• Zhengwei Jiang, Ph.D. Tutor,Professor,CISSP

  • School of Cyberspace Security, University of Chinese Academy of Sciences

  • Institute of Information Engineering, Chinese Academy of Sciences

  • Email:

  • Recruiting staff,postdoc and interns for software development  and security data analysis.

Research Areas

l  Big Data Analytics for Cyber Security

l  Suspicious Network Traffic Analysis

l  Cyber Threat Intelligence

l  Malware Analysis

l  Cyber Attack Detection and Attribution


Work Experience

l 2021.10-present      Institute of Information Engineering, CAS       Research Group Leader, Prossefor Senior Engineer

l2015.10-2021.10      Institute of Information Engineering, CAS       Research Group Leader, Senior Engineer

l 2014.7-2015.9          Beijing E-Hualu Information Technology Co., Ltd.    R&D Manager, Chief Architect of Information Security Products

Teaching Experience

  • Teaching Cyber Attack Attribution & Forensics  
  • Teaching Frontier Technologies of Cyber Detection & Analysis
  • Taught Cyber Security Risk Assessment & Emergency Response



  1. Rui Zheng,Qiuyun Wang, Jia He J, Jianmin Fu*,Suriguga, Zhengwei Jiang.Cryptocurrency Mining Malware Detection Based on Behavior Pattern and Graph Neural Network[J]. Security and Communication Networks, 2022:1-8. (CCF-C,SCI)

  2. Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang*, Peian Yang , Ning Li . TriCTI: An Actionable Cyber Threat Intelligence Discovery System via Trigger-enhanced Neural Network[J]. Cybersecurity, 2022, 5(8): 1-16. (IIE-B,CCF-T2)

  3. Yizhe You, Jun Jiang, Zhengwei Jiang*, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li. TIM: threat context-enhanced TTP intelligence mining on unstructured threat data [J]. Cybersecurity, 2022, 5(1): 1-17. (IIE-B,CCF-T2)

  4. Xuren Wang, Mengbo Xiong*, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong. FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for Threat Intelligence Relation Extraction[C](International Conference on Software Engineering and Knowledge Engineering.1-7.2021 (CCF-C)

  5. Xuren Wang, Rong Chen, Binghua Song, Jie Yang, Zhengwei Jiang*, Xiaoqing Zhang, Xiaomeng Li, Shengqin Ao.. A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 262-267. (CCF-C)

  6. Zijian Jia, Yepeng Yao, Qiuyun Wang, Xuren Wang, Baoxu Liu, Zhengwei Jiang*. Trojan Traffic Detection Based on Meta-learning[C]//International Conference on Computational Science. Springer, Cham, 2021: 167-180. (IIE-B)

  7. Zijing Fan, Chao Yuan, Liling Xin, Xuren Wang, Zhengwei Jiang*, Qiuyun Wang. HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 1141-1147. (CCF-C)

  8. Xingran Hao, Zhengwei Jiang, Qingsai Xiao, Qiuyun Wang, Yepeng Yao*, Baoxu Liu, Jian Liu. Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 384-390. (CCF-C)

  9. Ning Luo, Xiangyu Du, Yitong He, Jun Jiang, Xuren Wang, Zhengwei Jiang*, Kai Zhang. A Framework for Document-level Cybersecurity Event Extraction from Open Source Data[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 422-427. (CCF-C)

  10.  Shengqin Ao, Yitong He, Ning Luo, Xuren Wang, Zhengwei Jiang*, Jun Jiang. Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 391-396. (CCF-C)

  11. Rui Zheng, Hao Ma, Qiuyun Wang, Jianming Fu*, Zhengwei Jiang. Assessing the Security of Campus Networks: The Case of Seven Universities [J]. Sensors, 2021, 21(1): 306. (SCI)

  12.  Yali Luo, Zhengwei Jiang*, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang. CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce[C]//2021 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2021: 1-6. (CCF-C)

