2025
An Effective Docker Image Slimming Approach Based on Source Code Data Dependency Analysis.
CoRR, January, 2025
DFCL: Dual-pathway fusion contrastive learning for blind single-image visible watermark removal.
Neural Networks, 2025
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation.
Inf. Softw. Technol., 2025
2024
bjEnet: a fast and accurate software bug localization method in natural language semantic space.
Softw. Qual. J., December, 2024
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024
A variational selection mechanism for article comment generation.
Expert Syst. Appl., March, 2024
Towards robust image watermarking via random distortion assignment based meta-learning.
J. Vis. Commun. Image Represent., 2024
Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity.
Comput. Secur., 2024
bjCnet: A contrastive learning-based framework for software defect prediction.
Comput. Secur., 2024
Emotion Cause Extraction in Conversations with Response Graphing.
Proceedings of the Natural Language Processing and Chinese Computing, 2024
Preserving Content in Text Style Transfer via Normalizing Flow and Adversarial Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2024
2023
DiffuCom: A novel diffusion model for comment generation.
Knowl. Based Syst., December, 2023
Reversible adversarial steganography for security enhancement.
J. Vis. Commun. Image Represent., December, 2023
Reinforcement learning for few-shot text generation adaptation.
Neurocomputing, November, 2023
A framework for threat intelligence extraction and fusion.
Comput. Secur., September, 2023
SRFA-GRL: Predicting group influence in social networks with graph representation learning.
Inf. Sci., August, 2023
bjXnet: an improved bug localization model based on code property graph and attention mechanism.
Autom. Softw. Eng., June, 2023
Improving security for image steganography using content-adaptive adversarial perturbations.
Appl. Intell., June, 2023
Identify influential nodes in social networks with graph multi-head attention regression model.
Neurocomputing, April, 2023
An event-based opinion summarization model for long chinese text with sentiment awareness and parameter fusion mechanism.
Appl. Intell., March, 2023
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity.
Knowl. Based Syst., 2023
Fraud detection on multi-relation graphs via imbalanced and interactive learning.
Inf. Sci., 2023
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach.
Proceedings of the Knowledge Science, Engineering and Management, 2023
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
An Adaptive Gradient Neural Network to Solve Dynamic Linear Matrix Equations.
IEEE Trans. Syst. Man Cybern. Syst., 2022
A zeroing neural dynamics based acceleration optimization approach for optimizers in deep neural networks.
Neural Networks, 2022
CatVRNN: Generating category texts via multi-task learning.
Knowl. Based Syst., 2022
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography.
J. Vis. Commun. Image Represent., 2022
2021
Modified Newton Integration Algorithm With Noise Tolerance for Image Deblurring.
IEEE Trans. Computational Imaging, 2021
Zombie Follower Recognition Based on Industrial Chain Feature Analysis.
Secur. Commun. Networks, 2021
MF-COTE: A chinese opinion target extraction model based on multiple features.
J. Intell. Fuzzy Syst., 2021
Detection method for stability of microcontroller accessories based on biosensor.
J. Comput. Methods Sci. Eng., 2021
A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.
Inf. Sci., 2021
Reinforcement Learning for Few-Shot Text Generation Adaptation.
CoRR, 2021
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain.
Comput. Secur., 2021
Exsense: Extract sensitive information from unstructured data.
Comput. Secur., 2021
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020
Detecting Web Spam Based on Novel Features from Web Page Source Code.
Secur. Commun. Networks, 2020
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.
Secur. Commun. Networks, 2020
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020
基于密集连接卷积神经网络的远程监督关系抽取 (Distant Supervised Relation Extraction Based on Densely Connected Convolutional Networks).
计算机科学, 2020
基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model).
计算机科学, 2020
SecACS: Enabling lightweight secure auditable cloud storage with data dynamics.
J. Inf. Secur. Appl., 2020
Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion.
Neurocomputing, 2020
Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020
2019
Automatic Identification of Honeypot Server Using Machine Learning Techniques.
Secur. Commun. Networks, 2019
Network traffic anomaly detection algorithm using mahout classifier.
J. Intell. Fuzzy Syst., 2019
A systematic review of fuzzing based on machine learning techniques.
CoRR, 2019
Learning Domain-Independent Deep Representations by Mutual Information Minimization.
Comput. Intell. Neurosci., 2019
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.
IEEE Access, 2019
2017
Domain transfer multi-instance dictionary learning.
Neural Comput. Appl., 2017
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016
2009
A more efficient and secure dynamic ID-based remote user authentication scheme.
Comput. Commun., 2009
2008
A new mutual authentication scheme based on nonce and smart cards.
Comput. Commun., 2008