Jie Zhang

ORCID: 0000-0002-8405-4713
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Infrastructure Resilience and Vulnerability Analysis
  • Evacuation and Crowd Dynamics
  • Complex Network Analysis Techniques
  • Advanced Malware Detection Techniques
  • Cybercrime and Law Enforcement Studies

The rapid advancements in large language models (LLMs) have opened new avenues across various fields, including cybersecurity, which faces an ever-evolving threat landscape and need for innovative technologies. Despite initial explorations into the application of LLMs there is a lack comprehensive overview this research area. This paper bridge gap by providing systematic literature review, encompassing analysis over 180 works, spanning 25 more than 10 downstream scenarios. Our addresses...

10.48550/arxiv.2405.03644 preprint EN arXiv (Cornell University) 2024-05-06

The UAV (Unmanned Aerial Vehicle) has the advantages of mobility and flexibility, rapid concealment holistic vision. Coordinating with intelligent efficient precise dispatching “decision module” command centre, UAVs can meet public safety needs significant events. marathon is an open, long-distance, gathering sporting event, so on-site security hard to guarantee. To study application in risk early warning, we examine Hangzhou Marathon as example, analysing potential risks a scenarios by...

10.3233/jcm-226891 article EN Journal of Computational Methods in Sciences and Engineering 2023-06-20

With the development of Internet technology, open networks and standardized protocols bring more potential security threats. How to propose effective identification prevention methods for some typical malicious program attacks is an important issue be considered active defense. However, most do not analyze risk in attack behavior, so this paper proposes a model based on dependency analysis. The takes character text as input, behavior string subjected word splitting embedding operations....

10.1145/3568199.3568227 article EN 2022-09-23

For attacks on systems during operation, the high false positive rate of traditional machine learning models is no longer able to detect cyber with accuracy. In this paper, we propose a behavior detection model based sequence and graph contrastive learning. The uses instruction strings from UNIX system records as input potential internal attacks. To better learn information, use two parallel algorithms Long Short-Term Memory Network (LSTM) Graph Attention (GAT), encode their complex...

10.1145/3568199.3568225 article EN 2022-09-23
Coming Soon ...