  13.  Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang*. TINRE:Based on Distantly Supervision and Neural Network for Threat Intelligence Relation Extraction[C]//the 17th Annual IFIP WG 11.9 International Conference on Digital Forensics(IFIP WG 11.9),2021:1~17. (CCF-C)

  14. Xuren Wang, Mengbo Xiong*, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong. Joint Learning for Document-Level Threat Intelligence Relation Extraction and co-reference Resolution Based on GCN[C]//2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 584-591. (CCF-C)

  15. Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang. DNRTI: A large-scale dataset for named entity recognition in threat intelligence[C]//2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020: 1842-1848. (CCF-C)

  16. Shuwei Wang, Qiuyun Wang, Zhengwei Jiang*, Xuren Wang, Rongqi Jing. A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification[C]//2020 25th International Conference on Pattern Recognition (ICPR). IEEE, 2021: 3775-3782. (CCF-C)

  17. Yaopeng Han, Zhigang Lu, Bo Jiang, Yuling Liu, Chen Zhang, Zhengwei Jiang, Ning Li*. MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER[C]//IFIP International Conference on Network and Parallel Computing. Springer, Cham, 2020: 43-54. (CCF-C)

  18. Xuren Wang*, Zihan Xiong, Xiangyu Du, Jun Jiang, Zhengwei Jiang, Mengbo Xiong. NER in threat intelligence domain with TSFL[C]// International Conference on Natural Language Processing and Chinese Computing. Springer, Cham, 2020: 157-169. (CCF-C)

  19. Liangchen Chen, Shu Gao, Baoxu Liu*, Zhigang Lu, Zhengwei Jiang. THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection[J]. The Journal of Supercomputing, 2020, 76(9): 7489-7518. (CCF-C)

  20. Liangchen Chen,Shu Gao,Baoxu Liu*, Zhigang Lu, Zhengwei Jiang. FEW-NNN: A Fuzzy Entropy Weighted Natural Nearest Neighbor Method for Flow-Based Network Traffic Attack Detection [J]. China Communications, 2020, 17(5): 151-167.(SCI)

  21. Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang*. Towards comprehensive detection of DNS tunnels[C]//2020 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2020: 1-7. (CCF-C)

  22. Qingsai Xiao, Jian Liu, Quiyun Wang, Zhengwei Jiang, Xuren Wang, Yepeng Yao*. Towards network anomaly detection using graph embedding[C]//International Conference on Computational Science. Springer, Cham, 2020: 156-169. (IIE-B)

  23. Xiong Ding, Baoxu Liu, Zhengwei Jiang, Qiuyun Wang*, Liling Xin. Spear Phishing Emails Detection Based on Machine Learning[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2021: 354-359. (CCF-C)

  24. Fangli Ren*, Zhengwei Jiang, Xuren Wang, Jian Liu. A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network [J]. Cybersecurity, 2020, 3(1): 1-13. (IIE-B,CCF-T2)

  25. Bo Jiang, Zhigang Lu*, Ning Li, Jianjun Wu, Zhengwei Jiang. Retweet prediction using social-aware probabilistic matrix factorization[C]//International Conference on Computational Science. Springer, Cham, 2018: 316-327.(IIE-B)

  26. Pingchuan Ma, Bo Jiang*, Zhigang Lu, Ning Li, Zhengwei Jiang. Cybersecurity Named Entity Recognition Using Bidirectional Long Short-Term Memory with Conditional Random Fields. Tsinghua Science and Technology, 2020, 26(3): 259-265.(SCI)

  27. Fangli Ren*, Zhengwei Jiang, Jian Liu. Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names[C]//2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 2019: 848-855. (CCF-C)

  28.  Ming Du, Jun Jiang, Zhengwei Jiang*, Zhigang Lu, Xiangyu Du. PRTIRG: a knowledge graph for people-readable threat intelligence recommendation[C]//International Conference on Knowledge Science, Engineering and Management. Springer, Cham, 2019: 47-59. (CCF-C)

  29. Fangli Ren*, Zhengwei Jiang, Jian Liu. A Bi-directional LSTM model with attention for malicious URL detection[C]//2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2019, 1: 300-305.

