Follow
Lingwei Chen
Title
Cited by
Cited by
Year
DL4MD: A deep learning framework for intelligent malware detection
W Hardy, L Chen, S Hou, Y Ye, X Li
Proceedings of the International Conference on Data Science (ICDATA), 61, 2016
2782016
Automatic detection of helmet uses for construction safety
AHM Rubaiyat, TT Toma, M Kalantari-Khandani, SA Rahman, L Chen, ...
2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops …, 2016
1962016
DeepAM: a heterogeneous deep learning framework for intelligent malware detection
Y Ye, L Chen, S Hou, W Hardy, X Li
Knowledge and Information Systems 54, 265-285, 2018
1532018
Adversarial machine learning in malware detection: Arms race between evasion attack and defense
L Chen, Y Ye, T Bourlai
2017 European intelligence and security informatics conference (EISIC), 99-106, 2017
1492017
Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks
L Chen, S Hou, Y Ye
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
1232017
Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection
Y Ye, S Hou, L Chen, J Lei, W Wan, J Wang, Q Xiong, F Shao
28th International joint conference on artificial intelligence (IJCAI), 2019
772019
Deep neural networks for automatic android malware detection
S Hou, A Saas, L Chen, Y Ye, T Bourlai
Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017
662017
Droideye: Fortifying security of learning-based classifier against adversarial android malware attacks
L Chen, S Hou, Y Ye, S Xu
2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018
472018
Intelligent malware detection based on file relation graphs
L Chen, T Li, M Abdulhayoglu, Y Ye
Proceedings of the 2015 IEEE 9th International Conference on Semantic …, 2015
432015
Higher-order weighted graph convolutional networks
S Liu, L Chen, H Dong, Z Wang, D Wu, Z Huang
arXiv preprint arXiv:1911.04129, 2019
342019
Icsd: An automatic system for insecure code snippet detection in stack overflow over heterogeneous information network
Y Ye, S Hou, L Chen, X Li, L Zhao, S Xu, J Wang, Q Xiong
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
322018
idev: Enhancing social coding security by cross-platform user identification between github and stack overflow
Y Fan, Y Zhang, S Hou, L Chen, Y Ye, C Shi, L Zhao, S Xu
28th International Joint Conference on Artificial Intelligence (IJCAI), 2019, 2019
312019
Fine-grained compiler identification with sequence-oriented neural modeling
Z Tian, Y Huang, B Xie, Y Chen, L Chen, D Wu
IEEE Access 9, 49160-49175, 2021
262021
Analyzing file-to-file relation network in malware detection
L Chen, W Hardy, Y Ye, T Li
Web Information Systems Engineering–WISE 2015: 16th International Conference …, 2015
262015
Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding
Z Tian, B Tian, J Lv, Y Chen, L Chen
Expert Systems with Applications 238, 121865, 2024
232024
Adversarial reprogramming of pretrained neural networks for fraud detection
L Chen, Y Fan, Y Ye
Proceedings of the 30th ACM International Conference on Information …, 2021
232021
Distilling knowledge on text graph for social media attribute inference
Q Li, X Li, L Chen, D Wu
Proceedings of the 45th International ACM SIGIR Conference on Research and …, 2022
202022
Turning attacks into protection: Social media privacy protection using adversarial attacks
X Li, L Chen, D Wu
Proceedings of the 2021 SIAM International Conference on Data Mining (SDM …, 2021
202021
An adversarial machine learning model against android malware evasion attacks
L Chen, S Hou, Y Ye, L Chen
Web and Big Data: APWeb-WAIM 2017 International Workshops: MWDA, HotSpatial …, 2017
152017
Enhancing robustness of graph convolutional networks via dropping graph connections
L Chen, X Li, D Wu
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2021
142021
The system can't perform the operation now. Try again later.
Articles 1–20