Z
Zixiao Kong
Researcher at Beijing Institute of Technology
Publications - 10
Citations - 172
Zixiao Kong is an academic researcher from Beijing Institute of Technology. The author has contributed to research in topics: Malware & Computer science. The author has an hindex of 3, co-authored 6 publications receiving 78 citations.
Papers
More filters
Journal ArticleDOI
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics
TL;DR: By correlation and fusion of the static and dynamic API sequences, MalDAE is established, which gives an understandable explanation for common types of malware and provides predictive support for understanding and resisting malware.
Journal ArticleDOI
MalInsight: A systematic profiling based malware detection framework
TL;DR: An accurate and rich feature space is built which enables to depict and detect malware more effectively and the importance of the three aspects is evaluated and sorted quantitatively demonstrating that these aspects play the same effects with the optimal feature set.
Journal ArticleDOI
A Survey on Adversarial Attack in the Age of Artificial Intelligence
TL;DR: In this article, the authors provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack and introduce the concepts, types, and hazards of the adversarial attacks.
Journal ArticleDOI
Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly
TL;DR: This article systematically reviews the knowledge of malware in accordance with the most effective research route, that is, “Why?”, and summarizes the concept, type, and harm of malware, to establish a comprehensive and clear framework for anti-malware research in a correct route.
Book ChapterDOI
Identity Authentication Under Internet of Everything Based on Edge Computing
TL;DR: In the framework, the software defined network technology (SDN) is adopted to realize the global management of the deployment and application of a large number of edge equipment, which can effectively realize the effective security protection of the Internet of everything.