Yong Fang
Orcid: 0000-0003-2736-0615Affiliations:
- Sichuan University, Chengdu, China
According to our database1,
Yong Fang
authored at least 57 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
5
10
5
2
8
7
7
5
3
1
1
1
4
1
2
5
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Knowl. Discov. Data, February, 2024
Pattern Recognit., 2024
PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems.
CoRR, 2024
Comput. Secur., 2024
Appl. Soft Comput., 2024
2023
Neurocomputing, November, 2023
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model.
Comput. Secur., 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
2022
Embedding vector generation based on function call graph for effective malware detection and classification.
Neural Comput. Appl., 2022
J. Intell. Fuzzy Syst., 2022
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
KSII Trans. Internet Inf. Syst., 2022
Inf. Sci., 2022
Neurocomputing, 2022
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network.
Comput. Secur., 2022
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network.
Comput. Secur., 2022
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network.
Comput. Secur., 2022
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
Secur. Commun. Networks, 2021
J. Intell. Fuzzy Syst., 2021
Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism.
Inf., 2021
Effective method for detecting malicious PowerShell scripts based on hybrid features<sup>☆</sup>.
Neurocomputing, 2021
A communication-channel-based method for detecting deeply camouflaged malicious traffic.
Comput. Networks, 2021
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network.
Comput. J., 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism.
Int. J. Distributed Sens. Networks, 2020
SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods.
Digit. Investig., 2020
Comput. J., 2020
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
2019
KSII Trans. Internet Inf. Syst., 2019
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.
Future Internet, 2019
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization.
Sensors, 2018
MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection).
计算机科学, 2018
IEEE Access, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016
2015
Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile.
Remote. Sens., 2015
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Proceedings of the Fifth International Conference on Computational Intelligence, 2013