Yan Wang
Affiliations:- University of Chinese Academy of Science, School of Cyber Security, Beijing, China
- Chinese Academy of Science, Institute of Information Engineering, Beijing, China
According to our database1,
Yan Wang
authored at least 45 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Inf. Sci., 2024
Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector.
CoRR, 2024
Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Smartphone Gait Authentication Based on Activity Recognition Task in Unconstrained Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023
VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022
A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022
A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022
2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021
2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019
2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015