  30. Xin Wang*, Zhigang Lu, Zhengwei Jiang, Qiang Li. Poster: An Approach to Verifying Threat Intelligence Based on Graph Propagation[C]. S&P.MAY 21-23, 2018 AT THE HYATT REGENCY, SAN FRANCISCO, CA. 2018 (CCF-A

  31. Li Qiang, Jiang Zhengwei, Yang Zeming, Liu Baoxu, Wang Xin, Zhang Yunan. A quality evaluation method of cyber threat intelligence in user perspective[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 269-276. (CCF-C)

  32. Qiang Li, Zeming Yang, Zhengwei Jiang*, Baoxu Liu, Yuxia Fu. Association Analysis Of Cyber-Attack Attribution Based On Threat Intelligence[C]//Proceedings of the 2017 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017). http://doi. org/10.2991/jimec-17.2017.222-230..

  33. Qiang Li, Zeming Yang*, Baoxu Liu, Zhengwei Jiang. A reasoning method of cyber-attack attribution based on threat intelligence[J]. International Journal of Computer and Systems Engineering, 2016, 10(5): 920-924.

  34. Qiang Li, Zeming Yang, Baoxu Liu, Zhengwei Jiang*. Framework of cyber attack attribution based on threat intelligence[M]//Interoperability, Safety and Security in IoT. Springer, Cham, 2016: 92-103.

  35. ​Jiang Zhengwei*, Du Ran, Lu Zhigang, Wu Xihong, Liu Baoxu. A meta-synthesis approach for cloud service provider selection based on secsla[C]//2013 International Conference on Computational and Information Sciences. IEEE, 2013: 1356-1361.


  1. Webshell Detection Method and Device Based on Graph Convolutional Neural Network, Invention Patent, 2021, Fourth Author, CN: CN113194064A

  2. A Knowledge Graph Display Method for Malicious Codes in Network Attacks, Invention Patent, 2021, Fourth Author, CN: CN112187716B

  3. Threat Intelligence-Oriented Security Knowledge Graph Construction Method and System, Invention Patent, 2021, Sixth Author, CN: CN109857917B

  4. A Detection Method and Device for An Android Emulator, Invention Patent, 2021, Third Author, CN: CN112905301A

  5. Network Attack Traffic Data Enhancement Method and System Combining Autoencoder and WGAN, Invention Patent, 2021, Fifth Author, CN: CN112688928A

  6. Method and System of Metadata Fusion for Cyber Threat Intelligence, Invention Patent, 2021, Second Author, CN: CN112667766A

  7.  A Method and System for Offline Detection of PowerShell Malware, Invention Patent, 2021, Third Author, CN: CN110362996B

  8. An Improved Secure Lightweight RFID Authentication Method, Invention Patent, 2021, Second Author, CN: CN112364339A

  9. Entity Recognition Model Training Method, Threat Intelligence Entity Extraction Method and Device, Invention Patent, 2020, Third Author, CN: CN112149420A

  10. A Text-Oriented Threat Intelligence Knowledge Graph Construction Method, Invention Patent, 2020, Third Author, CN: CN110717049B

  11.  A Method, Device and Readable Storage Medium for Generating Malware Family Classifier Based on Weakly Coupled SGAN, Invention Patent, 2020, Third Author, CN: CN111914254A

  12. A Method and Electronic Device for Generating Annotated Corpus for Cyber Threat Intelligence, Invention Patent, 2020, Fourth Author, CN: CN111859966A

  13. A Fingerprint Collection Method, Identity Authentication Method and Electronic Device Based on Small Area Fingerprint, Invention Patent, 2020, Second Author, CN: CN111709272A

  14. Real-time Detection Method and Defense Method of Ransomware Based on Virtual Reading and Writing of File System, Invention Patent, 2020, Second Author, CN: CN111639336A

  15. A URL-based Spear Phishing Email Detection Method and System, Invention Patent, 2020, Second Author, CN: CN111614543A

