Weijie Han
Orcid: 0000-0003-3793-8222
According to our database1,
Weijie Han
authored at least 20 papers
between 2019 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Constructing Innovative Covalent and Noncovalent Compound Libraries: Insights from 3D Protein-Ligand Interactions.
J. Chem. Inf. Model., March, 2024
2023
Crop Type Identification Using High-Resolution Remote Sensing Images Based on an Improved DeepLabV3+ Network.
Remote. Sens., November, 2023
J. Chem. Inf. Model., October, 2023
A 0.012mm<sup>2</sup> 36.41kHz Temperature-insensitive Current-Reuse Ring Oscillator Achieving 0.077%/V Line Sensitivity across a 1.3V-to-3.7V unregulated Supply.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2023
2022
J. Inf. Secur. Appl., 2022
Int. J. Bifurc. Chaos, 2022
A 200mA-Load 0.62fs-FOM Active-Capacitor-Assisted Dual-loop Output Capacitorless Low-Dropout Regulator in Standard 65nm CMOS.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022
2021
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy.
Multim. Tools Appl., 2021
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.
Inf. Sci., 2021
A Novel Malware Detection Approach Based on Behavioral Semantic Analysis and LSTM Model.
Proceedings of the 21st International Conference on Communication Technology, 2021
2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Cross-Project Software Defect Prediction Based on Feature Selection and Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
An Anomalous Traffic Detection Approach for the Private Network Based on Self-learning Model.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
J. Netw. Comput. Appl., 2019
Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine.
IET Inf. Secur., 2019
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics.
Comput. Secur., 2019
Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.
IEEE Access, 2019