Get to know # Yuchen Zhou *** ** * ** *** Blogs by Yuchen Zhou Sort By: Recent Recent Popular *** ** * ** *** [![Detecting Malicious Campaigns with Machine Learning](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg)](https://www.paloaltonetworks.com.au/blog/2018/10/unit42-detecting-malicious-campaigns-machine-learning/) ## [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Detecting Malicious Campaigns with Machine Learning](https://www.paloaltonetworks.com.au/blog/2018/10/unit42-detecting-malicious-campaigns-machine-learning/) Unit 42 examines how using machine learning-based techniques can discover new threats and block them before they can affect our customers. Oct 12, 2018 By [Michael Weber](https://www.paloaltonetworks.com/blog/author/michael-weber/?ts=markdown "Posts by Michael Weber"), [Jiangtao Yin](https://www.paloaltonetworks.com/blog/author/jiangtao-yin/?ts=markdown "Posts by Jiangtao Yin"), [Jun Wang](https://www.paloaltonetworks.com/blog/author/jun-j-wang/?ts=markdown "Posts by Jun Wang"), [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou"), [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") and [John Harrison](https://www.paloaltonetworks.com/blog/author/john-harrison/?ts=markdown "Posts by John Harrison") *** ** * ** *** [![Engineers at Work: Automatic Static Detection of Malicious JavaScript](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/10/Javascript_3.png)](https://www.paloaltonetworks.com.au/blog/2017/10/engineers-work-automatic-static-detection-malicious-javascript/) ## [Engineers at Work](https://www.paloaltonetworks.com/blog/category/engineers/?ts=markdown) ### [Engineers at Work: Automatic Static Detection of Malicious JavaScript](https://www.paloaltonetworks.com.au/blog/2017/10/engineers-work-automatic-static-detection-malicious-javascript/) Our engineers at work examine the automatic static detection of malicious JavaScript. Oct 30, 2017 By [Brody Kutt](https://www.paloaltonetworks.com/blog/author/brody-kutt/?ts=markdown "Posts by Brody Kutt") and [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") *** ** * ** *** [![Unauthorized Coin Mining in the Browser](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg)](https://www.paloaltonetworks.com.au/blog/2017/10/unit42-unauthorized-coin-mining-browser/) ## [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Unauthorized Coin Mining in the Browser](https://www.paloaltonetworks.com.au/blog/2017/10/unit42-unauthorized-coin-mining-browser/) Unit 42 examines the pervasiveness of unauthorized coin mining inside browsers. Oct 17, 2017 By [Wayne Xin](https://www.paloaltonetworks.com/blog/author/wayne-xin/?ts=markdown "Posts by Wayne Xin"), [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou"), [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") and [Jun Wang](https://www.paloaltonetworks.com/blog/author/jun-j-wang/?ts=markdown "Posts by Jun Wang") *** ** * ** *** [](https://www.paloaltonetworks.com.au/blog/2016/01/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Angler Exploit Kit Continues to Evade Detection: Over 90,000 Websites Compr...](https://www.paloaltonetworks.com.au/blog/2016/01/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/) Exploit Kits (EK), arguably the most impactful malicious infrastructure on the Internet, constantly evolve to evade detection by security technology. Tremendous effort has been spent on tracking new variations of different EK ... Jan 11, 2016 By [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") and [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") *** ** * ** *** [](https://www.paloaltonetworks.com.au/blog/2015/11/dormant-malicious-code-discovered-on-thousands-of-websites/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Dormant Malicious Code Discovered on Thousands of Websites](https://www.paloaltonetworks.com.au/blog/2015/11/dormant-malicious-code-discovered-on-thousands-of-websites/) Note: This post was updated on November 18, 2015 to reflect new information about the initial discovery of the injected code. On November 3, 2015, ZScaler reported that a Chinese government website ... Nov 14, 2015 By [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") and [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") *** ** * ** *** *** ** * ** *** Blogs by Yuchen Zhou Sort By: Popular Popular Recent *** ** * ** *** [![Engineers at Work: Automatic Static Detection of Malicious