Segui
Zhiyang Fang
Zhiyang Fang
Email verificata su scu.edu.cn
Titolo
Citata da
Citata da
Anno
Evading anti-malware engines with deep reinforcement learning
Z Fang, J Wang, B Li, S Wu, Y Zhou, H Huang
IEEE Access 7, 48867-48879, 2019
1132019
Feature selection for malware detection based on reinforcement learning
Z Fang, J Wang, J Geng, X Kan
IEEE Access 7, 176177-176187, 2019
542019
DroidRL: Feature selection for android malware detection with reinforcement learning
Y Wu, M Li, Q Zeng, T Yang, J Wang, Z Fang, L Cheng
Computers & Security 128, 103126, 2023
452023
A systematic overview of android malware detection
L Meijin, F Zhiyang, W Junfeng, C Luyu, Z Qi, Y Tao, W Yinwei, G Jiaxuan
Applied Artificial Intelligence 36 (1), 2007327, 2022
322022
LMTracker: Lateral movement path detection based on heterogeneous graph embedding
Y Fang, C Wang, Z Fang, C Huang
Neurocomputing 474, 37-47, 2022
312022
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge
Computers & Security 137, 103595, 2024
202024
An empirical study of the code generation of safety-critical software using llms
M Liu, J Wang, T Lin, Q Ma, Z Fang, Y Wu
Applied Sciences 14 (3), 1046, 2024
172024
A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning
Z Fang, J Wang, J Geng, Y Zhou, X Kan
Applied Soft Computing 109, 107505, 2021
152021
HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source‐Level Intermediate Representation
Z Song, J Wang, S Liu, Z Fang, K Yang
Security and Communication Networks 2022 (1), 1919907, 2022
132022
Enhancing software modularization via semantic outliers filtration and label propagation
K Yang, J Wang, Z Fang, P Wu, Z Song
Information and Software Technology 145, 106818, 2022
92022
EvadeRL: Evading PDF malware classifiers with deep reinforcement learning
Z Mao, Z Fang, M Li, Y Fan
Security and Communication Networks 2022 (1), 7218800, 2022
72022
A new software birthmark based on weight sequences of dynamic control flow graph for plagiarism detection
B Yuan, J Wang, Z Fang, L Qi
The Computer Journal 61 (8), 1202-1215, 2018
72018
Droidrl: Reinforcement learning driven feature selection for android malware detection
Y Wu, M Li, J Wang, Z Fang, Q Zeng, T Yang, L Cheng
arXiv preprint arXiv:2203.02719, 2022
42022
Utilizing benign files to obfuscate malware via deep reinforcement learning
J Gao, Z Fang
2022 4th International Conference on Intelligent Information Processing (IIP …, 2022
22022
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
X Cao, J Wang, P Wu, Z Fang
IET Information Security 2024 (1), 4313185, 2024
12024
Web-Based Software Reliability Analysis and Measurement System
Z Fang, J Wang, D Liu, C She
International Conference on Applied Informatics and Communication, 664-670, 2011
12011
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–16