Primal-dual active set method for evaluating American put options on zero-coupon bonds.
Comput. Appl. Math., 2024
Semi-implicit FEM for the valuation of American options under the Heston model.
Comput. Appl. Math., March, 2022
Numerical solutions for Helmholtz equation with stochastic interface based on PML method.
J. Comput. Appl. Math., 2022
Survey of Cyberspace Resources Scanning and Analyzing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Modeling and Analysis of Cyberspace Threat Sources Based on Vulnerabilities.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
A Robust Numerical Method for the Random Interface Grating Problem via Shape Calculus, Weak Galerkin Method, and Low-Rank Approximation.
J. Sci. Comput., 2018
Computation of moments for Maxwell's equations with random interfaces via pivoted low-rank approximation.
J. Comput. Phys., 2018
Multi-level Monte Carlo weak Galerkin method with nested meshes for stochastic Brinkman problem.
J. Comput. Appl. Math., 2018
Improved traffic detection with support vector machine based on restricted Boltzmann machine.
Soft Comput., 2017
WhirlingFuzzwork: a taint-analysis-based API in-memory fuzzing framework.
Soft Comput., 2017
A Novel Algorithm for Feature Selection Used in Intrusion Detection.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
A Security Vulnerability Threat Classification Method.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Mocov: Model Based Fuzzing Through Coverage Guided Technology.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
A taint based approach for automatic reverse engineering of gray-box file formats.
Soft Comput., 2016
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm.
Proceedings of the 10th International Conference on P2P, 2015
JavaScript Malicious Codes Analysis Based on Naive Bayes Classification.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Synthesis Algorithm of Homology Detection Based on AHP.
Int. J. Comput. Intell. Syst., 2013
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Homology Detection Based on Abstract Syntax Tree Combined Simple Semantics Analysis.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010