Zhengwei Jiang, Ph.D. Tutor,Professor,CISSP
School of Cyberspace Security, University of Chinese Academy of Sciences
Institute of Information Engineering, Chinese Academy of Sciences
Email: jiangzhengwei@iie.ac.cn
Recruiting staff,postdoc for software development and data analysis of cybersecurity.
Research Areas
l Big Data Analytics for Cyber Security
l Suspicious Network Traffic Analysis
l Cyber Threat Intelligence
l Malware Analysis
l Cyber Attack Detection and Attribution
Experience
Work Experience
l 2021.10-present Institute of Information Engineering, CAS Research Group Leader, Prossefor Senior Engineer
l 2017.01-2021.10 University of Chinese Academy of Sciences Associate Professor
l2015.10-2021.10 Institute of Information Engineering, CAS Research Group Leader, Senior Engineer
l 2014.7-2015.9 Beijing E-Hualu Information Technology Co., Ltd. R&D Manager, Chief Architect of Information Security Products
Teaching Experience
- Teaching Cyber Attack Attribution & Forensics
- Teaching Frontier Technologies of Cyber Detection & Analysis
- Taught Cyber Security Risk Assessment & Emergency Response
Publications
Papers
1.Chunyan Ma, Zhengwei Jiang,Kai Zhang, Zhiting Ling, Jun Jiang, Yizhe You,Peian Yang*, Hunmin Feng. TIMFuser: A multi-granular fusion framework for cyber threat intelligence[J]. Computers & Security, 2025, 148: 104141.(CCF-B)
2.Shang Shang, Xinqiang Zhao, Zhongjiang Yao*, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang. Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent[J]. The Computer Journal, 2024: bxae.(CCF-B)
3.Shang Shang, Zhongjiang Yao*, Yepeng Yao*, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang. IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts[C]//European Symposium on Research in Computer Security. Cham: Springer Nature Switzerland, 2024: 146-165.(CCF-B)
4.Rongqi Jing, Zhengwei Jiang, Qiuyun Wang*,Shuwei Wang, Xiao Chen. From Fine-Grained to Refined: APT Malware Knowledge Graph Construction and Attribution Analysis Driven by Multi-stage Graph Computation.International Conference on Computational Science(ICCS).IEEE,2024.Springer, Cham.(IIE-B)
5.Liu Jian, Xiao Qingsai, Xin Lilin, Wang Qiuyun, Yao Yepeng, Jiang Zhengwei*, et al. M3F: A novel multi-session and multi-protocol based malware traffic fingerprinting[J]. Computer Networks, 2023, 227: 109723. (CCF-B)
6.Jian Liu , Qingsai Xiao, Zhengwei Jiang, Yepeng Yao , Qiuyun Wang*. Effectiveness Evaluation of Evasion Attack on Encrypted Malicious Traffic Detection[C]//2022 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2022: 1164-1169.(CCF-C)
7.Liu Jian, Yan Junjie, Jiang Zhengwei, Wang Xuren, Jiang Jun*. A Graph Learning Approach with Audit Records for Advanced Attack Investigation[C]//2022 IEEE Global Communications Conference (GLOBECOM). IEEE, 2022.(CCF-C)
8.Xiangyu Du, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zijing Fan*, Fangming Dong, Ning Li, Baoxu Liu. BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment[C]//International Conference on Science of Cyber Security. Springer, Cham, 2022: 421-436.(IIE-C)
9.Chen Xiao, Jiang Zhengwei, Wang Shuwei, Jing Rongqi, Ling Chen, Wang Qiuyun*.Malware Detected and Tell Me Why: An Verifiable Malware Detection Model with Graph Metric Learning[C]//International Conference on Science of Science of Cyber Security,2022.(IIE-C)
10.Binghua Song, Rong Chen , Baoxu Liu , Zhengwei Jiang ,Xuren Wang.Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence[C]//International Conference on Computational Science. Springer, Cham, 2022: 17-30.((IIE-B)
