Saihua Cai
Orcid: 0000-0003-0743-1156
According to our database1,
Saihua Cai
authored at least 75 papers
between 2016 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique.
Comput. Secur., 2025
2024
Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network.
IEEE Trans. Reliab., September, 2024
J. Softw. Evol. Process., September, 2024
A novel test case prioritization approach for black-box testing based on K-medoids clustering.
J. Softw. Evol. Process., April, 2024
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism.
Comput. Secur., January, 2024
Swarm Evol. Comput., 2024
iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks.
Sci. Comput. Program., 2024
CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning.
Knowl. Based Syst., 2024
Inf. Sci., 2024
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree.
Inf. Softw. Technol., 2024
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism.
Inf. Softw. Technol., 2024
MIT-FRNet: Modality-invariant temporal representation learning-based feature reconstruction network for missing modalities.
Expert Syst. Appl., 2024
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism.
Comput. Secur., 2024
SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
2023
J. Softw. Evol. Process., December, 2023
Future Gener. Comput. Syst., December, 2023
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur., November, 2023
BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network.
J. Syst. Softw., October, 2023
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network.
Inf. Softw. Technol., May, 2023
A memory-related vulnerability detection approach based on vulnerability model with Petri Net.
J. Log. Algebraic Methods Program., April, 2023
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
Comput. J., January, 2023
CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
2022
Neural Process. Lett., 2022
A software defect prediction method with metric compensation based on feature selection and transfer learning.
Frontiers Inf. Technol. Electron. Eng., 2022
Detecting Outliers in Data Streams Based on Minimum Rare Pattern Mining and Pattern Matching.
Inf. Technol. Control., 2022
MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams.
Inf. Sci., 2022
Malware recognition approach based on self-similarity and an improved clustering algorithm.
IET Softw., 2022
A formalization-based vulnerability detection method for cross-subject network components.
Proceedings of the IEEE International Conference on Trust, 2022
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
A novel classification approach for Android malware based on feature fusion and natural language processing.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022
2021
An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints.
Inf. Sci., 2021
An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints.
Inf. Sci., 2021
Robust Adaptive Semi-supervised Classification Method based on Dynamic Graph and Self-paced Learning.
Inf. Process. Manag., 2021
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021
An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
J. Supercomput., 2020
Soft Comput., 2020
Neural Process. Lett., 2020
Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream.
Neural Comput. Appl., 2020
MiFI-Outlier: Minimal infrequent itemset-based outlier detection approach on uncertain data stream.
Knowl. Based Syst., 2020
An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns.
Expert Syst. Appl., 2020
UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams.
Appl. Intell., 2020
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints.
Proceedings of the Information Security - 23rd International Conference, 2020
Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2020
2019
A review of improved extreme learning machine methods for data stream classification.
Multim. Tools Appl., 2019
An Efficient Outlier Detection Approach Over Uncertain Data Stream Based on Frequent Itemset Mining.
Inf. Technol. Control., 2019
WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams.
Inf. Technol. Control., 2019
Int. Arab J. Inf. Technol., 2019
Proceedings of the Fuzzy Systems and Data Mining V, 2019
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019
A Minimum Rare-Itemset-Based Anomaly Detection Method and Its Application on Sensor Data Stream.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019
A Constrained Self-adaptive Sparse Combination Representation Method for Abnormal Event Detection.
Proceedings of the Big Data - 7th CCF Conference, 2019
2018
GRIDEN: An effective grid-based and density-based spatial clustering algorithm to support parallel computing.
Pattern Recognit. Lett., 2018
Gridwave: a grid-based clustering algorithm for market transaction data based on spatial-temporal density-waves and synchronization.
Multim. Tools Appl., 2018
K-DBSCAN: an efficient density-based clustering algorithm supports parallel computing.
Int. J. Simul. Process. Model., 2018
FCI-Outlier: An Efficient Frequent Closed Itemset-Based Outlier Detecting Approach on Data Stream.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018
2017
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method.
Int. J. Softw. Eng. Knowl. Eng., 2017
2016
Int. J. Simul. Process. Model., 2016