Peng Jia

Orcid: 0000-0002-0455-8779

Affiliations:
  • Sichuan University, School of Cyber Science and Engineering, College of Cybersecurity, Chengdu, China (PhD 2019)
  • University of Ottawa, School of Computer Science, ON, Canada (2015-2016)


According to our database1, Peng Jia authored at least 19 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation.
Inf. Softw. Technol., 2025

2023
Reinforcement learning for few-shot text generation adaptation.
Neurocomputing, November, 2023

SRFA-GRL: Predicting group influence in social networks with graph representation learning.
Inf. Sci., August, 2023

Identify influential nodes in social networks with graph multi-head attention regression model.
Neurocomputing, April, 2023

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023

2022
Embedding vector generation based on function call graph for effective malware detection and classification.
Neural Comput. Appl., 2022

2021
Learning-Based Detection for Malicious Android Application Using Code Vectorization.
Secur. Commun. Networks, 2021

SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain.
Comput. Secur., 2021

2020
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.
Secur. Commun. Networks, 2020

InfGCN: Identifying influential nodes in complex networks with graph convolutional networks.
Neurocomputing, 2020

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020

A Neural Network-Based Approach for Cryptographic Function Detection in Malware.
IEEE Access, 2020

2019
Session-Based Webshell Detection Using Machine Learning in Web Logs.
Secur. Commun. Networks, 2019

A systematic review of fuzzing based on machine learning techniques.
CoRR, 2019

InsFuzz: Fuzzing Binaries With Location Sensitivity.
IEEE Access, 2019

Fuzzing the Android Applications With HTTP/HTTPS Network Data.
IEEE Access, 2019

2018
Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods).
计算机科学, 2018

2015
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015


  Loading...