Senlin Luo
Orcid: 0000-0002-7729-5439
According to our database1,
Senlin Luo
authored at least 63 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024
Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection.
IEEE Trans. Ind. Informatics, March, 2024
HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination.
Expert Syst. Appl., March, 2024
Adapt to small-scale and long-term time series forecasting with enhanced multidimensional correlation.
Expert Syst. Appl., March, 2024
Meta-learning on dynamic node clustering knowledge graph for cold-start recommendation.
Neurocomputing, 2024
LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization.
Future Gener. Comput. Syst., 2024
A novel prompt-tuning method: Incorporating scenario-specific concepts into a verbalizer.
Expert Syst. Appl., 2024
FSD-CLCD: Functional semantic distillation graph learning for cross-language code clone detection.
Eng. Appl. Artif. Intell., 2024
VulCatch: Enhancing Binary Vulnerability Detection through CodeT5 Decompilation and KAN Advanced Feature Extraction.
CoRR, 2024
CodePrompt: Improving Source Code-Related Classification with Knowledge Features through Prompt Learning.
CoRR, 2024
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement.
Comput. Secur., 2024
Comput. Electr. Eng., 2024
2023
Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning.
Inf. Sci., December, 2023
A risk identification model for ICT supply chain based on network embedding and text encoding.
Expert Syst. Appl., October, 2023
VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network.
Computer, October, 2023
A novel vulnerability severity assessment method for source code based on a graph neural network.
Inf. Softw. Technol., 2023
Neurocomputing, 2023
Comput. Syst. Sci. Eng., 2023
Proceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence, 2023
2022
Knowl. Based Syst., 2022
Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions.
Neurocomputing, 2022
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning.
Comput. Secur., 2022
A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting.
Appl. Soft Comput., 2022
2021
Online GBDT with Chunk Dynamic Weighted Majority Learners for Noisy and Drifting Data Streams.
Neural Process. Lett., 2021
Self-selective attention using correlation between instances for distant supervision relation extraction.
Neural Networks, 2021
Improving GAN with inverse cumulative distribution function for tabular data synthesis.
Neurocomputing, 2021
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection.
Future Gener. Comput. Syst., 2021
Computer-aided intelligent design using deep multi-objective cooperative optimization algorithm.
Future Gener. Comput. Syst., 2021
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection.
Comput. Secur., 2021
2020
AIT: A method for operating system kernel function call graph generation with a virtualization technique.
KSII Trans. Internet Inf. Syst., 2020
Joint extraction of entities and relations by a novel end-to-end model with a double-pointer module.
Neurocomputing, 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. Electr. Eng., 2020
Artif. Intell. Medicine, 2020
In-Network Caching in ICN-based Vehicular Networks: Effectiveness & Performance Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Co-Attention Hierarchical Network: Generating Coherent Long Distractors for Reading Comprehension.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Commun. Lett., 2019
Comput. Speech Lang., 2019
An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis.
IEEE Access, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs.
Pervasive Mob. Comput., 2018
Mob. Inf. Syst., 2018
Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization.
Neurocomputing, 2018
Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs.
Comput. Stand. Interfaces, 2018
Comput. Secur., 2018
Comput. Networks, 2018
An Optimized Proactive Caching Scheme Based on Mobility Prediction for Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE Conference on Standards for Communications and Networking, 2018
2017
An Intelligible Risk Stratification Model Based on Pairwise and Size Constrained Kmeans.
IEEE J. Biomed. Health Informatics, 2017
Discriminative locally document embedding: Learning a smooth affine map by approximation of the probabilistic generative structure of subspace.
Knowl. Based Syst., 2017
PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs.
Comput. Networks, 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
2016
Int. J. Comput. Commun. Control, 2016
2015
Rule Extraction From Support Vector Machines Using Ensemble Learning Approach: An Application for Diagnosis of Diabetes.
IEEE J. Biomed. Health Informatics, 2015
Secur. Commun. Networks, 2015
Proceedings of the IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2015
2014
Exploring the effects of intervention for those at high risk of developing type 2 diabetes using a computer simulation.
Comput. Biol. Medicine, 2014
2006
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template.
Proceedings of the Advances in Multimedia Information Processing, 2006