11.Rui Zheng,Qiuyun Wang, Jia He J, Jianmin Fu*,Suriguga, Zhengwei Jiang.Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network[J]. Security and Communication Networks, 2022:1-8. (CCF-C,SCI)
12.Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang*, Peian Yang , Ning Li . TriCTI: An Actionable Cyber Threat Intelligence Discovery System via Trigger-enhanced Neural Network[J]. Cybersecurity, 2022, 5(8): 1-16. (IIE-B,CCF-T2)
13.Yizhe You, Jun Jiang, Zhengwei Jiang*, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li. TIM: threat context-enhanced TTP intelligence mining on unstructured threat data [J]. Cybersecurity, 2022, 5(1): 1-17. (IIE-B,CCF-T2)
14.Xuren Wang, Mengbo Xiong*, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong. FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for Threat Intelligence Relation Extraction[C](International Conference on Software Engineering and Knowledge Engineering.1-7.2021 (CCF-C)
15.Xuren Wang, Rong Chen, Binghua Song, Jie Yang, Zhengwei Jiang*, Xiaoqing Zhang, Xiaomeng Li, Shengqin Ao.. A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 262-267. (CCF-C)
16.Zijian Jia, Yepeng Yao, Qiuyun Wang, Xuren Wang, Baoxu Liu, Zhengwei Jiang*. Trojan Traffic Detection Based on Meta-learning[C]//International Conference on Computational Science. Springer, Cham, 2021: 167-180. (IIE-B)
17.Zijing Fan, Chao Yuan, Liling Xin, Xuren Wang, Zhengwei Jiang*, Qiuyun Wang. HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 1141-1147. (CCF-C)
18.Xingran Hao, Zhengwei Jiang, Qingsai Xiao, Qiuyun Wang, Yepeng Yao*, Baoxu Liu, Jian Liu. Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 384-390. (CCF-C)
19.Ning Luo, Xiangyu Du, Yitong He, Jun Jiang, Xuren Wang, Zhengwei Jiang*, Kai Zhang. A Framework for Document-level Cybersecurity Event Extraction from Open Source Data[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 422-427. (CCF-C)
20.Shengqin Ao, Yitong He, Ning Luo, Xuren Wang, Zhengwei Jiang*, Jun Jiang. Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 391-396. (CCF-C)
21.Rui Zheng, Hao Ma, Qiuyun Wang, Jianming Fu*, Zhengwei Jiang. Assessing the Security of Campus Networks: The Case of Seven Universities [J]. Sensors, 2021, 21(1): 306. (SCI)
22.Yali Luo, Zhengwei Jiang*, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang. CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce[C]//2021 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2021: 1-6. (CCF-C)
23.Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang*. TINRE:Based on Distantly Supervision and Neural Network for Threat Intelligence Relation Extraction[C]//the 17th Annual IFIP WG 11.9 International Conference on Digital Forensics(IFIP WG 11.9),2021:1~17. (CCF-C)
24.Xuren Wang, Mengbo Xiong*, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong. Joint Learning for Document-Level Threat Intelligence Relation Extraction and co-reference Resolution Based on GCN[C]//2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 584-591. (CCF-C)
25.Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang. DNRTI: A large-scale dataset for named entity recognition in threat intelligence[C]//2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 1842-1848. (CCF-C)
26.Shuwei Wang, Qiuyun Wang, Zhengwei Jiang*, Xuren Wang, Rongqi Jing. A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification[C]//2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 2021: 3775-3782. (CCF-C)
