scispace - formally typeset
Z

Zixiao Kong

Researcher at Beijing Institute of Technology

Publications -  10
Citations -  172

Zixiao Kong is an academic researcher from Beijing Institute of Technology. The author has contributed to research in topics: Malware & Computer science. The author has an hindex of 3, co-authored 6 publications receiving 78 citations.

Papers
More filters
Journal ArticleDOI

MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics

TL;DR: By correlation and fusion of the static and dynamic API sequences, MalDAE is established, which gives an understandable explanation for common types of malware and provides predictive support for understanding and resisting malware.
Journal ArticleDOI

MalInsight: A systematic profiling based malware detection framework

TL;DR: An accurate and rich feature space is built which enables to depict and detect malware more effectively and the importance of the three aspects is evaluated and sorted quantitatively demonstrating that these aspects play the same effects with the optimal feature set.
Journal ArticleDOI

A Survey on Adversarial Attack in the Age of Artificial Intelligence

TL;DR: In this article, the authors provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack and introduce the concepts, types, and hazards of the adversarial attacks.
Journal ArticleDOI

Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly

TL;DR: This article systematically reviews the knowledge of malware in accordance with the most effective research route, that is, “Why?”, and summarizes the concept, type, and harm of malware, to establish a comprehensive and clear framework for anti-malware research in a correct route.
Book ChapterDOI

Identity Authentication Under Internet of Everything Based on Edge Computing

TL;DR: In the framework, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything.