Limin Pan
Orcid: 0000-0002-5568-066X
According to our database1,
Limin Pan
authored at least 52 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Strongly concealed adversarial attack against text classification models with limited queries.
Neural Networks, 2025
Inf. Process. Manag., 2025
MPCA: Constructing the APTs provenance graphs through multi-perspective confidence and association.
Inf. Softw. Technol., 2025
DeepCNP: An efficient white-box testing of deep neural networks by aligning critical neuron paths.
Inf. Softw. Technol., 2025
Neurocomputing, 2025
2024
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024
Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection.
IEEE Trans. Ind. Informatics, March, 2024
HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination.
Expert Syst. Appl., March, 2024
Adapt to small-scale and long-term time series forecasting with enhanced multidimensional correlation.
Expert Syst. Appl., March, 2024
Meta-learning on dynamic node clustering knowledge graph for cold-start recommendation.
Neurocomputing, 2024
LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization.
Future Gener. Comput. Syst., 2024
FSD-CLCD: Functional semantic distillation graph learning for cross-language code clone detection.
Eng. Appl. Artif. Intell., 2024
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement.
Comput. Secur., 2024
Comput. Electr. Eng., 2024
2023
Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning.
Inf. Sci., December, 2023
A risk identification model for ICT supply chain based on network embedding and text encoding.
Expert Syst. Appl., October, 2023
VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network.
Computer, October, 2023
A novel vulnerability severity assessment method for source code based on a graph neural network.
Inf. Softw. Technol., 2023
Neurocomputing, 2023
Comput. Syst. Sci. Eng., 2023
2022
Knowl. Based Syst., 2022
Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions.
Neurocomputing, 2022
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning.
Comput. Secur., 2022
A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting.
Appl. Soft Comput., 2022
2021
Online GBDT with Chunk Dynamic Weighted Majority Learners for Noisy and Drifting Data Streams.
Neural Process. Lett., 2021
Self-selective attention using correlation between instances for distant supervision relation extraction.
Neural Networks, 2021
Improving GAN with inverse cumulative distribution function for tabular data synthesis.
Neurocomputing, 2021
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection.
Future Gener. Comput. Syst., 2021
Computer-aided intelligent design using deep multi-objective cooperative optimization algorithm.
Future Gener. Comput. Syst., 2021
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection.
Comput. Secur., 2021
2020
AIT: A method for operating system kernel function call graph generation with a virtualization technique.
KSII Trans. Internet Inf. Syst., 2020
Joint extraction of entities and relations by a novel end-to-end model with a double-pointer module.
Neurocomputing, 2020
Artif. Intell. Medicine, 2020
Proceedings of the Cyber Security Intelligence and Analytics, 2020
Proceedings of the Cyber Security Intelligence and Analytics, 2020
2019
Comput. Speech Lang., 2019
An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis.
IEEE Access, 2019
2018
Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs.
Pervasive Mob. Comput., 2018
Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization.
Neurocomputing, 2018
Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs.
Comput. Stand. Interfaces, 2018
Comput. Secur., 2018
Comput. Networks, 2018
2017
An Intelligible Risk Stratification Model Based on Pairwise and Size Constrained Kmeans.
IEEE J. Biomed. Health Informatics, 2017
Discriminative locally document embedding: Learning a smooth affine map by approximation of the probabilistic generative structure of subspace.
Knowl. Based Syst., 2017
PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs.
Comput. Networks, 2017
2015
Rule Extraction From Support Vector Machines Using Ensemble Learning Approach: An Application for Diagnosis of Diabetes.
IEEE J. Biomed. Health Informatics, 2015
Secur. Commun. Networks, 2015
2014
Exploring the effects of intervention for those at high risk of developing type 2 diabetes using a computer simulation.
Comput. Biol. Medicine, 2014
2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2006
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template.
Proceedings of the Advances in Multimedia Information Processing, 2006