DGA domain name classification method based on long short-term memory with attention mechanism Y Qiao, B Zhang, W Zhang, AK Sangaiah, H Wu Applied sciences 9 (20), 4205, 2019 | 57 | 2019 |
A multi-channel visualization method for malware classification based on deep learning Y Qiao, Q Jiang, Z Jiang, L Gu 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 27 | 2019 |
Malware classification based on multilayer perception and Word2Vec for IoT security Y Qiao, W Zhang, X Du, M Guizani ACM Transactions on Internet Technology (TOIT) 22 (1), 1-22, 2021 | 25 | 2021 |
How to automatically identify the homology of different malware Y Qiao, X Yun, Y Zhang 2016 IEEE Trustcom/BigDataSE/ISPA, 929-936, 2016 | 18 | 2016 |
Research of network vulnerability analysis based on attack capability transfer Y Wang, X Yun, Y Zhang, S Jin, Y Qiao 2012 IEEE 12th International Conference on Computer and Information …, 2012 | 12 | 2012 |
Fast reused function retrieval method based on simhash and inverted index Y Qiao, X Yun, Y Zhang 2016 IEEE Trustcom/BigDataSE/ISPA, 937-944, 2016 | 10 | 2016 |
Adversarial malware sample generation method based on the prototype of deep learning detector Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab Computers & Security 119, 102762, 2022 | 9 | 2022 |
Adversarial ELF malware detection method using model interpretation Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab IEEE Transactions on Industrial Informatics 19 (1), 605-615, 2022 | 9 | 2022 |
Malware classification method based on word vector of bytes and multilayer perception Y Qiao, B Zhang, W Zhang ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 9 | 2020 |
Fast reused code tracing method based on simhash and inverted index YC Qiao, XC Yun, Y Tuo, Y Zhang Journal on Communications 37 (11), 104-113, 2016 | 7 | 2016 |
Who Is Using the Phone? Representation‐Learning‐Based Continuous Authentication on Smartphones H Wang, H He, C Song, H Tang, Y Sun, Y Qiao, W Zhang Security and Communication Networks 2022 (1), 6339407, 2022 | 5 | 2022 |
An automatic malware homology identification method based on calling habits YC Qiao, XC Yun, YZ Zhang Acta Electron Sin 44 (10), 2410-2414, 2016 | 5 | 2016 |
A similar module extraction approach for android malware Z Li, Y Qiao, T Hasan, Q Jiang Proceedings of the 2018 International Conference on Modeling, Simulation and …, 2018 | 4 | 2018 |