关注
Ying Dong
Ying Dong
在 mails.ucas.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Towards the detection of inconsistencies in public security vulnerability reports
Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang
28th USENIX security symposium (USENIX Security 19), 869-885, 2019
1542019
An adaptive system for detecting malicious queries in web attacks
Y Dong, Y Zhang, H Ma, Q Wu, Q Liu, K Wang, W Wang
Science China Information Sciences 61, 1-16, 2018
552018
Predicting the popularity of online news based on multivariate analysis
C Liu, W Wang, Y Zhang, Y Dong, F He, C Wu
2017 IEEE international conference on computer and information technology …, 2017
262017
Mixed wavelet-based neural network model for cyber security situation prediction using MODWT and Hurst exponent analysis
F He, Y Zhang, D Liu, Y Dong, C Liu, C Wu
Network and System Security: 11th International Conference, NSS 2017 …, 2017
232017
A Novel Automatic Severity Vulnerability Assessment Framework.
T Wen, Y Zhang, Y Dong, G Yang
J. Commun. 10 (5), 320-329, 2015
172015
深度学习应用于网络空间安全的现状, 趋势与展望
张玉清, 董颖, 柳彩云, 雷柯楠, 孙鸿宇
计算机研究与发展 55 (6), 1117-1142, 2018
122018
Crafting adversarial example to bypass flow-&ML-based botnet detector via RL
J Wang, L Qixu, W Di, Y Dong, X Cui
Proceedings of the 24th international symposium on research in attacks …, 2021
112021
Application of artificial intelligence technology in the field of security vulnerabilities [J]
H Sun, Y He, W Jice, D Ying, Z Lipeng, W He, Z Yuqing
Journal of communications 39 (08), 1-17Caplar, 2018
102018
人工智能技术在安全漏洞领域的应用
孙鸿宇, 何远, 王基策, 董颖, 朱立鹏, 王鹤, 张玉清
Journal on Communication/Tongxin Xuebao 39 (8), 2018
62018
A novel approach to network security situation assessment based on attack confidence
D Liu, L Dong, S Lv, Y Dong, F He, C Wu, Y Zhang, H Ma
Network and System Security: 11th International Conference, NSS 2017 …, 2017
32017
Application research on network attacks and defenses with zachman framework
C Wu, Y Zhang, Y Dong
Network and System Security: 11th International Conference, NSS 2017 …, 2017
22017
第三方追踪的安全研究
张玉清, 武倩如, 刘奇旭, 董颖
通信学报 35 (9), 1-11, 2014
22014
Vulnerability exploitation for Joomla content management system
D Ying, Z Yuqing, YUE Hongzhou
Journal of University of Chinese Academy of Sciences 32 (6), 825, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–13