Towards the detection of inconsistencies in public security vulnerability reports Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang 28th USENIX security symposium (USENIX Security 19), 869-885, 2019 | 154 | 2019 |
An adaptive system for detecting malicious queries in web attacks Y Dong, Y Zhang, H Ma, Q Wu, Q Liu, K Wang, W Wang Science China Information Sciences 61, 1-16, 2018 | 55 | 2018 |
Predicting the popularity of online news based on multivariate analysis C Liu, W Wang, Y Zhang, Y Dong, F He, C Wu 2017 IEEE international conference on computer and information technology …, 2017 | 26 | 2017 |
Mixed wavelet-based neural network model for cyber security situation prediction using MODWT and Hurst exponent analysis F He, Y Zhang, D Liu, Y Dong, C Liu, C Wu Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 23 | 2017 |
A Novel Automatic Severity Vulnerability Assessment Framework. T Wen, Y Zhang, Y Dong, G Yang J. Commun. 10 (5), 320-329, 2015 | 17 | 2015 |
深度学习应用于网络空间安全的现状, 趋势与展望 张玉清, 董颖, 柳彩云, 雷柯楠, 孙鸿宇 计算机研究与发展 55 (6), 1117-1142, 2018 | 12 | 2018 |
Crafting adversarial example to bypass flow-&ML-based botnet detector via RL J Wang, L Qixu, W Di, Y Dong, X Cui Proceedings of the 24th international symposium on research in attacks …, 2021 | 11 | 2021 |
Application of artificial intelligence technology in the field of security vulnerabilities [J] H Sun, Y He, W Jice, D Ying, Z Lipeng, W He, Z Yuqing Journal of communications 39 (08), 1-17Caplar, 2018 | 10 | 2018 |
人工智能技术在安全漏洞领域的应用 孙鸿宇, 何远, 王基策, 董颖, 朱立鹏, 王鹤, 张玉清 Journal on Communication/Tongxin Xuebao 39 (8), 2018 | 6 | 2018 |
A novel approach to network security situation assessment based on attack confidence D Liu, L Dong, S Lv, Y Dong, F He, C Wu, Y Zhang, H Ma Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 3 | 2017 |
Application research on network attacks and defenses with zachman framework C Wu, Y Zhang, Y Dong Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 2 | 2017 |
第三方追踪的安全研究 张玉清, 武倩如, 刘奇旭, 董颖 通信学报 35 (9), 1-11, 2014 | 2 | 2014 |
Vulnerability exploitation for Joomla content management system D Ying, Z Yuqing, YUE Hongzhou Journal of University of Chinese Academy of Sciences 32 (6), 825, 2015 | | 2015 |