Cai Fu
Orcid: 0000-0003-4536-3537
According to our database1,
Cai Fu
authored at least 71 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection.
IEEE Trans. Software Eng., October, 2024
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems.
CoRR, 2024
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network.
Comput. Secur., 2024
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
Singular Value Manipulating: An Effective DRL-Based Adversarial Attack on Deep Convolutional Neural Network.
Neural Process. Lett., December, 2023
Ecological health analysis of wetlands in the middle reaches of Yangtze River under changing environment.
Int. J. Digit. Earth, December, 2023
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding.
ACM Trans. Softw. Eng. Methodol., September, 2023
Deciphering the Code: Distinguishing ChatGPT-Generated Code from Human-authored Code through Discriminative Feature Analysis and Dataset Optimization.
CoRR, 2023
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs.
Comput. Secur., 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023
2022
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.
Veh. Commun., 2022
IEEE Trans. Software Eng., 2022
Federated learning based multi-task feature fusion framework for code expressive semantic extraction.
Softw. Pract. Exp., 2022
IEEE Internet Things J., 2022
IFAttn: Binary code similarity analysis based on interpretable features with attention.
Comput. Secur., 2022
2021
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2021
Mob. Networks Appl., 2021
J. Inf. Secur. Appl., 2021
Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems.
Inf. Sci., 2021
Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.
CoRR, 2020
Comput. Secur., 2020
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.
Comput. Networks, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the 3rd International Conference on High Performance Compilation, 2019
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory).
计算机科学, 2017
Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
计算机科学, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the International Conference on Computer, 2014
2013
Int. J. Distributed Sens. Networks, 2013
EURASIP J. Wirel. Commun. Netw., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
2011
J. Parallel Distributed Comput., 2011
Int. J. Comput. Intell. Syst., 2011
IACR Cryptol. ePrint Arch., 2011
2010
A hybrid game model based on reputation for spectrum allocation in wireless networks.
Comput. Commun., 2010
Sci. China Inf. Sci., 2010
A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005