Evading anti-malware engines with deep reinforcement learning Z Fang, J Wang, B Li, S Wu, Y Zhou, H Huang IEEE Access 7, 48867-48879, 2019 | 113 | 2019 |
Feature selection for malware detection based on reinforcement learning Z Fang, J Wang, J Geng, X Kan IEEE Access 7, 176177-176187, 2019 | 54 | 2019 |
DroidRL: Feature selection for android malware detection with reinforcement learning Y Wu, M Li, Q Zeng, T Yang, J Wang, Z Fang, L Cheng Computers & Security 128, 103126, 2023 | 45 | 2023 |
A systematic overview of android malware detection L Meijin, F Zhiyang, W Junfeng, C Luyu, Z Qi, Y Tao, W Yinwei, G Jiaxuan Applied Artificial Intelligence 36 (1), 2007327, 2022 | 32 | 2022 |
LMTracker: Lateral movement path detection based on heterogeneous graph embedding Y Fang, C Wang, Z Fang, C Huang Neurocomputing 474, 37-47, 2022 | 31 | 2022 |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge Computers & Security 137, 103595, 2024 | 20 | 2024 |
An empirical study of the code generation of safety-critical software using llms M Liu, J Wang, T Lin, Q Ma, Z Fang, Y Wu Applied Sciences 14 (3), 1046, 2024 | 17 | 2024 |
A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning Z Fang, J Wang, J Geng, Y Zhou, X Kan Applied Soft Computing 109, 107505, 2021 | 15 | 2021 |
HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source‐Level Intermediate Representation Z Song, J Wang, S Liu, Z Fang, K Yang Security and Communication Networks 2022 (1), 1919907, 2022 | 13 | 2022 |
Enhancing software modularization via semantic outliers filtration and label propagation K Yang, J Wang, Z Fang, P Wu, Z Song Information and Software Technology 145, 106818, 2022 | 9 | 2022 |
EvadeRL: Evading PDF malware classifiers with deep reinforcement learning Z Mao, Z Fang, M Li, Y Fan Security and Communication Networks 2022 (1), 7218800, 2022 | 7 | 2022 |
A new software birthmark based on weight sequences of dynamic control flow graph for plagiarism detection B Yuan, J Wang, Z Fang, L Qi The Computer Journal 61 (8), 1202-1215, 2018 | 7 | 2018 |
Droidrl: Reinforcement learning driven feature selection for android malware detection Y Wu, M Li, J Wang, Z Fang, Q Zeng, T Yang, L Cheng arXiv preprint arXiv:2203.02719, 2022 | 4 | 2022 |
Utilizing benign files to obfuscate malware via deep reinforcement learning J Gao, Z Fang 2022 4th International Conference on Intelligent Information Processing (IIP …, 2022 | 2 | 2022 |
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives X Cao, J Wang, P Wu, Z Fang IET Information Security 2024 (1), 4313185, 2024 | 1 | 2024 |
Web-Based Software Reliability Analysis and Measurement System Z Fang, J Wang, D Liu, C She International Conference on Applied Informatics and Communication, 664-670, 2011 | 1 | 2011 |