27.Yaopeng Han, Zhigang Lu, Bo Jiang, Yuling Liu, Chen Zhang, Zhengwei Jiang, Ning Li*. MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER[C]//IFIP International Conference on Network and Parallel Computing. Springer, Cham, 2020: 43-54. (CCF-C)
28.Xuren Wang*, Zihan Xiong, Xiangyu Du, Jun Jiang, Zhengwei Jiang, Mengbo Xiong. NER in threat intelligence domain with TSFL[C]// International Conference on Natural Language Processing and Chinese Computing. Springer, Cham, 2020: 157-169. (CCF-C)
29.Liangchen Chen, Shu Gao, Baoxu Liu*, Zhigang Lu, Zhengwei Jiang. THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection[J]. The Journal of Supercomputing, 2020, 76(9): 7489-7518. (CCF-C)
30.Liangchen Chen,Shu Gao,Baoxu Liu*, Zhigang Lu, Zhengwei Jiang. FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection [J]. China Communications, 2020, 17(5): 151-167.(SCI)
31.Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang*. Towards comprehensive detection of DNS tunnels[C]//2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2020: 1-7. (CCF-C)
32.Qingsai Xiao, Jian Liu, Quiyun Wang, Zhengwei Jiang, Xuren Wang, Yepeng Yao*. Towards network anomaly detection using graph embedding[C]//International Conference on Computational Science. Springer, Cham, 2020: 156-169. (IIE-B)
33.Xiong Ding, Baoxu Liu, Zhengwei Jiang, Qiuyun Wang*, Liling Xin. Spear Phishing Emails Detection Based on Machine Learning[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 354-359. (CCF-C)
34.Fangli Ren*, Zhengwei Jiang, Xuren Wang, Jian Liu. A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network [J]. Cybersecurity, 2020, 3(1): 1-13. (IIE-B,CCF-T2)
35.Bo Jiang, Zhigang Lu*, Ning Li, Jianjun Wu, Zhengwei Jiang. Retweet prediction using social-aware probabilistic matrix factorization[C]//International Conference on Computational Science. Springer, Cham, 2018: 316-327.(IIE-B)
36.Pingchuan Ma, Bo Jiang*, Zhigang Lu, Ning Li, Zhengwei Jiang. Cybersecurity Named Entity Recognition Using Bidirectional Long Short-Term Memory with Conditional Random Fields. Tsinghua Science and Technology, 2020, 26(3): 259-265.(SCI)
37.Fangli Ren*, Zhengwei Jiang, Jian Liu. Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names[C]//2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 2019: 848-855. (CCF-C)
38.Ming Du, Jun Jiang, Zhengwei Jiang*, Zhigang Lu, Xiangyu Du. PRTIRG: a knowledge graph for people-readable threat intelligence recommendation[C]//International Conference on Knowledge Science, Engineering and Management. Springer, Cham, 2019: 47-59. (CCF-C)
39.Fangli Ren*, Zhengwei Jiang, Jian Liu. A Bi-directional LSTM model with attention for malicious URL detection[C]//2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2019, 1: 300-305.
40.Xin Wang*, Zhigang Lu, Zhengwei Jiang, Qiang Li. Poster: An Approach to Verifying Threat Intelligence Based on Graph Propagation[C]. S&P.MAY 21-23, 2018 AT THE HYATT REGENCY, SAN FRANCISCO, CA. 2018 (CCF-A)
41.Li Qiang, Jiang Zhengwei, Yang Zeming, Liu Baoxu, Wang Xin, Zhang Yunan. A quality evaluation method of cyber threat intelligence in user perspective[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 269-276. (CCF-C)
42.Qiang Li, Zeming Yang, Zhengwei Jiang*, Baoxu Liu, Yuxia Fu. Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence[C]//Proceedings of the 2017 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017). http://doi. org/10.2991/jimec-17.2017.222-230..
43.Qiang Li, Zeming Yang*, Baoxu Liu, Zhengwei Jiang. A reasoning method of cyber-attack attribution based on threat intelligence[J]. International Journal of Computer and Systems Engineering, 2016, 10(5): 920-924.
