关注
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
在 scu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
Y Fang, C Zhang, C Huang, L Liu, Y Yang
IEEE Access 7, 56329-56340, 2019
1732019
DeepXSS: Cross site scripting detection based on deep learning
Y Fang, Y Li, L Liu, C Huang
Proceedings of the 2018 international conference on computing and artificial …, 2018
1092018
A systematic review of fuzzing based on machine learning techniques
Y Wang, P Jia, L Liu, C Huang, Z Liu
PloS one 15 (8), e0237749, 2020
862020
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Y Fang, Y Liu, C Huang, L Liu
Plos one 15 (2), e0228439, 2020
792020
Self multi-head attention-based convolutional neural networks for fake news detection
Y Fang, J Gao, C Huang, H Peng, R Wu
PloS one 14 (9), e0222713, 2019
662019
Webshell detection based on random forest–gradient boosting decision tree algorithm
H Cui, D Huang, Y Fang, L Liu, C Huang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
622018
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism
Y Fang, S Yang, B Zhao, C Huang
Information 12 (4), 171, 2021
582021
Exploring flexibility of electric vehicle aggregators as energy reserve
R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu
Electric Power Systems Research 184, 106305, 2020
572020
A machine learning based framework for identifying influential nodes in complex networks
G Zhao, P Jia, C Huang, A Zhou, Y Fang
IEEE Access 8, 65462-65471, 2020
572020
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ...
Transfusion 58 (8), 1855-1862, 2018
572018
Credit card fraud detection based on machine learning
Y Fang, Y Zhang, C Huang
Proceedings of the 2024 2nd International Conference on Image, Algorithms …, 2024
502024
Research on malicious JavaScript detection technology based on LSTM
Y Fang, C Huang, L Liu, M Xue
IEEE Access 6, 59118-59125, 2018
472018
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
Y Fang, J Peng, L Liu, C Huang
Proceedings of the 2nd international conference on cryptography, security …, 2018
462018
Detecting malicious JavaScript code based on semantic analysis
Y Fang, C Huang, Y Su, Y Qiu
Computers & Security 93, 101764, 2020
452020
Security analysis and threats detection techniques on docker container
D Huang, H Cui, S Wen, C Huang
2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019
432019
SessionBased Webshell Detection Using Machine Learning in Web Logs
Y Wu, Y Sun, C Huang, P Jia, L Liu
Security and Communication Networks 2019 (1), 3093809, 2019
422019
GraphXSS: an efficient XSS payload detection approach based on graph convolutional network
Z Liu, Y Fang, C Huang, J Han
Computers & Security 114, 102597, 2022
412022
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology
Y Fang, S Han, C Huang, R Wu
PloS one 14 (11), e0225196, 2019
412019
Detecting webshell based on random forest with fasttext
Y Fang, Y Qiu, L Liu, C Huang
Proceedings of the 2018 International Conference on Computing and Artificial …, 2018
412018
Exsense: Extract sensitive information from unstructured data
Y Guo, J Liu, W Tang, C Huang
Computers & Security 102, 102156, 2021
392021
系统目前无法执行此操作,请稍后再试。
文章 1–20