2025
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network.
Future Gener. Comput. Syst., 2025
2024
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency.
IEEE Netw. Lett., June, 2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics.
IEEE Trans. Inf. Forensics Secur., 2024
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph.
IEEE Trans. Inf. Forensics Secur., 2024
A robust Wide & Deep learning framework for log-based anomaly detection.
Appl. Soft Comput., 2024
Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024
Portfolio-Based Incentive Mechanism Design for Cross-Device Federated Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data.
Proceedings of the IEEE International Conference on Communications, 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024
Android Malware Detection and Adversarial Methods
Springer, ISBN: 978-981-97-1458-2, 2024
2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023
Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022
Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022
2021
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021
A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021
Intelligent mining vulnerabilities in python code snippets.
J. Intell. Fuzzy Syst., 2021
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums.
J. Inf. Secur. Appl., 2021
Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021
FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021
2020
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
Secur. Commun. Networks, 2019
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019
Co-Clustering Host-Domain Graphs to Discover Malware Infection.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019
2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018
Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
Wirel. Commun. Mob. Comput., 2018
Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine.
Sensors, 2018
Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018
具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018
2017
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017
Phishing Emails Detection Using CS-SVM.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
2016
Improving data field hierarchical clustering using Barnes-Hut algorithm.
Pattern Recognit. Lett., 2016
Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
2014
Multi-party quantum private comparison protocol based on d-dimensional entangled states.
Quantum Inf. Process., 2014