Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism Y Fang, C Zhang, C Huang, L Liu, Y Yang IEEE Access 7, 56329-56340, 2019 | 173 | 2019 |
DeepXSS: Cross site scripting detection based on deep learning Y Fang, Y Li, L Liu, C Huang Proceedings of the 2018 international conference on computing and artificial …, 2018 | 109 | 2018 |
A systematic review of fuzzing based on machine learning techniques Y Wang, P Jia, L Liu, C Huang, Z Liu PloS one 15 (8), e0237749, 2020 | 86 | 2020 |
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm Y Fang, Y Liu, C Huang, L Liu Plos one 15 (2), e0228439, 2020 | 79 | 2020 |
Self multi-head attention-based convolutional neural networks for fake news detection Y Fang, J Gao, C Huang, H Peng, R Wu PloS one 14 (9), e0222713, 2019 | 66 | 2019 |
Webshell detection based on random forest–gradient boosting decision tree algorithm H Cui, D Huang, Y Fang, L Liu, C Huang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 62 | 2018 |
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism Y Fang, S Yang, B Zhao, C Huang Information 12 (4), 171, 2021 | 58 | 2021 |
Exploring flexibility of electric vehicle aggregators as energy reserve R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu Electric Power Systems Research 184, 106305, 2020 | 57 | 2020 |
A machine learning based framework for identifying influential nodes in complex networks G Zhao, P Jia, C Huang, A Zhou, Y Fang IEEE Access 8, 65462-65471, 2020 | 57 | 2020 |
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ... Transfusion 58 (8), 1855-1862, 2018 | 57 | 2018 |
Credit card fraud detection based on machine learning Y Fang, Y Zhang, C Huang Proceedings of the 2024 2nd International Conference on Image, Algorithms …, 2024 | 50 | 2024 |
Research on malicious JavaScript detection technology based on LSTM Y Fang, C Huang, L Liu, M Xue IEEE Access 6, 59118-59125, 2018 | 47 | 2018 |
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM Y Fang, J Peng, L Liu, C Huang Proceedings of the 2nd international conference on cryptography, security …, 2018 | 46 | 2018 |
Detecting malicious JavaScript code based on semantic analysis Y Fang, C Huang, Y Su, Y Qiu Computers & Security 93, 101764, 2020 | 45 | 2020 |
Security analysis and threats detection techniques on docker container D Huang, H Cui, S Wen, C Huang 2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019 | 43 | 2019 |
SessionBased Webshell Detection Using Machine Learning in Web Logs Y Wu, Y Sun, C Huang, P Jia, L Liu Security and Communication Networks 2019 (1), 3093809, 2019 | 42 | 2019 |
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network Z Liu, Y Fang, C Huang, J Han Computers & Security 114, 102597, 2022 | 41 | 2022 |
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology Y Fang, S Han, C Huang, R Wu PloS one 14 (11), e0225196, 2019 | 41 | 2019 |
Detecting webshell based on random forest with fasttext Y Fang, Y Qiu, L Liu, C Huang Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 41 | 2018 |
Exsense: Extract sensitive information from unstructured data Y Guo, J Liu, W Tang, C Huang Computers & Security 102, 102156, 2021 | 39 | 2021 |