Jingfeng Xue
Orcid: 0000-0002-3087-9701
According to our database1,
Jingfeng Xue
authored at least 57 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Privacy-Preserving and Revocable Redactable Blockchains With Expressive Policies in IoT.
IEEE Internet Things J., November, 2024
An empirical study of problems and evaluation of IoT malware classification label sources.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Flash controller-based secure execution environment for protecting code confidentiality.
J. Syst. Archit., 2024
Strengthening LLM ecosystem security: Preventing mobile malware from manipulating LLM-based applications.
Inf. Sci., 2024
Internet Things, 2024
Classifier Clustering and Feature Alignment for Federated Learning under Distributed Concept Drift.
CoRR, 2024
Connect. Sci., 2024
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module.
Comput. Secur., 2024
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2024
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
J. Inf. Secur. Appl., September, 2023
Sensors, August, 2023
A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA).
Comput. Secur., June, 2023
Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023
Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications.
Expert Syst. Appl., 2023
DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication.
Proceedings of the Blockchain Technology and Emerging Applications, 2023
2022
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT.
Inf. Sci., 2022
Int. J. Intell. Syst., 2022
Proceedings of the Computer Science and Education - 17th International Conference, 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
2021
Wirel. Commun. Mob. Comput., 2021
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.
Inf. Sci., 2021
Int. J. Intell. Syst., 2021
A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model.
Proceedings of the 21st International Conference on Communication Technology, 2021
2020
Secur. Commun. Networks, 2020
IEEE Access, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
J. Netw. Comput. Appl., 2019
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine.
IET Inf. Secur., 2019
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics.
Comput. Secur., 2019
IEEE Access, 2019
Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.
IEEE Access, 2019
2018
Secur. Commun. Networks, 2018
An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis.
Secur. Commun. Networks, 2018
A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation Domain.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Class Level Research on Modifying Information Transmission Path of the Cooperative Network Based on the Cohesion of Class.
Proceedings of the Fuzzy Systems and Data Mining III, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016
Autom. Control. Comput. Sci., 2016
2015
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015
2014
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
IEICE Trans. Inf. Syst., 2014
Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set.
Proceedings of the Trusted Systems - 6th International Conference, 2014
2013
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis.
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2011
Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering, 2011
2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007