Segui
Yanchen Qiao
Yanchen Qiao
Peng Cheng Laboratory
Email verificata su pcl.ac.cn
Titolo
Citata da
Citata da
Anno
DGA domain name classification method based on long short-term memory with attention mechanism
Y Qiao, B Zhang, W Zhang, AK Sangaiah, H Wu
Applied sciences 9 (20), 4205, 2019
502019
Malware classification based on multilayer perception and Word2Vec for IoT security
Y Qiao, W Zhang, X Du, M Guizani
ACM Transactions on Internet Technology (TOIT) 22 (1), 1-22, 2021
232021
A multi-channel visualization method for malware classification based on deep learning
Y Qiao, Q Jiang, Z Jiang, L Gu
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
232019
How to automatically identify the homology of different malware
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 929-936, 2016
172016
Research of network vulnerability analysis based on attack capability transfer
Y Wang, X Yun, Y Zhang, S Jin, Y Qiao
2012 IEEE 12th International Conference on Computer and Information …, 2012
122012
Fast reused function retrieval method based on simhash and inverted index
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 937-944, 2016
102016
Adversarial malware sample generation method based on the prototype of deep learning detector
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
Computers & Security 119, 102762, 2022
92022
Malware classification method based on word vector of bytes and multilayer perception
Y Qiao, B Zhang, W Zhang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
92020
Adversarial ELF malware detection method using model interpretation
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
IEEE Transactions on Industrial Informatics 19 (1), 605-615, 2022
82022
Fast reused code tracing method based on simhash and inverted index
YC Qiao, XC Yun, Y Tuo, Y Zhang
Journal on Communications 37 (11), 104-113, 2016
72016
Who is using the phone? representation-learning-based continuous authentication on smartphones
H Wang, H He, C Song, H Tang, Y Sun, Y Qiao, W Zhang
Security and Communication Networks 2022, 2022
42022
A similar module extraction approach for android malware
Z Li, Y Qiao, T Hasan, Q Jiang
Proceedings of the 2018 International Conference on Modeling, Simulation and …, 2018
42018
An automatic malware homology identification method based on calling habits
YC Qiao, XC Yun, YZ Zhang
Acta Electron Sin 44 (10), 2410-2414, 2016
42016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–13