Follow
Cheng Huang
Cheng Huang
Associate Professor, Sichuan University
Verified email at scu.edu.cn - Homepage
Title
Cited by
Year
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence
L Li, C Huang, J Chen
Computers & Security 140, 103815, 2024
2024
Hacker group identification based on dynamic heterogeneous graph node update
Y Xu, Y Fang, C Huang, Z Liu, W Cao
Applied Soft Computing, 111587, 2024
2024
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping
C Huang, N Wang, Z Wang, S Sun, L Li, J Chen, Q Zhao, J Han, Z Yang, ...
arXiv preprint arXiv:2403.08334, 2024
2024
APTBert: Abstract Generation and Event Extraction from APT Reports
C Zhou, C Huang, Y Wang, Z Zuo
International Conference on Digital Forensics and Cyber Crime, 209-223, 2023
2023
An Empirical Study of Malicious Code In PyPI Ecosystem
W Guo, Z Xu, C Liu, C Huang, Y Fang, Y Liu
2023 38th IEEE/ACM International Conference on Automated Software …, 2023
62023
A framework for threat intelligence extraction and fusion
Y Guo, Z Liu, C Huang, N Wang, H Min, W Guo, J Liu
Computers & Security 132, 103371, 2023
62023
SecTKG: A Knowledge Graph for Open-Source Security Tools
S Sun, C Huang, T Wu, Y Shen
International Journal of Intelligent Systems 2023, 2023
2023
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach
Z Yang, C Huang, J Liu
International Conference on Knowledge Science, Engineering and Management …, 2023
2023
ExpSeeker: Extract public exploit code information from social media
Y Du, C Huang, G Liang, Z Fu, D Li, Y Ding
Applied Intelligence 53 (12), 15772-15786, 2023
52023
bjXnet: an improved bug localization model based on code property graph and attention mechanism
J Han, C Huang, S Sun, Z Liu, J Liu
Automated Software Engineering 30 (1), 12, 2023
52023
Binvuldet: Detecting vulnerability in binary program via decompiled pseudo code and bilstm-attention
Y Wang, P Jia, X Peng, C Huang, J Liu
Computers & Security 125, 103023, 2023
82023
VULDEFF: vulnerability detection method based on function fingerprints and code differences
Q Zhao, C Huang, L Dai
Knowledge-Based Systems 260, 110139, 2023
62023
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
Z Liu, Y Fang, C Huang, Y Xu
Computers & Security 124, 103015, 2023
152023
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks.
H Pan, Y Fang, C Huang, W Guo, X Wan
KSII Transactions on Internet & Information Systems 16 (12), 2022
22022
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks
Y Zeng, H Yu, T Wu, Y Chen, X Lan, C Huang
International Conference on Digital Forensics and Cyber Crime, 135-150, 2022
2022
Viopolicy-detector: An automated approach to detecting GDPR suspected compliance violations in websites
H Ou, Y Fang, Y Guo, W Guo, C Huang
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
22022
Coreference resolution for cybersecurity entity: towards explicit, comprehensive cybersecurity knowledge graph with low redundancy
Z Liu, H Su, N Wang, C Huang
International Conference on Security and Privacy in Communication Systems …, 2022
22022
Hghan: hacker group identification based on heterogeneous graph attention network
Y Xu, Y Fang, C Huang, Z Liu
Information Sciences 612, 848-863, 2022
92022
HyVulDect: a hybrid semantic vulnerability mining system based on graph neural network
W Guo, Y Fang, C Huang, H Ou, C Lin, Y Guo
Computers & Security 121, 102823, 2022
122022
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis
W Niu, J Zhou, Y Zhao, X Zhang, Y Peng, C Huang
Computers & Security 120, 102809, 2022
152022
The system can't perform the operation now. Try again later.
Articles 1–20