2025
LoRa Meets Artificial Intelligence to Optimize Indoor Networks for Static EDs.
Trans. Emerg. Telecommun. Technol., February, 2025
Layer Frozen Multi-Net & Latent Space Feature-Concealed Backdoor Samples Detection.
Neural Networks, 2025
Strongly concealed adversarial attack against text classification models with limited queries.
Neural Networks, 2025
IBACodec: End-to-end speech codec with intra-inter broad attention.
Inf. Process. Manag., 2025
MPCA: Constructing the APTs provenance graphs through multi-perspective confidence and association.
Inf. Softw. Technol., 2025
DeepCNP: An efficient white-box testing of deep neural networks by aligning critical neuron paths.
Inf. Softw. Technol., 2025
Obfuscation-resilient detection of Android third-party libraries using multi-scale code dependency fusion.
Inf. Fusion, 2025
Joint contrastive learning with semantic enhanced label referents for few-shot NER.
Neurocomputing, 2025
Self-enhancing defense for protecting against model stealing attacks on deep learning systems.
Expert Syst. Appl., 2025
SCR-Spectre: Spectre gadget detection method with strengthened context relevance.
Comput. Electr. Eng., 2025
2024
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024
Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection.
IEEE Trans. Ind. Informatics, March, 2024
HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination.
Expert Syst. Appl., March, 2024
Adapt to small-scale and long-term time series forecasting with enhanced multidimensional correlation.
Expert Syst. Appl., March, 2024
Meta-learning on dynamic node clustering knowledge graph for cold-start recommendation.
Neurocomputing, 2024
LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization.
Future Gener. Comput. Syst., 2024
A novel prompt-tuning method: Incorporating scenario-specific concepts into a verbalizer.
Expert Syst. Appl., 2024
FSD-CLCD: Functional semantic distillation graph learning for cross-language code clone detection.
Eng. Appl. Artif. Intell., 2024
A Chinese Multi-label Affective Computing Dataset Based on Social Media Network Users.
CoRR, 2024
VulCatch: Enhancing Binary Vulnerability Detection through CodeT5 Decompilation and KAN Advanced Feature Extraction.
CoRR, 2024
CodePrompt: Improving Source Code-Related Classification with Knowledge Features through Prompt Learning.
CoRR, 2024
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement.
Comput. Secur., 2024
Making models more secure: An efficient model stealing detection method.
Comput. Electr. Eng., 2024
2023
Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning.
Inf. Sci., December, 2023
A risk identification model for ICT supply chain based on network embedding and text encoding.
Expert Syst. Appl., October, 2023
VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network.
Computer, October, 2023
Inpainting with Separable Mask Update Convolution Network.
Sensors, August, 2023
A novel vulnerability severity assessment method for source code based on a graph neural network.
Inf. Softw. Technol., 2023
Strengthened multiple correlation for multi-label few-shot intent detection.
Neurocomputing, 2023
Byte-Level Function-Associated Method for Malware Detection.
Comput. Syst. Sci. Eng., 2023
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023
2022
Continuous temporal network embedding by modeling neighborhood propagation process.
Knowl. Based Syst., 2022
Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions.
Neurocomputing, 2022
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning.
Comput. Secur., 2022
A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting.
Appl. Soft Comput., 2022
2021
Online GBDT with Chunk Dynamic Weighted Majority Learners for Noisy and Drifting Data Streams.
Neural Process. Lett., 2021
Self-selective attention using correlation between instances for distant supervision relation extraction.
Neural Networks, 2021
Improving GAN with inverse cumulative distribution function for tabular data synthesis.
Neurocomputing, 2021
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection.
Future Gener. Comput. Syst., 2021
Computer-aided intelligent design using deep multi-objective cooperative optimization algorithm.
Future Gener. Comput. Syst., 2021
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection.
Comput. Secur., 2021
2020
Robust boosting via self-sampling.
Knowl. Based Syst., 2020
AIT: A method for operating system kernel function call graph generation with a virtualization technique.
KSII Trans. Internet Inf. Syst., 2020
Joint extraction of entities and relations by a novel end-to-end model with a double-pointer module.
Neurocomputing, 2020
Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges.
IEEE Commun. Surv. Tutorials, 2020
A blockchain-based architecture for secure vehicular Named Data Networks.
Comput. Electr. Eng., 2020
Deep supervised learning with mixture of neural networks.
Artif. Intell. Medicine, 2020
In-Network Caching in ICN-based Vehicular Networks: Effectiveness & Performance Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Bringing Deep Learning at the Edge of Information-Centric Internet of Things.
IEEE Commun. Lett., 2019
Microblog summarization using <i>Paragraph Vector</i> and semantic structure.
Comput. Speech Lang., 2019
An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis.
IEEE Access, 2019
ARG: Automatic ROP Chains Generation.
IEEE Access, 2019
LQCC: A Link Quality-based Congestion Control Scheme in Named Data Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs.
Pervasive Mob. Comput., 2018
Security and Privacy Issues in Vehicular Named Data Networks: An Overview.
Mob. Inf. Syst., 2018
Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization.
Neurocomputing, 2018
Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs.
Comput. Stand. Interfaces, 2018
A kernel stack protection model against attacks from kernel execution units.
Comput. Secur., 2018
SVPS: Cloud-based smart vehicle parking system over ubiquitous VANETs.
Comput. Networks, 2018
An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018
2017
An Intelligible Risk Stratification Model Based on Pairwise and Size Constrained Kmeans.
IEEE J. Biomed. Health Informatics, 2017
Discriminative locally document embedding: Learning a smooth affine map by approximation of the probabilistic generative structure of subspace.
Knowl. Based Syst., 2017
PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs.
Comput. Networks, 2017
Self-paced Mixture of Regressions.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
2016
Efficient Opinion Summarization on Comments with Online-LDA.
Int. J. Comput. Commun. Control, 2016
2015
Rule Extraction From Support Vector Machines Using Ensemble Learning Approach: An Application for Diagnosis of Diabetes.
IEEE J. Biomed. Health Informatics, 2015
MOSKG: countering kernel rootkits with a secure paging mechanism.
Secur. Commun. Networks, 2015
A background subtraction algorithm for indoor monitoring surveillance systems.
Proceedings of the IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2015
2014
Exploring the effects of intervention for those at high risk of developing type 2 diabetes using a computer simulation.
Comput. Biol. Medicine, 2014
2006
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template.
Proceedings of the Advances in Multimedia Information Processing, 2006