Personal information

Verified email addresses

Cyberspace security game theory, Moving Target Defense, AI Adversarial Attack and Defense, Complex Network Security, Network Security Risk Assessment
China

Biography

Hengwei Zhang received the B.S. degree in computer science and technology from Zhengzhou University in 2000, the M.S. degree in computer science and technology from Information Engineering University in 2007, and the Ph.D. degree in cyberspace security from Information Engineering University, Zhengzhou, China, in 2014.
He is a Professor with the School of Information Science and Technology, Information Engineering University, Zhengzhou, China.
His current research interests include cyber security, intelligent decision, network security game theory, AI adversarial attack and defense.
He has published more than 20 research articles in respected journals such as IEEE TIFS, TDSC, TNSM, TST, and Elsevier CSR, including several ESI Highly Cited articles. He has been granted over 30 invention patents.

Activities

Employment (3)

State Key Laboratory of Mathematical Engineering and Advanced Computing: Zhengzhou, Henan, CN

2020-01-01 to present | Professor
Employment
Source: Self-asserted source
Hengwei Zhang

Henan Key Laboratory of Information Security: Zhengzhou, Henan, CN

2019-01-01 to present | Professor
Employment
Source: Self-asserted source
Hengwei Zhang

Information Engineering University: Zhengzhou, HeNan, CN

2017-12-01 to present | Professor
Employment
Source: Self-asserted source
Hengwei Zhang

Education and qualifications (1)

Information Engineering University: Zhengzhou, Henan, CN

2010-09-01 to 2014-12-30 | Ph.D. (Doctor of Philosophy)
Education
Source: Self-asserted source
Hengwei Zhang

Works (50 of 59)

Items per page:
Page 1 of 2

Adversarial Example Soups: Improving Transferability and Stealthiness for Free

IEEE Transactions on Information Forensics and Security
2025 | Journal article
Contributors: Bo Yang; Hengwei Zhang; Jindong Wang; Yulong Yang; Chenhao Lin; Chao Shen; Zhengyu Zhao
Source: check_circle
Crossref

A Deep Reinforcement Learning-Based Deception Asset Selection Algorithm in Differential Games

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Weizhen He; Jinglei Tan; Yunfei Guo; Ke Shang; Hengwei Zhang
Source: check_circle
Crossref

Adversarial example soups: averaging multiple adversarial examples improves transferability without increasing additional generation time

arXiv
2024 | Other
EID:

2-s2.0-85187330159

Part of ISSN: 23318422
Contributors: Yang, B.; Zhang, H.; Li, C.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

An open‐set method for automatic recognition of low probability of intercept radar waveforms based on reciprocity points learning

International Journal of Numerical Modelling: Electronic Networks, Devices and Fields
2024-05 | Journal article
Part of ISSN: 0894-3370
Part of ISSN: 1099-1204
Contributors: zhilin liu; Jindong Wang; Qidong Ge; Bo Yang; Yinlong Li; Hengwei Zhang
Source: Self-asserted source
Hengwei Zhang

An adversarial example attack method based on predicted bounding box adaptive deformation in optical remote sensing images

PeerJ Computer Science
2024-05-28 | Journal article
Contributors: Leyu Dai; Jindong Wang; Bo Yang; Fan Chen; Hengwei Zhang
Source: check_circle
Crossref

A differential game approach for real-time security defense decision in scale-free networks

Computer Networks
2023 | Journal article
EID:

2-s2.0-85148547413

Part of ISSN: 13891286
Contributors: Zhang, H.; Mi, Y.; Liu, X.; Zhang, Y.; Wang, J.; Tan, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

A survey: When moving target defense meets game theory

Computer Science Review
2023 | Journal article
EID:

2-s2.0-85148543515

Part of ISSN: 15740137
Contributors: Tan, J.; Jin, H.; Zhang, H.; Zhang, Y.; Chang, D.; Liu, X.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Adversarial Example Attack Method Based on Salient Region Optimization

Jisuanji Gongcheng/Computer Engineering
2023 | Journal article
EID:

2-s2.0-85186401193

Part of ISSN: 10003428
Contributors: Li, Z.; Wang, J.; Hou, J.; Li, W.; Zhang, S.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process

IEEE Transactions on Dependable and Secure Computing
2023-11 | Journal article
Contributors: Jinglei Tan; Hui Jin; Hao Hu; Ruiqin Hu; Hongqi Zhang; Hengwei Zhang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Image classification adversarial attack with improved resizing transformation and ensemble models

