Follow
Lingwei Chen
Title
Cited by
Cited by
Year
DL4MD: A deep learning framework for intelligent malware detection
W Hardy, L Chen, S Hou, Y Ye, X Li
Proceedings of the International Conference on Data Science (ICDATA), 61, 2016
2392016
Automatic detection of helmet uses for construction safety
AHM Rubaiyat, TT Toma, M Kalantari-Khandani, SA Rahman, L Chen, ...
2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops …, 2016
1572016
DeepAM: a heterogeneous deep learning framework for intelligent malware detection
Y Ye, L Chen, S Hou, W Hardy, X Li
Knowledge and Information Systems 54, 265-285, 2018
1292018
Adversarial machine learning in malware detection: Arms race between evasion attack and defense
L Chen, Y Ye, T Bourlai
2017 European intelligence and security informatics conference (EISIC), 99-106, 2017
1282017
Securedroid: Enhancing security of machine learning-based detection against adversarial android malware attacks
L Chen, S Hou, Y Ye
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
1082017
Out-of-sample node representation learning for heterogeneous graph in real-time android malware detection
Y Ye, S Hou, L Chen, J Lei, W Wan, J Wang, Q Xiong, F Shao
28th International joint conference on artificial intelligence (IJCAI), 2019
702019
Deep neural networks for automatic android malware detection
S Hou, A Saas, L Chen, Y Ye, T Bourlai
Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017
572017
Droideye: Fortifying security of learning-based classifier against adversarial android malware attacks
L Chen, S Hou, Y Ye, S Xu
2018 IEEE/ACM International Conference on Advances in Social Networks …, 2018
432018
Intelligent malware detection based on file relation graphs
L Chen, T Li, M Abdulhayoglu, Y Ye
Proceedings of the 2015 IEEE 9th International Conference on Semantic …, 2015
402015
Icsd: An automatic system for insecure code snippet detection in stack overflow over heterogeneous information network
Y Ye, S Hou, L Chen, X Li, L Zhao, S Xu, J Wang, Q Xiong
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
282018
idev: Enhancing social coding security by cross-platform user identification between github and stack overflow
Y Fan, Y Zhang, S Hou, L Chen, Y Ye, C Shi, L Zhao, S Xu
28th International Joint Conference on Artificial Intelligence (IJCAI), 2019, 2019
252019
Higher-order weighted graph convolutional networks
S Liu, L Chen, H Dong, Z Wang, D Wu, Z Huang
arXiv preprint arXiv:1911.04129, 2019
232019
Analyzing file-to-file relation network in malware detection
L Chen, W Hardy, Y Ye, T Li
Web Information Systems Engineering–WISE 2015: 16th International Conference …, 2015
232015
Turning attacks into protection: Social media privacy protection using adversarial attacks
X Li, L Chen, D Wu
Proceedings of the 2021 SIAM International Conference on Data Mining (SDM …, 2021
182021
Adversarial reprogramming of pretrained neural networks for fraud detection
L Chen, Y Fan, Y Ye
Proceedings of the 30th ACM International Conference on Information …, 2021
142021
Fine-grained compiler identification with sequence-oriented neural modeling
Z Tian, Y Huang, B Xie, Y Chen, L Chen, D Wu
IEEE Access 9, 49160-49175, 2021
142021
An adversarial machine learning model against android malware evasion attacks
L Chen, S Hou, Y Ye, L Chen
Web and Big Data: APWeb-WAIM 2017 International Workshops: MWDA, HotSpatial …, 2017
142017
SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks
L Chen, Y Ye
AI 2017: Advances in Artificial Intelligence: 30th Australasian Joint …, 2017
122017
Landscape Estimation of Solidity Version Usage on Ethereum via Version Identification
Z Tian, J Tian, Z Wang, Y Chen, H Xia, L Chen
International Journal of Intelligent Systems, 2021
112021
Enhancing robustness of graph convolutional networks via dropping graph connections
L Chen, X Li, D Wu
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2021
112021
The system can't perform the operation now. Try again later.
Articles 1–20