44.Qiang Li, Zeming Yang, Baoxu Liu, Zhengwei Jiang*. Framework of cyber attack attribution based on threat intelligence[M]//Interoperability, Safety and Security in IoT. Springer, Cham, 2016: 92-103.
45.Jiang Zhengwei*, Du Ran, Lu Zhigang, Wu Xihong, Liu Baoxu. A meta-synthesis approach for cloud service provider selection based on secsla[C]//2013 International Conference on Computational and Information Sciences. IEEE, 2013: 1356-1361.
Patents
Webshell Detection Method and Device Based on Graph Convolutional Neural Network, Invention Patent, 2021, Fourth Author, CN: CN113194064A
A Knowledge Graph Display Method for Malicious Codes in Network Attacks, Invention Patent, 2021, Fourth Author, CN: CN112187716B
Threat Intelligence-Oriented Security Knowledge Graph Construction Method and System, Invention Patent, 2021, Sixth Author, CN: CN109857917B
A Detection Method and Device for An Android Emulator, Invention Patent, 2021, Third Author, CN: CN112905301A
Network Attack Traffic Data Enhancement Method and System Combining Autoencoder and WGAN, Invention Patent, 2021, Fifth Author, CN: CN112688928A
Method and System of Metadata Fusion for Cyber Threat Intelligence, Invention Patent, 2021, Second Author, CN: CN112667766A
A Method and System for Offline Detection of PowerShell Malware, Invention Patent, 2021, Third Author, CN: CN110362996B
An Improved Secure Lightweight RFID Authentication Method, Invention Patent, 2021, Second Author, CN: CN112364339A
Entity Recognition Model Training Method, Threat Intelligence Entity Extraction Method and Device, Invention Patent, 2020, Third Author, CN: CN112149420A
A Text-Oriented Threat Intelligence Knowledge Graph Construction Method, Invention Patent, 2020, Third Author, CN: CN110717049B
A Method, Device and Readable Storage Medium for Generating Malware Family Classifier Based on Weakly Coupled SGAN, Invention Patent, 2020, Third Author, CN: CN111914254A
A Method and Electronic Device for Generating Annotated Corpus for Cyber Threat Intelligence, Invention Patent, 2020, Fourth Author, CN: CN111859966A
A Fingerprint Collection Method, Identity Authentication Method and Electronic Device Based on Small Area Fingerprint, Invention Patent, 2020, Second Author, CN: CN111709272A
Real-time Detection Method and Defense Method of Ransomware Based on Virtual Reading and Writing of File System, Invention Patent, 2020, Second Author, CN: CN111639336A
A URL-based Spear Phishing Email Detection Method and System, Invention Patent, 2020, Second Author, CN: CN111614543A
A Scalable Distributed Data Collection Method and System, Invention Patent, 2020, First Author, CN: CN111580954A
A Knowledge Graph Construction Method and Threat Intelligence Recommendation Method for Human-Read Threat Intelligence Recommendation, Invention Patent, 2019, Second Author, CN: CN110532480A
A Domain Name Service Risk Assessment Method and System Based on DNS Resolution Dependency, Invention Patent, 2019, Second Author, CN: CN110474872A
A Blockchain-based Threat Intelligence Exchange and Sharing Method, Invention Patent, 2019, Second Author, CN: CN109981564A
A Threat Intelligence-Oriented Entity Recognition Method and System, Invention Patent, 2019, Fourth Author, CN: CN109858018A
An HBase Secondary Index Adaptive Optimization Method and System, 2019, Fifth Author, CN: CN109800222A
A Method for Identifying the Credibility of Cyber Threat Intelligence, 2019, Second Author, CN: CN109672674A
Social Network User Behavior Prediction Method Based on Context-Aware Tensor Decomposition, 2018, Fourth Author, CN: CN108776844A
Method and System for Short Text Topic Discovery Based on Self-expanding Representation and Similar Bidirectional Constraints, 2018, Fourth Author, CN: CN108681557A
A Method and System for Automatic Source Tracing of Network Attacks Based on Threat Intelligence and Sandbox Technology, 2017, Fourth Author, CN: CN107360155A
Conferences
1. Malicious Traffic Identification Based on Adversarial Training and Multi-Session, The 11th Internet Security Conference (ISC2023), 2023.
