Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence L Li, C Huang, J Chen Computers & Security 140, 103815, 2024 | | 2024 |
Hacker group identification based on dynamic heterogeneous graph node update Y Xu, Y Fang, C Huang, Z Liu, W Cao Applied Soft Computing, 111587, 2024 | | 2024 |
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping C Huang, N Wang, Z Wang, S Sun, L Li, J Chen, Q Zhao, J Han, Z Yang, ... arXiv preprint arXiv:2403.08334, 2024 | | 2024 |
APTBert: Abstract Generation and Event Extraction from APT Reports C Zhou, C Huang, Y Wang, Z Zuo International Conference on Digital Forensics and Cyber Crime, 209-223, 2023 | | 2023 |
An Empirical Study of Malicious Code In PyPI Ecosystem W Guo, Z Xu, C Liu, C Huang, Y Fang, Y Liu 2023 38th IEEE/ACM International Conference on Automated Software …, 2023 | 6 | 2023 |
A framework for threat intelligence extraction and fusion Y Guo, Z Liu, C Huang, N Wang, H Min, W Guo, J Liu Computers & Security 132, 103371, 2023 | 6 | 2023 |
SecTKG: A Knowledge Graph for Open-Source Security Tools S Sun, C Huang, T Wu, Y Shen International Journal of Intelligent Systems 2023, 2023 | | 2023 |
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach Z Yang, C Huang, J Liu International Conference on Knowledge Science, Engineering and Management …, 2023 | | 2023 |
ExpSeeker: Extract public exploit code information from social media Y Du, C Huang, G Liang, Z Fu, D Li, Y Ding Applied Intelligence 53 (12), 15772-15786, 2023 | 5 | 2023 |
bjXnet: an improved bug localization model based on code property graph and attention mechanism J Han, C Huang, S Sun, Z Liu, J Liu Automated Software Engineering 30 (1), 12, 2023 | 5 | 2023 |
Binvuldet: Detecting vulnerability in binary program via decompiled pseudo code and bilstm-attention Y Wang, P Jia, X Peng, C Huang, J Liu Computers & Security 125, 103023, 2023 | 8 | 2023 |
VULDEFF: vulnerability detection method based on function fingerprints and code differences Q Zhao, C Huang, L Dai Knowledge-Based Systems 260, 110139, 2023 | 6 | 2023 |
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model Z Liu, Y Fang, C Huang, Y Xu Computers & Security 124, 103015, 2023 | 15 | 2023 |
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks. H Pan, Y Fang, C Huang, W Guo, X Wan KSII Transactions on Internet & Information Systems 16 (12), 2022 | 2 | 2022 |
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks Y Zeng, H Yu, T Wu, Y Chen, X Lan, C Huang International Conference on Digital Forensics and Cyber Crime, 135-150, 2022 | | 2022 |
Viopolicy-detector: An automated approach to detecting GDPR suspected compliance violations in websites H Ou, Y Fang, Y Guo, W Guo, C Huang Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 2 | 2022 |
Coreference resolution for cybersecurity entity: towards explicit, comprehensive cybersecurity knowledge graph with low redundancy Z Liu, H Su, N Wang, C Huang International Conference on Security and Privacy in Communication Systems …, 2022 | 2 | 2022 |
Hghan: hacker group identification based on heterogeneous graph attention network Y Xu, Y Fang, C Huang, Z Liu Information Sciences 612, 848-863, 2022 | 9 | 2022 |
HyVulDect: a hybrid semantic vulnerability mining system based on graph neural network W Guo, Y Fang, C Huang, H Ou, C Lin, Y Guo Computers & Security 121, 102823, 2022 | 12 | 2022 |
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis W Niu, J Zhou, Y Zhao, X Zhang, Y Peng, C Huang Computers & Security 120, 102809, 2022 | 15 | 2022 |