Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in 26th IEEE Symposium on Computers and Communications (ISCC 2021), 2021
In this work, we hide malware inside of neural network models without causing accuracy loss.
Recommended citation: Wang, Z., Liu, C., & Cui, X. (2021). Evilmodel: hiding malware inside of neural network models. In 2021 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE. https://doi.org/10.1109/ISCC53001.2021.9631425
Published in Journal of Cyber Security, 2022
This is a survey on the application of AI in cyber threats.
Recommended citation: Wang, Z., Yin, J., Cui, X., et al. AI-Powered Cyber Threats: A Survey (in Chinese). Journal of Cyber Security, Accept https://jcs.iie.ac.cn/ch/reader/pdf.aspx?file_no=202204120000001
Published in Computers & Security, 2022
This is an extension of EvilModel.
Recommended citation: Wang, Z., Liu, C., Cui, X., et al. (2022). EvilModel 2.0: Bringing Neural Network Models into Malware Attacks. Computers & Security, 120, 102807. https://doi.org/10.1016/j.cose.2022.102807
Published in The 24th International Conference on Information and Communications Security (ICICS 2022), 2022
We built a covert command and control channel using AI on OSNs.
Recommended citation: Wang, Z., Liu, C., Cui, X., et al. (2022). DeepC2: AI-Powered Covert Command and Control on OSNs. In: Alcaraz, C., Chen, L., Li, S., Samarati, P. (eds) Information and Communications Security. ICICS 2022. Lecture Notes in Computer Science, vol 13407. Springer, Cham. https://doi.org/10.1007/978-3-031-15777-6_22
Published:
This is the presentation about the EvilModel paper on ISCC 2021. (Slides)
Published:
This is the presentation about the DeepC2 paper on ICICS 2022. (Slides)
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.