PeerJ Computer Science
2023-07-25 | Journal article
Contributors: Chenwei Li; Hengwei Zhang; Bo Yang; Jindong Wang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Security defense decision method based on potential differential game for complex networks

Computers & Security
2023-06 | Journal article
Contributors: Hengwei Zhang; Yan Mi; Yumeng Fu; Xiaohu Liu; Yuchen Zhang; Jindong Wang; Jinglei Tan
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Evolutionary game decision-making method for network attack and defense based on regret minimization algorithm

Journal of King Saud University - Computer and Information Sciences
2023-03 | Journal article
Contributors: Hui Jin; Senlei Zhang; Bin Zhang; Shuqin Dong; Xiaohu Liu; Hengwei Zhang; Jinglei Tan
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Adversarial example generation with adabelief optimizer and crop invariance

Applied Intelligence
2023-01 | Journal article
Contributors: Bo Yang; Hengwei Zhang; Zheming Li; Yuchen Zhang; Kaiyong Xu; Jindong Wang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Adversarial Examples Generation Method Based on Random Translation Transformation

Jisuanji Gongcheng/Computer Engineering
2022 | Journal article
EID:

2-s2.0-85143323280

Part of ISSN: 10003428
Contributors: Li, Z.; Zhang, H.; Ma, J.; Wang, J.; Yang, B.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Misleading Image Classification with Multi-shearing and Random Padding

ACM International Conference Proceeding Series
2022 | Conference paper
EID:

2-s2.0-85150484570

Part of ISBN: 9781450397148
Contributors: Li, C.; Li, Z.; Yang, B.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network Security Defense Decision Method Based on Time Game

Jisuanji Gongcheng/Computer Engineering
2022 | Journal article
EID:

2-s2.0-85141848404

Part of ISSN: 10003428
Contributors: Sun, P.Y.; Zhang, H.W.; Tan, J.L.; Li, C.; Ma, J.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Random Transformation of image brightness for adversarial attack

Journal of Intelligent and Fuzzy Systems
2022 | Journal article
EID:

2-s2.0-85124646089

Part of ISSN: 18758967 10641246
Contributors: Yang, B.; Xu, K.; Wang, H.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier
grade
Preferred source (of 2)‎

Research review of network defense decision-making methods based on attack and defense game

Chinese Journal of Network and Information Security
2022 | Journal article
EID:

2-s2.0-85128238414

Part of ISSN: 2096109X
Contributors: Liu, X.; Zhang, H.; Ma, J.; Zhang, Y.; Tan, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games

IEEE Transactions on Network and Service Management
2022-09 | Journal article
Contributors: Hengwei Zhang; Jinglei Tan; Xiaohu Liu; Shirui Huang; Hao Hu; Yuchen Zhang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Markov Signaling Game-Theoretic Approach to Moving Target Defense Strategy Selection,基于多阶段Markov信号博弈的移动目标防御最优决策方法

Tien Tzu Hsueh Pao/Acta Electronica Sinica
2021 | Journal article
EID:

2-s2.0-85104550463

Part of ISSN: 03722112
Contributors: Jiang, L.; Zhang, H.-W.; Wang, J.-D.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Adversarial example generation with AdaBelief Optimizer and Crop Invariance

arXiv
2021 | Other
EID:

2-s2.0-85169224720

Part of ISSN: 23318422
Contributors: Yang, B.; Zhang, H.; Zhang, Y.; Xu, K.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Modeling of Network Attack and Defense Behavior and Analysis of Situation Evolution Based on Game Theory,基于博弈论的网络攻防行为建模与态势演化分析

Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
2021 | Journal article
EID:

2-s2.0-85121596756

Part of ISSN: 10095896
Contributors: Liu, X.; Zhang, H.; Zhang, Y.; Hu, H.; Cheng, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Random transformation of image brightness for adversarial attack

arXiv
2021 | Other
EID:

2-s2.0-85101267819

Part of ISSN: 23318422
Contributors: Yang, B.; Xu, K.; Wang, H.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network defense decision-making based on a stochastic game system and a deep recurrent Q-network

Computers & Security
2021-12 | Journal article
Contributors: Xiaohu Liu; Hengwei Zhang; Shuqin Dong; Yuchen Zhang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model

