Follow
Yijia Xu
Yijia Xu
Verified email at scu.edu.cn - Homepage
Title
Cited by
Cited by
Year
RLXSS: Optimizing XSS detection model to defend against adversarial attacks based on reinforcement learning
Y Fang, C Huang, Y Xu, Y Li
Future Internet 11 (8), 177, 2019
362019
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
Z Liu, Y Fang, C Huang, Y Xu
Computers & Security 124, 103015, 2023
272023
VulEye: a novel graph neural network vulnerability detection approach for PHP application
C Lin, Y Xu, Y Fang, Z Liu
Applied Sciences 13 (2), 825, 2023
212023
HGHAN: Hacker group identification based on heterogeneous graph attention network
Y Xu, Y Fang, C Huang, Z Liu
Information Sciences 612, 848-863, 2022
172022
GAXSS: effective payload generation method to detect XSS vulnerabilities based on genetic algorithm
Z Liu, Y Fang, C Huang, Y Xu
Security and Communication Networks 2022 (1), 2031924, 2022
172022
Providing email privacy by preventing webmail from loading malicious XSS payloads
Y Fang, Y Xu, P Jia, C Huang
Applied Sciences 10 (13), 4425, 2020
172020
Multi-target label backdoor attacks on graph neural networks
K Wang, H Deng, Y Xu, Z Liu, Y Fang
Pattern Recognition 152, 110449, 2024
152024
Enhancing phishing email detection through ensemble learning and undersampling
Q Qi, Z Wang, Y Xu, Y Fang, C Wang
Applied Sciences 13 (15), 8756, 2023
152023
Against malicious SSL/TLS encryption: identify malicious traffic based on random forest
Y Fang, Y Xu, C Huang, L Liu, L Zhang
Fourth International Congress on Information and Communication Technology ¡K, 2020
102020
Black-box adversarial windows malware generation via united puppet-based dropper and genetic algorithm
S Wang, Y Fang, Y Xu, Y Wang
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th ¡K, 2022
42022
Few-shot graph classification on cross-site scripting attacks detection
H Pan, Y Fang, W Guo, Y Xu, C Wang
Computers & Security 140, 103749, 2024
32024
Log Anomaly Detection Based on Hierarchical Graph Neural Network and Label Contrastive Coding.
Y Fang, Z Zhao, Y Xu, Z Liu
Computers, Materials & Continua 74 (2), 2023
32023
TCCCD: Triplet-Based Cross-Language Code Clone Detection
Y Fang, F Zhou, Y Xu, Z Liu
Applied Sciences 13 (21), 12084, 2023
22023
SpearBot: Leveraging Large Language Models in a Generative-Critique Framework for Spear-Phishing Email Generation
Q Qi, Y Luo, Y Xu, W Guo, Y Fang
arXiv preprint arXiv:2412.11109, 2024
12024
Hacker group identification based on dynamic heterogeneous graph node update
Y Xu, Y Fang, C Huang, Z Liu, W Cao
Applied Soft Computing 158, 111587, 2024
12024
PWAGAT: Potential Web attacker detection based on graph attention network
Y Xu, Y Fang, Z Liu, Q Zhang
Neurocomputing 557, 126725, 2023
12023
Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network
Y Xu, Y Fang, Z Liu
2022 18th International Conference on Mobility, Sensing and Networking (MSN ¡K, 2022
12022
Automatic optimization for generating adversarial malware based on prioritized evolutionary computing
Y Xu, Y Fang, Y Xu, Z Wang
Applied Soft Computing, 112933, 2025
2025
Unknown web attack threat detection based on large language model
Y Xu, Q Zhang, H Deng, Z Liu, C Yang, Y Fang
Applied Soft Computing, 112905, 2025
2025
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning
Z Liu, Y Fang, Y Xu
International Conference on Frontiers in Cyber Security, 89-104, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20