Guanjun Lin

Orcid: 0000-0003-3280-1307

According to our database1, Guanjun Lin authored at least 20 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Boosting aquila optimizer by marine predators algorithm for combinatorial optimization.
J. Comput. Des. Eng., March, 2024

Software vulnerable functions discovery based on code composite feature.
J. Inf. Secur. Appl., 2024

2023
Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis.
J. Inf. Secur. Appl., May, 2023

The application of neural network for software vulnerability detection: a review.
Neural Comput. Appl., 2023

Intelligent detection of vulnerable functions in software through neural embedding-based code analysis.
Int. J. Netw. Manag., 2023

Sensor Network Structure Recognition Based on P-law.
Comput. Syst. Sci. Eng., 2023

2022
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization.
Secur. Commun. Networks, 2022

2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Deep neural-based vulnerability discovery demystified: data, model and performance.
Neural Comput. Appl., 2021

A Context-Aware Neural Embedding for Function-Level Vulnerability Detection.
Algorithms, 2021

2020
Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform.
Wirel. Commun. Mob. Comput., 2020

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection.
IEEE Trans. Fuzzy Syst., 2020

Software Vulnerability Detection Using Deep Neural Networks: A Survey.
Proc. IEEE, 2020

Cyber Resilience in Healthcare Digital Twin on Lung Cancer.
IEEE Access, 2020

Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020

2019
Deep Learning-Based Vulnerable Function Detection: A Benchmark.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...