Lei Pan
Lei Pan
Senior Lecturer in Cyber Security, School of Information Technology, Deakin University
在 deakin.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
572018
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of Information Security and Applications 36, 90-100, 2017
412017
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
International Journal of Computers and Applications 40 (4), 202-213, 2018
282018
Data-driven cyber security in perspective--intelligent traffic analysis
R Coulter, QL Han, L Pan, J Zhang, Y Xiang
IEEE Transactions on Cybernetics 50 (7), 3081-3093, 2020
272020
Security analysis methods on Ethereum smart contract vulnerabilities: A survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv:1908.08605, 2019
272019
Intelligent agents defending for an IoT world: A review
R Coulter, L Pan
Computers & Security 73, 439-458, 2018
272018
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Enhanced Twitter sentiment analysis by using feature selection and combination
A Yang, J Zhang, L Pan, Y Xiang
Proceedings of the International Symposium on Security and Privacy in Social …, 2015
212015
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
Proceedings of the 5th Annual Digital Forensic Research Workshop (DFRWS 2005 …, 2005
212005
Visualization of big data security: A case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
Digital Communications and Networks 3 (4), 250-259, 2017
192017
Robust performance testing for digital forensic tools
L Pan, LM Batten
Digital Investigation 6 (1-2), 71-81, 2009
192009
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
Concurrency and Computation: Practice and Experience 30 (5), e4181, 2018
172018
Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding
H Lai, J Zhang, MX Luo, L Pan, J Pieprzyk, F Xiao, MA Orgun
Scientific Reports 6, 2016
152016
Protean authentication scheme--a time-bound dynamic keygen authentication technique for IoT edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE Access 7, 92419-92435, 2019
132019
A testbed for security analysis of modern vehicle systems
X Zheng, L Pan, H Chen, R Di Pietro, L Batten
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, 1090-1095, 2017
132017
Teaching digital forensics to undergraduate students
L Batten, L Pan
IEEE Security & Privacy 6 (3), 54-56, 2008
132008
Software vulnerability discovery via learning multi-domain knowledge bases
G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2019
112019
Domain-adversarial graph neural networks for text classification
M Wu, S Pan, X Zhu, C Zhou, L Pan
Proceedings of the 19th IEEE International Conference on Data Mining (ICDM'19), 2019
112019
A3CM: Automatic capability annotation for Android malware
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Wang, Y Xiang
IEEE Access 7, 147156-147168, 2019
102019
Big network traffic data visualization
Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang
Multimedia Tools and Applications 77 (9), 11459-11487, 2018
102018
系统目前无法执行此操作,请稍后再试。
文章 1–20