Cheng Huang
Orcid: 0000-0002-5871-946XAffiliations:
- Sichuan University, Chengdu, China
According to our database1,
Cheng Huang
authored at least 78 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
bjEnet: a fast and accurate software bug localization method in natural language semantic space.
Softw. Qual. J., December, 2024
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024
VioDroid-Finder: automated evaluation of compliance and consistency for Android apps.
Empir. Softw. Eng., May, 2024
CMRight: Chinese Morph Resolution based on end-to-end model combined with enhancement algorithms.
Expert Syst. Appl., 2024
PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems.
CoRR, 2024
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence.
Comput. Secur., 2024
Comput. Secur., 2024
Appl. Soft Comput., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Comput. Secur., September, 2023
bjXnet: an improved bug localization model based on code property graph and attention mechanism.
Autom. Softw. Eng., June, 2023
Appl. Intell., June, 2023
VULDEFF: Vulnerability detection method based on function fingerprints and code differences.
Knowl. Based Syst., 2023
Int. J. Intell. Syst., 2023
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model.
Comput. Secur., 2023
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach.
Proceedings of the Knowledge Science, Engineering and Management, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
2022
J. Intell. Fuzzy Syst., 2022
J. Intell. Fuzzy Syst., 2022
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
KSII Trans. Internet Inf. Syst., 2022
Inf. Sci., 2022
Neurocomputing, 2022
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network.
Comput. Secur., 2022
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network.
Comput. Secur., 2022
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network.
Comput. Secur., 2022
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy.
Proceedings of the Security and Privacy in Communication Networks, 2022
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
J. Intell. Fuzzy Syst., 2021
J. Inf. Secur. Appl., 2021
Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism.
Inf., 2021
Effective method for detecting malicious PowerShell scripts based on hybrid features<sup>☆</sup>.
Neurocomputing, 2021
Int. J. Distributed Sens. Networks, 2021
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network.
Comput. J., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021
2020
J. Comput. Virol. Hacking Tech., 2020
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things.
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.
Secur. Commun. Networks, 2020
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020
SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods.
Digit. Investig., 2020
Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020
Comput. J., 2020
Bioinform., 2020
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020
A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020
File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification.
IEEE Access, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
KSII Trans. Internet Inf. Syst., 2019
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.
Future Internet, 2019
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
IEEE Access, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016