Cheng Huang

Orcid: 0000-0002-5871-946X

Affiliations:
  • Sichuan University, Chengdu, China


According to our database1, Cheng Huang authored at least 78 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
bjEnet: a fast and accurate software bug localization method in natural language semantic space.
Softw. Qual. J., December, 2024

Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024

VioDroid-Finder: automated evaluation of compliance and consistency for Android apps.
Empir. Softw. Eng., May, 2024

CMRight: Chinese Morph Resolution based on end-to-end model combined with enhancement algorithms.
Expert Syst. Appl., 2024

PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems.
CoRR, 2024

Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence.
Comput. Secur., 2024

bjCnet: A contrastive learning-based framework for software defect prediction.
Comput. Secur., 2024

Hacker group identification based on dynamic heterogeneous graph node update.
Appl. Soft Comput., 2024

DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A framework for threat intelligence extraction and fusion.
Comput. Secur., September, 2023

bjXnet: an improved bug localization model based on code property graph and attention mechanism.
Autom. Softw. Eng., June, 2023

ExpSeeker: extract public exploit code information from social media.
Appl. Intell., June, 2023

VULDEFF: Vulnerability detection method based on function fingerprints and code differences.
Knowl. Based Syst., 2023

SecTKG: A Knowledge Graph for Open-Source Security Tools.
Int. J. Intell. Syst., 2023

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023

MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model.
Comput. Secur., 2023

Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach.
Proceedings of the Knowledge Science, Engineering and Management, 2023

An Empirical Study of Malicious Code In PyPI Ecosystem.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

APTBert: Abstract Generation and Event Extraction from APT Reports.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

IoT Malicious Traffic Detection Based on Federated Learning.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2022
PyComm: Malicious commands detection model for python scripts.
J. Intell. Fuzzy Syst., 2022

DDIML: Explainable detection model for drive-by-download attacks.
J. Intell. Fuzzy Syst., 2022

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
KSII Trans. Internet Inf. Syst., 2022

HGHAN: Hacker group identification based on heterogeneous graph attention network.
Inf. Sci., 2022

LMTracker: Lateral movement path detection based on heterogeneous graph embedding.
Neurocomputing, 2022

Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022

GraphXSS: An efficient XSS payload detection approach based on graph convolutional network.
Comput. Secur., 2022

HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network.
Comput. Secur., 2022

JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network.
Comput. Secur., 2022

Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022

Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy.
Proceedings of the Security and Privacy in Communication Networks, 2022

Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

WAIN: Automatic Web Application Identification and Naming Method.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

2021
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers.
EAI Endorsed Trans. Security Safety, 2021

Zombie Follower Recognition Based on Industrial Chain Feature Analysis.
Secur. Commun. Networks, 2021

PBDT: Python Backdoor Detection Model Based on Combined Features.
Secur. Commun. Networks, 2021

Intelligent mining vulnerabilities in python code snippets.
J. Intell. Fuzzy Syst., 2021

NEDetector: Automatically extracting cybersecurity neologisms from hacker forums.
J. Inf. Secur. Appl., 2021

Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism.
Inf., 2021

Effective method for detecting malicious PowerShell scripts based on hybrid features<sup>☆</sup>.
Neurocomputing, 2021

HackerRank: Identifying key hackers in underground forums.
Int. J. Distributed Sens. Networks, 2021

Exsense: Extract sensitive information from unstructured data.
Comput. Secur., 2021

CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network.
Comput. J., 2021

DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Malicious Packages Lurking in User-Friendly Python Package Index.
Proceedings of the 20th IEEE International Conference on Trust, 2021

CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

No Pie in the Sky: The Digital Currency Fraud Website Detection.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
ACER: detecting Shadowsocks server based on active probe technology.
J. Comput. Virol. Hacking Tech., 2020

GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.
Secur. Commun. Networks, 2020

Detecting Web Spam Based on Novel Features from Web Page Source Code.
Secur. Commun. Networks, 2020

Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.
Secur. Commun. Networks, 2020

Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020

SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods.
Digit. Investig., 2020

Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020

Detecting malicious JavaScript code based on semantic analysis.
Comput. Secur., 2020

EmailDetective: An Email Authorship Identification And Verification Model.
Comput. J., 2020

MeLAD: an integrated resource for metalloenzyme-ligand associations.
Bioinform., 2020

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020

A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020

File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification.
IEEE Access, 2020

Detecting DNS Tunnels Using Session Behavior and Random Forest Method.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Session-Based Webshell Detection Using Machine Learning in Web Logs.
Secur. Commun. Networks, 2019

Automatic Identification of Honeypot Server Using Machine Learning Techniques.
Secur. Commun. Networks, 2019

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium.
KSII Trans. Internet Inf. Syst., 2019

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.
Future Internet, 2019

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019

Analyzing and Identifying Data Breaches in Underground Forums.
IEEE Access, 2019

Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Network Attack and Defense Effectiveness Evaluation Based on Dematel Method.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Research on Malicious JavaScript Detection Technology Based on LSTM.
IEEE Access, 2018

WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Detecting Webshell Based on Random Forest with FastText.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

DeepXSS: Cross Site Scripting Detection Based on Deep Learning.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016


  Loading...