Loading publications…
The last 5 uploaded publications
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin, Sheng Wen, Qinglong Qinglong Han, Jun Zhang, Yang Xiang (2020). Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proceedings of the IEEE, 108(10), pp. 1825-1848, DOI: 10.1109/jproc.2020.2993293.
Article126 days agoDetecting and Preventing Cyber Insider Threats: A Survey
Liu Liu, Olivier De Vel, Qinglong Qinglong Han, Jun Zhang, Yang Xiang (2018). Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Communications Surveys & Tutorials, 20(2), pp. 1397-1417, DOI: 10.1109/comst.2018.2800740.
Article126 days agoDeep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
Jun Zhang, Lei Pan, Qinglong Qinglong Han, Chao Chen, Sheng Wen, Yang Xiang (2021). Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE/CAA Journal of Automatica Sinica, 9(3), pp. 377-391, DOI: 10.1109/jas.2021.1004261.
Article126 days agoData-Driven Cyber Security in Perspective—Intelligent Traffic Analysis
Rory Coulter, Qinglong Qinglong Han, Lei Pan, Jun Zhang, Yang Xiang (2019). Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis. IEEE Transactions on Cybernetics, 50(7), pp. 3081-3093, DOI: 10.1109/tcyb.2019.2940940.
Article126 days agoDeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection
Shigang Liu, Guanjun Lin, Qinglong Qinglong Han, Sheng Wen, Jun Zhang, Yang Xiang (2019). DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection. IEEE Transactions on Fuzzy Systems, pp. 1-1, DOI: 10.1109/tfuzz.2019.2958558.
Article126 days ago