Xuren Wang

According to our database1, Xuren Wang authored at least 35 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Simplified-Xception: A New Way to Speed Up Malicious Code Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
Cybersecur., 2022

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022

Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention.
Proceedings of the IEEE Smartworld, 2022

Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022

A Graph Learning Approach with Audit Records for Advanced Attack Investigation.
Proceedings of the IEEE Global Communications Conference, 2022

Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Trojan Traffic Detection Based on Meta-learning.
Proceedings of the Computational Science - ICCS 2021, 2021

A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Framework for Document-level Cybersecurity Event Extraction from Open Source Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network.
Cybersecur., 2020

Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN.
Proceedings of the 19th IEEE International Conference on Trust, 2020

DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

NER in Threat Intelligence Domain with TSFL.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

Bi-LSTM: Finding Network Anomaly Based on Feature Grouping Clustering.
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020

Improved Secure Lightweight RFID Authentication Protocol.
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020

Towards Comprehensive Detection of DNS Tunnels.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Towards Network Anomaly Detection Using Graph Embedding.
Proceedings of the Computational Science - ICCS 2020, 2020

Research on Database Anomaly Access Detection Based on User Profile Construction.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
ALT-Based Route Planning in Dynamic Time-Dependent Road Networks.
Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, 2019

2012
Goal-oriented action planning in partially observable stochastic domains.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2010
Attack Detection by Rough Set Theory in Recommendation System.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2007
Application of Rough Set Theory to Intrusion Detection System.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

2006
Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006

2004
Rough Set Theory: Application in Electronic Commerce Data Mining.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004


  Loading...