Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism Y Fang, C Zhang, C Huang, L Liu, Y Yang IEEE Access 7, 56329-56340, 2019 | 178 | 2019 |
DeepXSS: Cross site scripting detection based on deep learning Y Fang, Y Li, L Liu, C Huang Proceedings of the 2018 international conference on computing and artificial …, 2018 | 113 | 2018 |
A systematic review of fuzzing based on machine learning techniques Y Wang, P Jia, L Liu, C Huang, Z Liu PloS one 15 (8), e0237749, 2020 | 92 | 2020 |
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm Y Fang, Y Liu, C Huang, L Liu Plos one 15 (2), e0228439, 2020 | 79 | 2020 |
Self multi-head attention-based convolutional neural networks for fake news detection Y Fang, J Gao, C Huang, H Peng, R Wu PloS one 14 (9), e0222713, 2019 | 68 | 2019 |
Webshell detection based on random forest–gradient boosting decision tree algorithm H Cui, D Huang, Y Fang, L Liu, C Huang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 64 | 2018 |
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism Y Fang, S Yang, B Zhao, C Huang Information 12 (4), 171, 2021 | 62 | 2021 |
Exploring flexibility of electric vehicle aggregators as energy reserve R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu Electric Power Systems Research 184, 106305, 2020 | 61 | 2020 |
A machine learning based framework for identifying influential nodes in complex networks G Zhao, P Jia, C Huang, A Zhou, Y Fang IEEE Access 8, 65462-65471, 2020 | 61 | 2020 |
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ... Transfusion 58 (8), 1855-1862, 2018 | 57 | 2018 |
Credit card fraud detection based on machine learning F Yong, Z Yunyun, H Cheng Computers, Materials & Continua 61 (1), 35, 2019 | 54* | 2019 |
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM Y Fang, J Peng, L Liu, C Huang Proceedings of the 2nd international conference on cryptography, security …, 2018 | 49 | 2018 |
Detecting malicious JavaScript code based on semantic analysis Y Fang, C Huang, Y Su, Y Qiu Computers & Security 93, 101764, 2020 | 47 | 2020 |
Research on malicious JavaScript detection technology based on LSTM Y Fang, C Huang, L Liu, M Xue IEEE Access 6, 59118-59125, 2018 | 47 | 2018 |
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network Z Liu, Y Fang, C Huang, J Han Computers & Security 114, 102597, 2022 | 46 | 2022 |
Security analysis and threats detection techniques on docker container D Huang, H Cui, S Wen, C Huang 2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019 | 45 | 2019 |
Exsense: Extract sensitive information from unstructured data Y Guo, J Liu, W Tang, C Huang Computers & Security 102, 102156, 2021 | 42 | 2021 |
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology Y Fang, S Han, C Huang, R Wu PloS one 14 (11), e0225196, 2019 | 42 | 2019 |
Session‐Based Webshell Detection Using Machine Learning in Web Logs Y Wu, Y Sun, C Huang, P Jia, L Liu Security and Communication Networks 2019 (1), 3093809, 2019 | 42 | 2019 |
Detecting webshell based on random forest with fasttext Y Fang, Y Qiu, L Liu, C Huang Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 42 | 2018 |