Xuren Wang
According to our database1,
Xuren Wang
authored at least 37 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
2
1
1
2
8
7
10
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
2023
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
Cybersecur., 2022
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention.
Proceedings of the IEEE Smartworld, 2022
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network.
Cybersecur., 2020
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020
Proceedings of the Natural Language Processing and Chinese Computing, 2020
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, 2019
2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010
2007
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007
2006
Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework.
Proceedings of the 2006 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2006), International Conference on Intelligent Agents, Web Technologies and Internet Commerce (IAWTIC 2006), 29 November, 2006
2004
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004