Shengyi Pan

Orcid: 0000-0001-9471-9638

According to our database1, Shengyi Pan authored at least 21 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unveil the Mystery of Critical Software Vulnerabilities.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024

Automating Zero-Shot Patch Porting for Hard Forks.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Towards More Practical Automation of Vulnerability Assessment.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree Structure.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Automated unearthing of dangerous issue reports.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
Automating Developer Chat Mining.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

2020
BlockRFC: Real-Time Rolled Fingerprint Construction and Distortion Rectification.
IEEE Access, 2020

FLDNet: Light Dense CNN for Fingerprint Liveness Detection.
IEEE Access, 2020

A Score-Level Fusion of Fingerprint Matching With Fingerprint Liveness Detection.
IEEE Access, 2020

Enhancing developer interactions with programming screencasts through accurate code extraction.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
Rolled Fingerprint Mosaicking Algorithm Based on Block Scale.
Proceedings of the Biometric Recognition - 14th Chinese Conference, 2019

2018
Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification.
IEEE Trans. Smart Grid, 2018

Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection.
IEEE Trans. Smart Grid, 2018

2017
WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining.
IEEE Trans. Smart Grid, 2017

2015
Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems.
IEEE Trans. Smart Grid, 2015

Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data.
IEEE Trans. Ind. Informatics, 2015

A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System.
Int. J. Netw. Secur., 2015

2013
Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information.
IEEE Trans. Smart Grid, 2013

Protocol mutation intrusion detection for synchrophasor communications.
Proceedings of the Cyber Security and Information Intelligence, 2013

Causal event graphs cyber-physical system intrusion detection system.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Cybersecurity risk testing of substation phasor measurement units and phasor data concentrators.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011


  Loading...