Qingjun Yuan

Orcid: 0000-0002-6598-8190

According to our database1, Qingjun Yuan authored at least 15 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model.
Comput. Secur., 2025

2024
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency.
IEEE Netw. Lett., June, 2024

MMCo: using multimodal deep learning to detect malicious traffic with noisy labels.
Frontiers Comput. Sci., February, 2024

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024

Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium.
IEEE Trans. Inf. Forensics Secur., 2024

Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features.
Comput. Networks, 2024

ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise.
Comput. J., 2024

A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data.
Proceedings of the IEEE International Conference on Communications, 2024

Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
BoAu: Malicious traffic detection with noise labels based on boundary augmentation.
Comput. Secur., 2023

DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

2021
Information Security Field Event Detection Technology Based on SAtt-LSTM.
Secur. Commun. Networks, 2021

Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Make It Directly: Event Extraction Based on Tree-LSTM and Bi-GRU.
IEEE Access, 2020

2016
DrugE-Rank: improving drug-target interaction prediction of new candidate drugs or targets by ensemble learning to rank.
Bioinform., 2016


  Loading...