Follow
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
Verified email at scu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism
Y Fang, C Zhang, C Huang, L Liu, Y Yang
IEEE Access 7, 56329-56340, 2019
1432019
DeepXSS: Cross site scripting detection based on deep learning
Y Fang, Y Li, L Liu, C Huang
Proceedings of the 2018 international conference on computing and artificial …, 2018
922018
A systematic review of fuzzing based on machine learning techniques
Y Wang, P Jia, L Liu, C Huang, Z Liu
PloS one 15 (8), e0237749, 2020
662020
Self multi-head attention-based convolutional neural networks for fake news detection
Y Fang, J Gao, C Huang, H Peng, R Wu
PloS one 14 (9), e0222713, 2019
602019
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Y Fang, Y Liu, C Huang, L Liu
Plos one 15 (2), e0228439, 2020
582020
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ...
Transfusion 58 (8), 1855-1862, 2018
532018
Webshell detection based on random forest–gradient boosting decision tree algorithm
H Cui, D Huang, Y Fang, L Liu, C Huang
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
522018
Exploring flexibility of electric vehicle aggregators as energy reserve
R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu
Electric Power Systems Research 184, 106305, 2020
492020
Research on malicious JavaScript detection technology based on LSTM
Y Fang, C Huang, L Liu, M Xue
IEEE Access 6, 59118-59125, 2018
442018
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism
Y Fang, S Yang, B Zhao, C Huang
Information 12 (4), 171, 2021
432021
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
Y Fang, J Peng, L Liu, C Huang
Proceedings of the 2nd international conference on cryptography, security …, 2018
412018
A machine learning based framework for identifying influential nodes in complex networks
G Zhao, P Jia, C Huang, A Zhou, Y Fang
IEEE Access 8, 65462-65471, 2020
392020
Detecting malicious JavaScript code based on semantic analysis
Y Fang, C Huang, Y Su, Y Qiu
Computers & Security 93, 101764, 2020
372020
A study on Web security incidents in China by analyzing vulnerability disclosure platforms
C Huang, JY Liu, Y Fang, Z Zuo
Computers & Security 58, 47-62, 2016
372016
Security analysis and threats detection techniques on docker container
D Huang, H Cui, S Wen, C Huang
2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019
362019
Active energy management strategies for active distribution system
Y Xiang, J Liu, W Yang, C Huang
Journal of Modern Power Systems and Clean Energy 3, 533-543, 2015
362015
Credit Card Fraud Detection Based on Machine Learning.
Y Fang, Y Zhang, C Huang
Computers, Materials & Continua 61 (1), 2019
352019
Automatic identification of honeypot server using machine learning techniques
C Huang, J Han, X Zhang, J Liu
Security and Communication Networks 2019, 1-8, 2019
352019
Detecting webshell based on random forest with fasttext
Y Fang, Y Qiu, L Liu, C Huang
Proceedings of the 2018 International Conference on Computing and Artificial …, 2018
352018
Session-based webshell detection using machine learning in web logs
Y Wu, Y Sun, C Huang, P Jia, L Liu
Security and Communication Networks 2019, 1-11, 2019
332019
The system can't perform the operation now. Try again later.
Articles 1–20