  16.  A Scalable Distributed Data Collection Method and System, Invention Patent, 2020, First Author, CN: CN111580954A

  17. A Knowledge Graph Construction Method and Threat Intelligence Recommendation Method for Human-Read Threat Intelligence Recommendation, Invention Patent, 2019, Second Author, CN: CN110532480A

  18. A Domain Name Service Risk Assessment Method and System Based on DNS Resolution Dependency, Invention Patent, 2019, Second Author, CN: CN110474872A

  19. A Blockchain-based Threat Intelligence Exchange and Sharing Method, Invention Patent, 2019, Second Author, CN: CN109981564A

  20. A Threat Intelligence-Oriented Entity Recognition Method and System, Invention Patent, 2019, Fourth Author, CN: CN109858018A

  21. An HBase Secondary Index Adaptive Optimization Method and System, 2019, Fifth Author, CN: CN109800222A

  22. A Method for Identifying the Credibility of Cyber Threat Intelligence, 2019, Second Author, CN: CN109672674A

  23. Social Network User Behavior Prediction Method Based on Context-Aware Tensor Decomposition, 2018, Fourth Author, CN: CN108776844A

  24. Method and System for Short Text Topic Discovery Based on Self-expanding Representation and Similar Bidirectional Constraints, 2018, Fourth Author, CN: CN108681557A

  25. ​A Method and System for Automatic Source Tracing of Network Attacks Based on Threat Intelligence and Sandbox Technology, 2017, Fourth Author, CN: CN107360155A

Research Interests

  • ​Cyber Threat Intelligence

  • Network Traffic Analysis

  • Malware Analysis

  • Cyber Security Data Mining


  1. Academic research and R&D application of ATT&CK, ATT&CK Application Development Forum, 2022.1.13

  2. ATT&CK Technology Research and Application Exploration, ATT&CK Technology and Application Forum, 2021.9.9

  3. Production and Application of Cyber Threat Knowledge Intelligence, The ninth Internet Security Conference(ISC 2021), 2021.7.29

  4. ​Research on Threat Intelligence Extraction Technology Oriented to Unstructured Text, Threat Intelligence Technology Salon, 2020.7.25

  5. Key Note Speech “Threat Intelligence Quality Evaluation Method from User Perspective” on The Fifth Internet Security Conference(ISC 2017), 2017.9.12



苏长鑫  硕士研究生  085211-计算机技术  

王晓满  硕士研究生  085211-计算机技术  

骆宁  硕士研究生  083900-网络空间安全  

骆雅丽  硕士研究生  083900-网络空间安全  

赵瑞哲  硕士研究生  085211-计算机技术  

韩瑶鹏  硕士研究生  083900-网络空间安全  

敖圣钦  硕士研究生  083900-网络空间安全  

贺义通  硕士研究生  085211-计算机技术  

林卓庞  硕士研究生  085212-软件工程  

贺捷  硕士研究生  085211-计算机技术  


夏伟  硕士研究生  085400-电子信息  

李银霞  硕士研究生  085400-电子信息  

韩高奎  硕士研究生  085400-电子信息  

陈潇  硕士研究生  083900-网络空间安全  

马月  硕士研究生  083900-网络空间安全  

Honors & Distinctions

  1. l  Key Technologies and Applications of Hidden Attack Discovery and Source Tracing, Second Prize, Ministry Level, 2021

  2. l  Research and Application of Threat Analysis and Precision Protection Technology for Important Information System of Electric Power, Second Prize, City and Prefecture Level, 2020

  3. l  Outstanding Instructor of the 3rd Beijing-Tianjin-Hebei Postgraduate Network and Information Security Technology Competition, Special Prize, City and Prefecture Level, 2019

  4. l  The Key Technology and Application of Cyber Threat Intelligence, First Prize, Research Institute Level, 2018

  5. l  Advanced Cyber Threat Monitoring System and Application, Third Prize, Ministerial Tech Awards,2017