Folgen
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
Bestätigte E-Mail-Adresse bei scu.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
Y Fang, C Zhang, C Huang, L Liu, Y Yang
IEEE Access 7, 56329-56340, 2019
1782019
DeepXSS: Cross site scripting detection based on deep learning
Y Fang, Y Li, L Liu, C Huang
Proceedings of the 2018 international conference on computing and artificial …, 2018
1132018
A systematic review of fuzzing based on machine learning techniques
Y Wang, P Jia, L Liu, C Huang, Z Liu
PloS one 15 (8), e0237749, 2020
922020
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Y Fang, Y Liu, C Huang, L Liu
Plos one 15 (2), e0228439, 2020
792020
Self multi-head attention-based convolutional neural networks for fake news detection
Y Fang, J Gao, C Huang, H Peng, R Wu
PloS one 14 (9), e0222713, 2019
682019
Webshell detection based on random forest–gradient boosting decision tree algorithm
H Cui, D Huang, Y Fang, L Liu, C Huang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
642018
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism
Y Fang, S Yang, B Zhao, C Huang
Information 12 (4), 171, 2021
622021
Exploring flexibility of electric vehicle aggregators as energy reserve
R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu
Electric Power Systems Research 184, 106305, 2020
612020
A machine learning based framework for identifying influential nodes in complex networks
G Zhao, P Jia, C Huang, A Zhou, Y Fang
IEEE Access 8, 65462-65471, 2020
612020
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ...
Transfusion 58 (8), 1855-1862, 2018
572018
Credit card fraud detection based on machine learning
F Yong, Z Yunyun, H Cheng
Computers, Materials & Continua 61 (1), 35, 2019
54*2019
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
Y Fang, J Peng, L Liu, C Huang
Proceedings of the 2nd international conference on cryptography, security …, 2018
492018
Detecting malicious JavaScript code based on semantic analysis
Y Fang, C Huang, Y Su, Y Qiu
Computers & Security 93, 101764, 2020
472020
Research on malicious JavaScript detection technology based on LSTM
Y Fang, C Huang, L Liu, M Xue
IEEE Access 6, 59118-59125, 2018
472018
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network
Z Liu, Y Fang, C Huang, J Han
Computers & Security 114, 102597, 2022
462022
Security analysis and threats detection techniques on docker container
D Huang, H Cui, S Wen, C Huang
2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019
452019
Exsense: Extract sensitive information from unstructured data
Y Guo, J Liu, W Tang, C Huang
Computers & Security 102, 102156, 2021
422021
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology
Y Fang, S Han, C Huang, R Wu
PloS one 14 (11), e0225196, 2019
422019
Session‐Based Webshell Detection Using Machine Learning in Web Logs
Y Wu, Y Sun, C Huang, P Jia, L Liu
Security and Communication Networks 2019 (1), 3093809, 2019
422019
Detecting webshell based on random forest with fasttext
Y Fang, Y Qiu, L Liu, C Huang
Proceedings of the 2018 International Conference on Computing and Artificial …, 2018
422018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20