCom 2022: 159-166 - 2021
- [c8]Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. TrustCom 2021: 569-576 - 2020
- [c7]Zhongru Wang, Peixin Cong, Weiqiang Yu:
Malicious Code Detection Technology Based on Metadata Machine Learning. DSC 2020: 394-399 - 2019
- [c6]Yue Wu, Zhongru Wang, Qiang Ruan, Jinyu Shi, Binxing Fang:
Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain. BigComp 2019: 1-7 - [c5]Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. DSC 2019: 46-53 - [c4]Qing Meng, Yongheng Wang, Jingbin An, Zhongru Wang, Baoxing Zhang, Lijie Liu:
Learning Non-Stationary Dynamic Bayesian Network Structure from Data Stream. DSC 2019: 128-134 - [c3]Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. DSC 2019: 373-380 - [c2]Shouyou Song, Zhongru Wang, Shuai Xu, Shi-Ce Ni, Jia Xiao:
A Novel Text Classification Approach Based on Word2vec and TextRank Keyword Extraction. DSC 2019: 536-543 - 2018
- [c1]Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang:
The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques. DSC 2018: 53-60
Informal and Other Publications
- 2020
- [i4]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Jiawen Diao, Tian Wang, Weiqiang Yu:
First Step Towards Modeling Unbreakable Malware. CoRR abs/2008.06163 (2020) - 2018
- [i3]Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang:
The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques. CoRR abs/1805.11001 (2018) - [i2]Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu, Binxing Fang:
Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method. CoRR abs/1811.10857 (2018) - [i1]Yu Han, Zhongru Wang, Qiang Ruan, Binxing Fang:
Sapiens Chain: A Blockchain-based Cybersecurity Framework. CoRR abs/1811.10868 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint