Junfeng Wang

Orcid: 0000-0003-1699-2270

Affiliations:
  • Sichuan University, School of Aeronautics and Astronautics / College of Computer Science, Chengdu, China
  • University of Electronic Science and Technology of China, Chengdu, China (PhD 2004)


According to our database1, Junfeng Wang authored at least 68 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack.
Comput. Secur., February, 2024

SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning.
Comput. J., January, 2024

DOMR: Toward Deep Open-World Malware Recognition.
IEEE Trans. Inf. Forensics Secur., 2024

MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity.
IEEE Trans. Inf. Forensics Secur., 2024

GMADV: An android malware variant generation and classification adversarial training framework.
J. Inf. Secur. Appl., 2024

VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives.
IET Inf. Secur., 2024

2023
STIOCS: Active learning-based semi-supervised training framework for IOC extraction.
Comput. Electr. Eng., December, 2023

Learning a holistic and comprehensive code representation for code summarization.
J. Syst. Softw., September, 2023

Explainable cyber threat behavior identification based on self-adversarial topic generation.
Comput. Secur., September, 2023

HGIVul: Detecting inter-procedural vulnerabilities based on hypergraph convolution.
Inf. Softw. Technol., August, 2023

Tactics And Techniques Classification In Cyber Threat Intelligence.
Comput. J., August, 2023

DroidRL: Feature selection for android malware detection with reinforcement learning.
Comput. Secur., May, 2023

2022
LSTM Based Phishing Detection for Big Email Data.
IEEE Trans. Big Data, 2022

IoT Malware Classification Based on Lightweight Convolutional Neural Networks.
IEEE Internet Things J., 2022

Enhancing software modularization via semantic outliers filtration and label propagation.
Inf. Softw. Technol., 2022

DroidRL: Reinforcement Learning Driven Feature Selection for Android Malware Detection.
CoRR, 2022

F2DC: Android malware classification based on raw traffic and neural networks.
Comput. Networks, 2022

Advanced Persistent Threat intelligent profiling technique: A survey.
Comput. Electr. Eng., 2022

A Systematic Overview of Android Malware Detection.
Appl. Artif. Intell., 2022

2021
Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network.
Wirel. Commun. Mob. Comput., 2021

IRTS: An Intelligent and Reliable Transmission Scheme for Screen Updates Delivery in DaaS.
ACM Trans. Multim. Comput. Commun. Appl., 2021

CNN-Based Malware Variants Detection Method for Internet of Things.
IEEE Internet Things J., 2021

Randomized Multiple Model Multiple Hypothesis Tracking.
CoRR, 2021

Software plagiarism detection in multiprogramming languages using machine learning approach.
Concurr. Comput. Pract. Exp., 2021

A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning.
Appl. Soft Comput., 2021

2020
Plagiarism detection in students' programming assignments based on semantics: multimedia e-learning based smart assessment methodology.
Multim. Tools Appl., 2020

Detection of Fake IoT App Based on Multidimensional Similarity.
IEEE Internet Things J., 2020

LSA Based Smart Assessment Methodology for SDN Infrastructure in IoT Environment.
Int. J. Parallel Program., 2020

Byte-level malware classification based on markov images and deep learning.
Comput. Secur., 2020

Multiple-source ellipsoidal localization using acoustic energy measurements.
Autom., 2020

2019
LSTM-Based SQL Injection Detection Method for Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2019

A QoE-perceived screen updates transmission scheme in desktop virtualization environment.
Multim. Tools Appl., 2019

Research on large data intelligent search engine based on multilayer perceptive botnet algorithm.
J. Intell. Fuzzy Syst., 2019

AeroMRP: A Multipath Reliable Transport Protocol for Aeronautical Ad Hoc Networks.
IEEE Internet Things J., 2019

Data-flow bending: On the effectiveness of data-flow integrity.
Comput. Secur., 2019

Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model.
IEEE Access, 2019

Optimal Prediction and Update for Box Set-Membership Filter.
IEEE Access, 2019

A SQL Injection Detection Method Based on Adaptive Deep Forest.
IEEE Access, 2019

Evading Anti-Malware Engines With Deep Reinforcement Learning.
IEEE Access, 2019

Feature Selection for Malware Detection Based on Reinforcement Learning.
IEEE Access, 2019

2018
Defect Prediction in Android Binary Executables Using Deep Neural Network.
Wirel. Pers. Commun., 2018

Predicting Long-Term Trajectories of Connected Vehicles via the Prefix-Projection Technique.
IEEE Trans. Intell. Transp. Syst., 2018

FRUDP: A Reliable Data Transport Protocol for Aeronautical Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2018

Elastically Reliable Video Transport Protocol Over Lossy Satellite Links.
IEEE J. Sel. Areas Commun., 2018

A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection.
Comput. J., 2018

Software Homology Detection With Software Motifs Based on Function-Call Graph.
IEEE Access, 2018

2017
Multiple QoS Parameters-Based Routing for Civil Aeronautical Ad Hoc Networks.
IEEE Internet Things J., 2017

Online autogenerated congestion control for high-speed transfer over high BDP networks.
IET Commun., 2017

Adaptive Solitary Pulmonary Nodule Segmentation for Digital Radiography Images Based on Random Walks and Sequential Filter.
IEEE Access, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs.
IEEE Access, 2017

2016
Adaptive low-priority transfer for high bandwidth and delay product networks.
Wirel. Commun. Mob. Comput., 2016

A Generous Cooperative Routing Protocol for Vehicle-to-Vehicle Networks.
KSII Trans. Internet Inf. Syst., 2016

2015
A static Android malicious code detection method based on multi-source fusion.
Secur. Commun. Networks, 2015

Aero-Sim: An NS-2 Based Simulator for Aeronautical Ad Hoc Networks.
KSII Trans. Internet Inf. Syst., 2015

2014
Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networks.
Comput. Networks, 2014

An improved least square support vector regression algorithm for traffic flow forecasting.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Performance optimization of media distribution in overlay networks using OpenFlow.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
On-the-fly Data Compression for Efficient TCP Transmission.
KSII Trans. Internet Inf. Syst., 2013

Intrusion Detection for Black Hole and Gray Hole in MANETs.
KSII Trans. Internet Inf. Syst., 2013

2012
A Rerouting Controlled ISL Handover Protocol For LEO Satellite Networks.
KSII Trans. Internet Inf. Syst., 2012

2011
ATCS: An adaptive TCP coding scheme for satellite IP networks.
KSII Trans. Internet Inf. Syst., 2011

A Zone-Diffusion Based Routing Protocol for LEO Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Web-Based Software Reliability Analysis and Measurement System.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
A Semantic Middleware of Grain Storage Internet.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

AgOnt: Ontology for Agriculture Internet of Things.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

2008
Segment-based adaptive hyper-Erlang model for long-tailed network traffic approximation.
J. Supercomput., 2008

Transmission Systems Constellation inference for polar LEO satellite networks by delay probing.
Eur. Trans. Telecommun., 2008


  Loading...