Segui
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
Email verificata su scu.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
Y Fang, C Zhang, C Huang, L Liu, Y Yang
Ieee Access 7, 56329-56340, 2019
1792019
DeepXSS: Cross site scripting detection based on deep learning
Y Fang, Y Li, L Liu, C Huang
Proceedings of the 2018 international conference on computing and artificial …, 2018
1122018
A systematic review of fuzzing based on machine learning techniques
Y Wang, P Jia, L Liu, C Huang, Z Liu
PloS one 15 (8), e0237749, 2020
942020
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Y Fang, Y Liu, C Huang, L Liu
Plos one 15 (2), e0228439, 2020
812020
Self multi-head attention-based convolutional neural networks for fake news detection
Y Fang, J Gao, C Huang, H Peng, R Wu
PloS one 14 (9), e0222713, 2019
662019
Webshell detection based on random forest–gradient boosting decision tree algorithm
H Cui, D Huang, Y Fang, L Liu, C Huang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
632018
Cyberbullying detection in social networks using bi-gru with self-attention mechanism
Y Fang, S Yang, B Zhao, C Huang
Information 12 (4), 171, 2021
612021
Exploring flexibility of electric vehicle aggregators as energy reserve
R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu
Electric Power Systems Research 184, 106305, 2020
612020
A machine learning based framework for identifying influential nodes in complex networks
G Zhao, P Jia, C Huang, A Zhou, Y Fang
IEEE Access 8, 65462-65471, 2020
612020
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ...
Transfusion 58 (8), 1855-1862, 2018
562018
Credit card fraud detection based on machine learning
F Yong, Z Yunyun, H Cheng
Computers, Materials & Continua 61 (1), 35, 2019
53*2019
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
Y Fang, J Peng, L Liu, C Huang
Proceedings of the 2nd international conference on cryptography, security …, 2018
482018
Detecting malicious JavaScript code based on semantic analysis
Y Fang, C Huang, Y Su, Y Qiu
Computers & Security 93, 101764, 2020
462020
Security analysis and threats detection techniques on docker container
D Huang, H Cui, S Wen, C Huang
2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019
462019
Research on malicious JavaScript detection technology based on LSTM
Y Fang, C Huang, L Liu, M Xue
IEEE Access 6, 59118-59125, 2018
462018
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network
Z Liu, Y Fang, C Huang, J Han
Computers & Security 114, 102597, 2022
452022
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology
Y Fang, S Han, C Huang, R Wu
PloS one 14 (11), e0225196, 2019
432019
Session‐Based Webshell Detection Using Machine Learning in Web Logs
Y Wu, Y Sun, C Huang, P Jia, L Liu
Security and Communication Networks 2019 (1), 3093809, 2019
432019
Exsense: Extract sensitive information from unstructured data
Y Guo, J Liu, W Tang, C Huang
Computers & Security 102, 102156, 2021
422021
Detecting webshell based on random forest with fasttext
Y Fang, Y Qiu, L Liu, C Huang
Proceedings of the 2018 International Conference on Computing and Artificial …, 2018
422018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20