JavaScript](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2017/10/Javascript_3.png)](https://www.paloaltonetworks.com.au/blog/2017/10/engineers-work-automatic-static-detection-malicious-javascript/) ## [Engineers at Work](https://www.paloaltonetworks.com/blog/category/engineers/?ts=markdown) ### [Engineers at Work: Automatic Static Detection of Malicious JavaScript](https://www.paloaltonetworks.com.au/blog/2017/10/engineers-work-automatic-static-detection-malicious-javascript/) Our engineers at work examine the automatic static detection of malicious JavaScript. Oct 30, 2017 By [Brody Kutt](https://www.paloaltonetworks.com/blog/author/brody-kutt/?ts=markdown "Posts by Brody Kutt") and [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") *** ** * ** *** [![Detecting Malicious Campaigns with Machine Learning](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2018/04/unit42-blog-600x300.jpg)](https://www.paloaltonetworks.com.au/blog/2018/10/unit42-detecting-malicious-campaigns-machine-learning/) ## [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Detecting Malicious Campaigns with Machine Learning](https://www.paloaltonetworks.com.au/blog/2018/10/unit42-detecting-malicious-campaigns-machine-learning/) Unit 42 examines how using machine learning-based techniques can discover new threats and block them before they can affect our customers. Oct 12, 2018 By [Michael Weber](https://www.paloaltonetworks.com/blog/author/michael-weber/?ts=markdown "Posts by Michael Weber"), [Jiangtao Yin](https://www.paloaltonetworks.com/blog/author/jiangtao-yin/?ts=markdown "Posts by Jiangtao Yin"), [Jun Wang](https://www.paloaltonetworks.com/blog/author/jun-j-wang/?ts=markdown "Posts by Jun Wang"), [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou"), [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") and [John Harrison](https://www.paloaltonetworks.com/blog/author/john-harrison/?ts=markdown "Posts by John Harrison") *** ** * ** *** [![Unauthorized Coin Mining in the Browser](https://www.paloaltonetworks.com.au/blog/wp-content/uploads/2016/09/unit42-web-banner-650x300.jpg)](https://www.paloaltonetworks.com.au/blog/2017/10/unit42-unauthorized-coin-mining-browser/) ## [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Unauthorized Coin Mining in the Browser](https://www.paloaltonetworks.com.au/blog/2017/10/unit42-unauthorized-coin-mining-browser/) Unit 42 examines the pervasiveness of unauthorized coin mining inside browsers. Oct 17, 2017 By [Wayne Xin](https://www.paloaltonetworks.com/blog/author/wayne-xin/?ts=markdown "Posts by Wayne Xin"), [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou"), [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") and [Jun Wang](https://www.paloaltonetworks.com/blog/author/jun-j-wang/?ts=markdown "Posts by Jun Wang") *** ** * ** *** [](https://www.paloaltonetworks.com.au/blog/2016/01/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Angler Exploit Kit Continues to Evade Detection: Over 90,000 Websites Compr...](https://www.paloaltonetworks.com.au/blog/2016/01/angler-exploit-kit-continues-to-evade-detection-over-90000-websites-compromised/) Exploit Kits (EK), arguably the most impactful malicious infrastructure on the Internet, constantly evolve to evade detection by security technology. Tremendous effort has been spent on tracking new variations of different EK ... Jan 11, 2016 By [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") and [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") *** ** * ** *** [](https://www.paloaltonetworks.com.au/blog/2015/11/dormant-malicious-code-discovered-on-thousands-of-websites/) ## [Malware](https://www.paloaltonetworks.com/blog/category/malware-2/?ts=markdown), [Threat Prevention](https://www.paloaltonetworks.com/blog/category/threat-prevention-2/?ts=markdown), [Unit 42](https://www.paloaltonetworks.com/blog/category/unit42/?ts=markdown) ### [Dormant Malicious Code Discovered on Thousands of Websites](https://www.paloaltonetworks.com.au/blog/2015/11/dormant-malicious-code-discovered-on-thousands-of-websites/) Note: This post was updated on November 18, 2015 to reflect new information about the initial discovery of the injected code. On November 3, 2015, ZScaler reported that a Chinese government website ... Nov 14, 2015 By [Yuchen Zhou](https://www.paloaltonetworks.com/blog/author/yuchen-zhou/?ts=markdown "Posts by Yuchen Zhou") and [Wei Xu](https://www.paloaltonetworks.com/blog/author/wei-xu/?ts=markdown "Posts by Wei Xu") *** ** * ** *** {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language