2. Homologous Analysis of Hacker Organizations Based on PE File Genes, Huawei Network World • Security Technology Forum, 2023.
3. Traffic Threat Hunting, The 10th Internet Security Conference (ISC2022), 2022.
4. Academic research and R&D application of ATT&CK, ATT&CK Application Development Forum, 2022.
5. ATT&CK Technology Research and Application Exploration, ATT&CK Technology and Application Forum, 2021.
6. Production and Application of Cyber Threat Knowledge Intelligence, The 9th Internet Security Conference (ISC 2021), 2021.
7. Research on Threat Intelligence Extraction Technology Oriented to Unstructured Text, Threat Intelligence Technology Salon, 2020.
8. Threat Intelligence Quality Evaluation Method from User Perspective”, The 5th Internet Security Conference (ISC 2017), 2017.
Students
已指导学生
苏长鑫 硕士研究生 085211-计算机技术
王晓满 硕士研究生 085211-计算机技术
骆宁 硕士研究生 083900-网络空间安全
骆雅丽 硕士研究生 083900-网络空间安全
赵瑞哲 硕士研究生 085211-计算机技术
韩瑶鹏 硕士研究生 083900-网络空间安全
敖圣钦 硕士研究生 083900-网络空间安全
靖蓉琦 博士研究生 083900-网络空间安全
贺义通 硕士研究生 085211-计算机技术
林卓庞 硕士研究生 085212-软件工程
贺捷 硕士研究生 085211-计算机技术
夏伟 硕士研究生 085400-电子信息
李银霞 硕士研究生 085400-电子信息
韩高奎 硕士研究生 085412-网络与信息安全
马月 硕士研究生 083900-网络空间安全
现指导学生
商上 博士研究生 083900-网络空间安全
董放明 博士研究生 083900-网络空间安全
刘斌 博士研究生 083900-网络空间安全
倪锴 硕士研究生 085412-网络与信息安全
孙书樵 硕士研究生 085412-网络与信息安全
孟天宇 硕士研究生 085412-网络与信息安全
张逸鸣 硕士研究生 083900-网络空间安全
王浩钧 硕士研究生 085412-网络与信息安全
乐雯歆 博士研究生 083900-网络空间安全
涂晨鹏 博士研究生 083900-网络空间安全
张维泽 博士研究生 083900-网络空间安全
辛丽玲 博士研究生 083900-网络空间安全
陈潇 博士研究生 083900-网络空间安全
何其颖 硕士研究生 085412-网络与信息安全
康瀚文 博士研究生 083900-网络空间安全
郭凌嘉 博士研究生 083900-网络空间安全
刘静雯 博士研究生 083900-网络空间安全
董伟 博士研究生 085412-网络与信息安全
李逸飞 博士研究生 083900-网络空间安全
周健锋 硕士研究生 085412-网络与信息安全
Honors & Distinctions
l China National Cyberspace Threat Intelligence Collaboration, First Prize, Ministerial-Level Science and Technology Award, 2023
l Outstanding Teaching Award, University of Chinese Academy of Sciences, 2022
l Outstanding Graduate Course, University of Chinese Academy of Sciences, School-Level, 2021
l Research and Application of Threat Analysis and Precision Protection Technology for Important Information System of Electric Power, Second Prize, City and Prefecture Level, 2020
l Outstanding Instructor of the 3rd Beijing-Tianjin-Hebei Postgraduate Network and Information Security Technology Competition, Special Prize, City and Prefecture Level, 2019
l The Key Technology and Application of Cyber Threat Intelligence, First Prize, Institute-Level, 2018.