Yong Fang

Orcid: 0000-0003-2736-0615

Affiliations:
  • Sichuan University, Chengdu, China


According to our database1, Yong Fang authored at least 57 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2014
2016
2018
2020
2022
2024
0
5
10
5
2
8
7
7
5
3
1
1
1
4
1
2
5
1
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Graph Mining for Cybersecurity: A Survey.
ACM Trans. Knowl. Discov. Data, February, 2024

Multi-target label backdoor attacks on graph neural networks.
Pattern Recognit., 2024

PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems.
CoRR, 2024

Few-shot graph classification on cross-site scripting attacks detection.
Comput. Secur., 2024

Hacker group identification based on dynamic heterogeneous graph node update.
Appl. Soft Comput., 2024

2023
PWAGAT: Potential Web attacker detection based on graph attention network.
Neurocomputing, November, 2023

MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model.
Comput. Secur., 2023

An Empirical Study of Malicious Code In PyPI Ecosystem.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

2022
Embedding vector generation based on function call graph for effective malware detection and classification.
Neural Comput. Appl., 2022

DDIML: Explainable detection model for drive-by-download attacks.
J. Intell. Fuzzy Syst., 2022

GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
KSII Trans. Internet Inf. Syst., 2022

HGHAN: Hacker group identification based on heterogeneous graph attention network.
Inf. Sci., 2022

LMTracker: Lateral movement path detection based on heterogeneous graph embedding.
Neurocomputing, 2022

GraphXSS: An efficient XSS payload detection approach based on graph convolutional network.
Comput. Secur., 2022

HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network.
Comput. Secur., 2022

JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network.
Comput. Secur., 2022

Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Cross-site Scripting Threat Intelligence Detection Based on Deep Learning.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers.
EAI Endorsed Trans. Security Safety, 2021

PBDT: Python Backdoor Detection Model Based on Combined Features.
Secur. Commun. Networks, 2021

Intelligent mining vulnerabilities in python code snippets.
J. Intell. Fuzzy Syst., 2021

Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism.
Inf., 2021

Effective method for detecting malicious PowerShell scripts based on hybrid features<sup>☆</sup>.
Neurocomputing, 2021

A communication-channel-based method for detecting deeply camouflaged malicious traffic.
Comput. Networks, 2021

CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network.
Comput. J., 2021

No Pie in the Sky: The Digital Currency Fraud Website Detection.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism.
Int. J. Distributed Sens. Networks, 2020

SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods.
Digit. Investig., 2020

Detecting malicious JavaScript code based on semantic analysis.
Comput. Secur., 2020

EmailDetective: An Email Authorship Identification And Verification Model.
Comput. J., 2020

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020

Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API.
IEEE Access, 2020

Android Malware Familial Classification Based on DEX File Section Features.
IEEE Access, 2020

2019
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium.
KSII Trans. Internet Inf. Syst., 2019

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.
Future Internet, 2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019

Analyzing and Identifying Data Breaches in Underground Forums.
IEEE Access, 2019

Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Network Attack and Defense Effectiveness Evaluation Based on Dematel Method.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization.
Sensors, 2018

MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection).
计算机科学, 2018

Research on Malicious JavaScript Detection Technology Based on LSTM.
IEEE Access, 2018

WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Detecting Webshell Based on Random Forest with FastText.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

DeepXSS: Cross Site Scripting Detection Based on Deep Learning.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016

2015
Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile.
Remote. Sens., 2015

A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Multi-agent Intrusion Detection System Using Feature Selection Approach.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Website Regional Rapid Security Detection Method.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013


  Loading...