Computers & Security
2021-09 | Journal article
Contributors: Jinglei Tan; Hengwei Zhang; Hongqi Zhang; Hao Hu; Cheng Lei; Zhenxiang Qin
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model

Security and Communication Networks
2021-08-21 | Journal article
Contributors: Yan Mi; Hengwei Zhang; Hao Hu; Jinglei Tan; Jindong Wang; Qing Yang
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Boosting Adversarial Attacks on Neural Networks with Better Optimizer

Security and Communication Networks
2021-06-07 | Journal article
Contributors: Heng Yin; Hengwei Zhang; Jindong Wang; Ruiyu Dou; Ting Chen
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Boosting adversarial attacks on neural networks with better optimizer

arXiv
2020 | Other
EID:

2-s2.0-85169738169

Part of ISSN: 23318422
Contributors: Yin, H.; Zhang, H.; Wang, J.; Dou, R.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model

MTD 2020 - Proceedings of the 7th ACM Workshop on Moving Target Defense
2020 | Conference paper
EID:

2-s2.0-85096828746

Contributors: Zhang, H.; Tan, J.; Liu, X.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network dynamic defense system based on holographic transformation

International Journal of Distributed Sensor Networks
2020 | Journal article
EID:

2-s2.0-85084750777

Part of ISSN: 15501477 15501329
Contributors: Tan, J.; Lei, C.; Zhang, H.; Hu, H.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier
grade
Preferred source (of 2)‎

Optimal strategy selection approach of moving target defense based on Markov time game,基于Markov时间博弈的移动目标防御最优策略选取方法

Tongxin Xuebao/Journal on Communications
2020 | Journal article
EID:

2-s2.0-85083264038

Part of ISSN: 1000436X
Contributors: Tan, J.; Zhang, H.; Zhang, H.; Jin, H.; Lei, C.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model

Security and Communication Networks
2020 | Journal article
EID:

2-s2.0-85087200438

Part of ISSN: 19390122 19390114
Contributors: Tan, J.-L.; Tan, J.-L.; Zhang, H.-W.; Zhang, H.-W.; Zhang, H.-Q.; Zhang, H.-Q.; Lei, C.; Lei, C.; Jin, H.; Jin, H. et al.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier
grade
Preferred source (of 2)‎

Research on Network Attack and Defense Situation Based on Game Theory Model and NetLogo Simulation,基于博弈模型与NetLogo仿真的网络攻防态势研究

Xitong Fangzhen Xuebao / Journal of System Simulation
2020 | Journal article
EID:

2-s2.0-85092928036

Part of ISSN: 1004731X
Contributors: Liu, X.; Zhang, H.; Zhang, Y.; Ma, Z.; Lü, W.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game

Security and Communication Networks
2020-10-28 | Journal article
Contributors: Xiaohu Liu; Hengwei Zhang; Yuchen Zhang; Lulu Shao; Clemente Galdi
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Markov Differential Game Model and Its Application in Network Security,Markov微分博弈模型及其在网络安全中的应用

Tien Tzu Hsueh Pao/Acta Electronica Sinica
2019 | Journal article
EID:

2-s2.0-85066403745

Part of ISSN: 03722112
Contributors: Zhang, H.-W.; Huang, S.-R.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Optimal strategy selection method for moving target defense based on signaling game,基于信号博弈的移动目标防御最优策略选取方法

Tongxin Xuebao/Journal on Communications
2019 | Journal article
EID:

2-s2.0-85072376595

Part of ISSN: 1000436X
Contributors: Jiang, L.; Zhang, H.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Active Defense Strategy Selection Method Based on Two-Way Signaling Game

Security and Communication Networks
2019-11-29 | Journal article
Contributors: Xiaohu Liu; Hengwei Zhang; Yuchen Zhang; Lulu Shao; Jihong Han
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

A Method for Selecting Defense Strategies Based on Stochastic Evolutionary Game Model,基于随机演化博弈模型的网络防御策略选取方法

Tien Tzu Hsueh Pao/Acta Electronica Sinica
2018 | Journal article
EID:

2-s2.0-85059099074

Part of ISSN: 03722112
Contributors: Huang, J.-M.; Zhang, H.-W.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

APT-oriented Dynamic Assessment of Attack Behaviors,面向APT攻击的攻击行为动态评估方法

Xitong Fangzhen Xuebao / Journal of System Simulation
2018 | Journal article
EID:

2-s2.0-85064493294

Part of ISSN: 1004731X
Contributors: Wang, J.; Yang, H.; Zhang, H.; Li, T.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Diversified recommendation method combining topic model and random walk

Multimedia Tools and Applications
2018 | Journal article
EID:

2-s2.0-85038382436

Part of ISSN: 15737721 13807501
Contributors: Fang, C.; Zhang, H.; Wang, J.; Wang, N.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

High-dimensional Clustering Method Based on Variant Bat Algorithm,一种基于变异蝙蝠算法的高维聚类方法

Xitong Fangzhen Xuebao / Journal of System Simulation
2018 | Journal article
EID:

2-s2.0-85061643180

Part of ISSN: 1004731X
Contributors: Kou, G.; Tang, G.; He, J.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Improving replicator dynamic evolutionary game model for selecting optimal defense strategies,基于改进复制动态演化博弈模型的最优防御策略选取

Tongxin Xuebao/Journal on Communications
2018 | Journal article
EID:

2-s2.0-85051207142

Part of ISSN: 1000436X
Contributors: Huang, J.; Zhang, H.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Multi-constraint Service Selection Based on Decomposition of Global QoS,基于全局QoS分解的多约束服务选取方法

Xitong Fangzhen Xuebao / Journal of System Simulation
2018 | Journal article
EID:

2-s2.0-85064515968

Part of ISSN: 1004731X
Contributors: Fang, C.; Wang, J.; Zhang, H.; Wang, N.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network defense decision-making method based on stochastic differential game model

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Conference paper
EID:

2-s2.0-85054796179

Part of ISBN: 9783030000172
Part of ISSN: 16113349 03029743
Contributors: Huang, S.; Zhang, H.; Wang, J.; Huang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network Defense Strategy Selection Method Based on Markov Evolutionary Game,基于Markov演化博弈的网络防御策略选取方法

Tien Tzu Hsueh Pao/Acta Electronica Sinica
2018 | Journal article
EID:

2-s2.0-85054644659

Part of ISSN: 03722112
Contributors: Zhang, H.-W.; Huang, J.-M.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Network security threat warning method based on qualitative differential game,基于定性微分博弈的网络安全威胁预警方法

Tongxin Xuebao/Journal on Communications
2018 | Journal article
EID:

2-s2.0-85057292433

Part of ISSN: 1000436X
Contributors: Huang, S.; Zhang, H.; Wang, J.; Dou, R.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Personalized Service Recommendation Method Based on Random Walk and Diversified Graph Ranking,基于随机游走和多样性图排序的个性化服务推荐方法

Tien Tzu Hsueh Pao/Acta Electronica Sinica
2018 | Journal article
EID:

2-s2.0-85061347519

Part of ISSN: 03722112
Contributors: Fang, C.; Zhang, H.-W.; Wang, N.; Wang, J.-D.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Recommendations based on listwise learning-to-rank by incorporating social information

KSII Transactions on Internet and Information Systems
2018 | Journal article
EID:

2-s2.0-85042158884

Part of ISSN: 22881468 19767277
Contributors: Fang, C.; Zhang, H.; Zhang, M.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Service Recommended Trust Algorithm Based on Cloud Model Attributes Weighted Clustering,云模型属性加权聚类服务推荐信任度算法

Xitong Fangzhen Xuebao / Journal of System Simulation
2018 | Journal article
EID:

2-s2.0-85064490522

Part of ISSN: 1004731X
Contributors: Wang, J.; Yu, Z.; Zhang, H.; Fang, C.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier

Trust expansion and listwise learning-to-rank based service recommendation method,基于信任扩展和列表级排序学习的服务推荐方法

Tongxin Xuebao/Journal on Communications
2018 | Journal article
EID:

2-s2.0-85051207361

Part of ISSN: 1000436X
Contributors: Fang, C.; Zhang, H.; Zhang, M.; Wang, J.
Source: Self-asserted source
Hengwei Zhang via Scopus - Elsevier
Items per page:
Page 1 of 2

Peer review (21 reviews for 8 publications/grants)

Review activity for Computers & security. (10)
Review activity for Engineering applications of artificial intelligence. (3)
Review activity for Information and software technology. (1)
Review activity for Information fusion. (1)
Review activity for Infrared physics & technology. (1)
Review activity for Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat. (1)
Review activity for Neurocomputing. (2)
Review activity for Pattern recognition. (2)