Phishing email detection using improved RCNN model with multilevel vectors and attention mechanism Y Fang, C Zhang, C Huang, L Liu, Y Yang IEEE Access 7, 56329-56340, 2019 | 143 | 2019 |
DeepXSS: Cross site scripting detection based on deep learning Y Fang, Y Li, L Liu, C Huang Proceedings of the 2018 international conference on computing and artificial …, 2018 | 92 | 2018 |
A systematic review of fuzzing based on machine learning techniques Y Wang, P Jia, L Liu, C Huang, Z Liu PloS one 15 (8), e0237749, 2020 | 66 | 2020 |
Self multi-head attention-based convolutional neural networks for fake news detection Y Fang, J Gao, C Huang, H Peng, R Wu PloS one 14 (9), e0222713, 2019 | 60 | 2019 |
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm Y Fang, Y Liu, C Huang, L Liu Plos one 15 (2), e0228439, 2020 | 58 | 2020 |
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty ZY Huang, C Huang, JW Xie, J Ma, GR Cao, Q Huang, B Shen, ... Transfusion 58 (8), 1855-1862, 2018 | 53 | 2018 |
Webshell detection based on random forest–gradient boosting decision tree algorithm H Cui, D Huang, Y Fang, L Liu, C Huang 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 52 | 2018 |
Exploring flexibility of electric vehicle aggregators as energy reserve R Deng, Y Xiang, D Huo, Y Liu, Y Huang, C Huang, J Liu Electric Power Systems Research 184, 106305, 2020 | 49 | 2020 |
Research on malicious JavaScript detection technology based on LSTM Y Fang, C Huang, L Liu, M Xue IEEE Access 6, 59118-59125, 2018 | 44 | 2018 |
Cyberbullying detection in social networks using Bi-gru with self-attention mechanism Y Fang, S Yang, B Zhao, C Huang Information 12 (4), 171, 2021 | 43 | 2021 |
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM Y Fang, J Peng, L Liu, C Huang Proceedings of the 2nd international conference on cryptography, security …, 2018 | 41 | 2018 |
A machine learning based framework for identifying influential nodes in complex networks G Zhao, P Jia, C Huang, A Zhou, Y Fang IEEE Access 8, 65462-65471, 2020 | 39 | 2020 |
Detecting malicious JavaScript code based on semantic analysis Y Fang, C Huang, Y Su, Y Qiu Computers & Security 93, 101764, 2020 | 37 | 2020 |
A study on Web security incidents in China by analyzing vulnerability disclosure platforms C Huang, JY Liu, Y Fang, Z Zuo Computers & Security 58, 47-62, 2016 | 37 | 2016 |
Security analysis and threats detection techniques on docker container D Huang, H Cui, S Wen, C Huang 2019 IEEE 5th International Conference on Computer and Communications (ICCC …, 2019 | 36 | 2019 |
Active energy management strategies for active distribution system Y Xiang, J Liu, W Yang, C Huang Journal of Modern Power Systems and Clean Energy 3, 533-543, 2015 | 36 | 2015 |
Credit Card Fraud Detection Based on Machine Learning. Y Fang, Y Zhang, C Huang Computers, Materials & Continua 61 (1), 2019 | 35 | 2019 |
Automatic identification of honeypot server using machine learning techniques C Huang, J Han, X Zhang, J Liu Security and Communication Networks 2019, 1-8, 2019 | 35 | 2019 |
Detecting webshell based on random forest with fasttext Y Fang, Y Qiu, L Liu, C Huang Proceedings of the 2018 International Conference on Computing and Artificial …, 2018 | 35 | 2018 |
Session-based webshell detection using machine learning in web logs Y Wu, Y Sun, C Huang, P Jia, L Liu Security and Communication Networks 2019, 1-11, 2019 | 33 | 2019 |