Hanbing Yan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Exploring an effective automated grading model with reliability detection for large-scale online peer assessment.
J. Comput. Assist. Learn., August, 2024

VCGERG: Vulnerability Classification With Graph Embedding Algorithm on Vulnerability Report Graphs.
Int. J. Inf. Secur. Priv., 2024

Bridging computer and education sciences: A systematic review of automated emotion recognition in online learning environments.
Comput. Educ., 2024

2023
FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow Sequence.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Research on Mobile Robot Path Planning Based on A* Algorithm with Specific Node Priority.
Proceedings of the 5th International Conference on Robotics, 2023

PACLASS: A Lightweight Classification Framework on DNS-Over-HTTPS.
Proceedings of the IEEE International Conference on Communications, 2023

2022
YOLOv5-AC: Attention Mechanism-Based Lightweight YOLOv5 for Track Pedestrian Detection.
Sensors, 2022

Measurement of Malware Family Classification on a Large-Scale Real-World Dataset.
Proceedings of the IEEE International Conference on Trust, 2022

APT Attribution for Malware Based on Time Series Shapelets.
Proceedings of the IEEE International Conference on Trust, 2022

Considerations on Evaluation of Practical Cloud Data Protection.
Proceedings of the Cyber Security - 19th China Annual Conference, 2022

2021
A Secure Online Treatment Blockchain Service.
Wirel. Pers. Commun., 2021

RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Explainable APT Attribution for Malware Using NLP Techniques.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

CTSCOPY: Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

2020
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features.
Wirel. Commun. Mob. Comput., 2020

DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
CNN and RNN based payload classification methods for attack detection.
Knowl. Based Syst., 2019

A New Learning Approach to Malware Classification Using Discriminative Feature Extraction.
IEEE Access, 2019

Functions-based CFG Embedding for Malware Homology Analysis.
Proceedings of the 26th International Conference on Telecommunications, 2019

2018
DeepHTTP: Semantics-Structure Model with Attention for Anomalous HTTP Traffic Detection and Pattern Mining.
CoRR, 2018

Webshell Traffic Detection With Character-Level Features Based on Deep Learning.
IEEE Access, 2018

Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018

Information Protecting against APT Based on the Study of Cyber Kill Chain with Weighted Bayesian Classification with Correction Factor.
Proceedings of the 7th International Conference on Informatics, 2018

Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

An Android Malware Detection Method Based on Deep AutoEncoder.
Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, 2018

2017
Detecting and Predicting APT Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning.
Proceedings of the VI International Conference on Network, Communication and Computing, 2017

2014
Social Network Analysis Based on Network Motifs.
J. Appl. Math., 2014

ReSpam: A Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

2013
The Impacting Analysis on Multiple Species Competition.
Proceedings of the Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing, 2013

2012
A fast image spam filter based on ORB.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2011
As-Rigid-As-Possible Surface Morphing.
J. Comput. Sci. Technol., 2011

2008
Shape Deformation Using a Skeleton to Drive Simplex Transformations.
IEEE Trans. Vis. Comput. Graph., 2008

2007
3D Morphing Using Strain Field Interpolation.
J. Comput. Sci. Technol., 2007

2006
Skeleton-Based Shape Deformation Using Simplex Transformations.
Proceedings of the Advances in Computer Graphics, 2006

2004
Morphing based on strain field interpolation.
Comput. Animat. Virtual Worlds, 2004


  Loading...