ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation.
Inf. Softw. Technol., 2025
Reinforcement learning for few-shot text generation adaptation.
Neurocomputing, November, 2023
SRFA-GRL: Predicting group influence in social networks with graph representation learning.
Inf. Sci., August, 2023
Identify influential nodes in social networks with graph multi-head attention regression model.
Neurocomputing, April, 2023
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023
Embedding vector generation based on function call graph for effective malware detection and classification.
Neural Comput. Appl., 2022
Learning-Based Detection for Malicious Android Application Using Code Vectorization.
Secur. Commun. Networks, 2021
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain.
Comput. Secur., 2021
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.
Secur. Commun. Networks, 2020
InfGCN: Identifying influential nodes in complex networks with graph convolutional networks.
Neurocomputing, 2020
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020
A Neural Network-Based Approach for Cryptographic Function Detection in Malware.
IEEE Access, 2020
Session-Based Webshell Detection Using Machine Learning in Web Logs.
Secur. Commun. Networks, 2019
A systematic review of fuzzing based on machine learning techniques.
CoRR, 2019
InsFuzz: Fuzzing Binaries With Location Sensitivity.
IEEE Access, 2019
Fuzzing the Android Applications With HTTP/HTTPS Network Data.
IEEE Access, 2019
Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods).
计算机科学, 2018
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015