Senlin Luo

Orcid: 0000-0002-7729-5439

According to our database1, Senlin Luo authored at least 63 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024

Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection.
IEEE Trans. Ind. Informatics, March, 2024

HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination.
Expert Syst. Appl., March, 2024

Adapt to small-scale and long-term time series forecasting with enhanced multidimensional correlation.
Expert Syst. Appl., March, 2024

Meta-learning on dynamic node clustering knowledge graph for cold-start recommendation.
Neurocomputing, 2024

LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization.
Future Gener. Comput. Syst., 2024

A novel prompt-tuning method: Incorporating scenario-specific concepts into a verbalizer.
Expert Syst. Appl., 2024

FSD-CLCD: Functional semantic distillation graph learning for cross-language code clone detection.
Eng. Appl. Artif. Intell., 2024

VulCatch: Enhancing Binary Vulnerability Detection through CodeT5 Decompilation and KAN Advanced Feature Extraction.
CoRR, 2024

CodePrompt: Improving Source Code-Related Classification with Knowledge Features through Prompt Learning.
CoRR, 2024

A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement.
Comput. Secur., 2024

Making models more secure: An efficient model stealing detection method.
Comput. Electr. Eng., 2024

2023
Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning.
Inf. Sci., December, 2023

A risk identification model for ICT supply chain based on network embedding and text encoding.
Expert Syst. Appl., October, 2023

VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network.
Computer, October, 2023

Inpainting with Separable Mask Update Convolution Network.
Sensors, August, 2023

A novel vulnerability severity assessment method for source code based on a graph neural network.
Inf. Softw. Technol., 2023

Strengthened multiple correlation for multi-label few-shot intent detection.
Neurocomputing, 2023

Byte-Level Function-Associated Method for Malware Detection.
Comput. Syst. Sci. Eng., 2023

VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs.
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023

2022
Continuous temporal network embedding by modeling neighborhood propagation process.
Knowl. Based Syst., 2022

Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions.
Neurocomputing, 2022

EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning.
Comput. Secur., 2022

A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting.
Appl. Soft Comput., 2022

2021
Online GBDT with Chunk Dynamic Weighted Majority Learners for Noisy and Drifting Data Streams.
Neural Process. Lett., 2021

Self-selective attention using correlation between instances for distant supervision relation extraction.
Neural Networks, 2021

Improving GAN with inverse cumulative distribution function for tabular data synthesis.
Neurocomputing, 2021

Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection.
Future Gener. Comput. Syst., 2021

Computer-aided intelligent design using deep multi-objective cooperative optimization algorithm.
Future Gener. Comput. Syst., 2021

HAN-BSVD: A hierarchical attention network for binary software vulnerability detection.
Comput. Secur., 2021

2020
Robust boosting via self-sampling.
Knowl. Based Syst., 2020

AIT: A method for operating system kernel function call graph generation with a virtualization technique.
KSII Trans. Internet Inf. Syst., 2020

Joint extraction of entities and relations by a novel end-to-end model with a double-pointer module.
Neurocomputing, 2020

Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges.
IEEE Commun. Surv. Tutorials, 2020

A blockchain-based architecture for secure vehicular Named Data Networks.
Comput. Electr. Eng., 2020

Deep supervised learning with mixture of neural networks.
Artif. Intell. Medicine, 2020

In-Network Caching in ICN-based Vehicular Networks: Effectiveness & Performance Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Bringing Deep Learning at the Edge of Information-Centric Internet of Things.
IEEE Commun. Lett., 2019

Microblog summarization using <i>Paragraph Vector</i> and semantic structure.
Comput. Speech Lang., 2019

An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis.
IEEE Access, 2019

ARG: Automatic ROP Chains Generation.
IEEE Access, 2019

LQCC: A Link Quality-based Congestion Control Scheme in Named Data Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs.
Pervasive Mob. Comput., 2018

Security and Privacy Issues in Vehicular Named Data Networks: An Overview.
Mob. Inf. Syst., 2018

Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization.
Neurocomputing, 2018

Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs.
Comput. Stand. Interfaces, 2018

A kernel stack protection model against attacks from kernel execution units.
Comput. Secur., 2018

SVPS: Cloud-based smart vehicle parking system over ubiquitous VANETs.
Comput. Networks, 2018

An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks.
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018

2017
An Intelligible Risk Stratification Model Based on Pairwise and Size Constrained Kmeans.
IEEE J. Biomed. Health Informatics, 2017

Discriminative locally document embedding: Learning a smooth affine map by approximation of the probabilistic generative structure of subspace.
Knowl. Based Syst., 2017

PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs.
Comput. Networks, 2017

Self-paced Mixture of Regressions.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

2016
Efficient Opinion Summarization on Comments with Online-LDA.
Int. J. Comput. Commun. Control, 2016

2015
Rule Extraction From Support Vector Machines Using Ensemble Learning Approach: An Application for Diagnosis of Diabetes.
IEEE J. Biomed. Health Informatics, 2015

MOSKG: countering kernel rootkits with a secure paging mechanism.
Secur. Commun. Networks, 2015

A background subtraction algorithm for indoor monitoring surveillance systems.
Proceedings of the IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2015

2014
Exploring the effects of intervention for those at high risk of developing type 2 diabetes using a computer simulation.
Comput. Biol. Medicine, 2014

2006
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template.
Proceedings of the Advances in Multimedia Information Processing, 2006


  Loading...