Saihua Cai

Orcid: 0000-0003-0743-1156

According to our database1, Saihua Cai authored at least 75 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique.
Comput. Secur., 2025

2024
Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network.
IEEE Trans. Reliab., September, 2024

A novel defect prediction method based on semantic feature enhancement.
J. Softw. Evol. Process., September, 2024

A novel test case prioritization approach for black-box testing based on K-medoids clustering.
J. Softw. Evol. Process., April, 2024

A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism.
Comput. Secur., January, 2024

A novel memory usage guided fuzzing based on particle swarm optimization.
Swarm Evol. Comput., 2024

TR-Fuzz: A syntax valid tool for fuzzing C compilers.
Sci. Comput. Program., 2024

iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks.
Sci. Comput. Program., 2024

CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning.
Knowl. Based Syst., 2024

A generalized weighted evidence fusion algorithm based on quantum modeling.
Inf. Sci., 2024

DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree.
Inf. Softw. Technol., 2024

Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism.
Inf. Softw. Technol., 2024

MIT-FRNet: Modality-invariant temporal representation learning-based feature reconstruction network for missing modalities.
Expert Syst. Appl., 2024

GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism.
Comput. Secur., 2024

SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism.
Proceedings of the IEEE International Conference on Software Analysis, 2024

JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

2023
A novel combinatorial testing approach with fuzzing strategy.
J. Softw. Evol. Process., December, 2023

An optimized feature extraction algorithm for abnormal network traffic detection.
Future Gener. Comput. Syst., December, 2023

TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism.
ACM Trans. Priv. Secur., November, 2023

BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network.
J. Syst. Softw., October, 2023

A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network.
Inf. Softw. Technol., May, 2023

A memory-related vulnerability detection approach based on vulnerability model with Petri Net.
J. Log. Algebraic Methods Program., April, 2023

Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints.
Comput. J., January, 2023

CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

2022
Research for an Adaptive Classifier Based on Dynamic Graph Learning.
Neural Process. Lett., 2022

A software defect prediction method with metric compensation based on feature selection and transfer learning.
Frontiers Inf. Technol. Electron. Eng., 2022

Detecting Outliers in Data Streams Based on Minimum Rare Pattern Mining and Pattern Matching.
Inf. Technol. Control., 2022

MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams.
Inf. Sci., 2022

Malware recognition approach based on self-similarity and an improved clustering algorithm.
IET Softw., 2022

A formalization-based vulnerability detection method for cross-subject network components.
Proceedings of the IEEE International Conference on Trust, 2022

A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

An Improved Test Case Generation Method based on Test Requirements for Testing Software Component.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

An adaptive search optimization algorithm for improving the detection capability of software vulnerability.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

A novel classification approach for Android malware based on feature fusion and natural language processing.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

2021
An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints.
Inf. Sci., 2021

An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints.
Inf. Sci., 2021

Robust Adaptive Semi-supervised Classification Method based on Dynamic Graph and Self-paced Learning.
Inf. Process. Manag., 2021

AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

L-KPCA: an efficient feature extraction method for network intrusion detection.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

An efficient dual ensemble software defect prediction method with neural network.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Visual analysis system for association-based outlier detection for data streams.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
An optimized time series combined forecasting method based on neural networks.
J. Supercomput., 2020

CAAS: a novel collective action-based ant system algorithm for solving TSP problem.
Soft Comput., 2020

Extreme Learning Machine for Supervised Classification with Self-paced Learning.
Neural Process. Lett., 2020

Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream.
Neural Comput. Appl., 2020

MiFI-Outlier: Minimal infrequent itemset-based outlier detection approach on uncertain data stream.
Knowl. Based Syst., 2020

An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns.
Expert Syst. Appl., 2020

UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams.
Appl. Intell., 2020

iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints.
Proceedings of the Information Security - 23rd International Conference, 2020

Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2020

2019
A review of improved extreme learning machine methods for data stream classification.
Multim. Tools Appl., 2019

An Efficient Outlier Detection Approach Over Uncertain Data Stream Based on Frequent Itemset Mining.
Inf. Technol. Control., 2019

WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams.
Inf. Technol. Control., 2019

Mining recent maximal frequent itemsets over data streams with sliding window.
Int. Arab J. Inf. Technol., 2019

The Environment Quality Evaluation and Prediction Algorithm Based on WSN.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Improved Bat Algorithm for Multiple Knapsack Problems.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

A Minimum Rare-Itemset-Based Anomaly Detection Method and Its Application on Sensor Data Stream.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

A Constrained Self-adaptive Sparse Combination Representation Method for Abnormal Event Detection.
Proceedings of the Big Data - 7th CCF Conference, 2019

2018
GRIDEN: An effective grid-based and density-based spatial clustering algorithm to support parallel computing.
Pattern Recognit. Lett., 2018

Gridwave: a grid-based clustering algorithm for market transaction data based on spatial-temporal density-waves and synchronization.
Multim. Tools Appl., 2018

K-DBSCAN: an efficient density-based clustering algorithm supports parallel computing.
Int. J. Simul. Process. Model., 2018

FCI-Outlier: An Efficient Frequent Closed Itemset-Based Outlier Detecting Approach on Data Stream.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018

Abnormal Detecting over Data Stream Based on Maximal Pattern Mining Technology.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018

2017
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method.
Int. J. Softw. Eng. Knowl. Eng., 2017

2016
A mining approach for component abnormal information based on monitor log.
Int. J. Simul. Process. Model., 2016


  Loading...