Software vulnerability detection using deep neural networks: a survey G Lin, S Wen, QL Han, J Zhang, Y Xiang Proceedings of the IEEE 108 (10), 1825-1848, 2020 | 455 | 2020 |
Robust network traffic classification J Zhang, X Chen, Y Xiang, W Zhou, J Wu IEEE/ACM transactions on networking 23 (4), 1257-1270, 2015 | 444 | 2015 |
Network Traffic Classification Using Correlation Information J Zhang, Y Xiang, Y Wang, W Zhou, Y Guan IEEE Transactions on Parallel and Distributed Systems 24 (1), 104-117, 2013 | 431 | 2013 |
Detecting and preventing cyber insider threats: A survey L Liu, O De Vel, QL Han, J Zhang, Y Xiang IEEE Communications Surveys & Tutorials 20 (2), 1397-1417, 2018 | 425 | 2018 |
Call attention to rumors: Deep attention based recurrent neural networks for early rumor detection T Chen, X Li, H Yin, J Zhang Trends and Applications in Knowledge Discovery and Data Mining: PAKDD 2018 …, 2018 | 418 | 2018 |
Data-driven cybersecurity incident prediction: A survey N Sun, J Zhang, P Rimba, S Gao, LY Zhang, Y Xiang IEEE Communications Surveys & Tutorials 21 (2), 1744-1772, 2019 | 352 | 2019 |
Security and privacy in 6G networks: New areas and new challenges M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou Digital Communications and Networks 6 (3), 281-291, 2020 | 338 | 2020 |
Android HIV: A study of repackaging malware for evading machine-learning detection X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren IEEE Transactions on Information Forensics and Security 15, 987-1001, 2020 | 314 | 2020 |
Deep learning based attack detection for cyber-physical system cybersecurity: A survey J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021 | 311 | 2021 |
A survey of android malware detection with deep neural models J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang ACM Computing Surveys (CSUR) 53 (6), 1-36, 2020 | 301 | 2020 |
Internet Traffic Classification by Aggregating Correlated Naive Bayes Predictions J Zhang, C Chen, Y Xiang, W Zhou IEEE Transactions on Information Forensics and Security 8 (1), 5-15, 2013 | 239 | 2013 |
Cross-project transfer representation learning for vulnerable function discovery G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018 | 233 | 2018 |
Statistical features-based real-time detection of drifted twitter spam C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016 | 200 | 2016 |
Twitter spam detection based on deep learning T Wu, S Liu, J Zhang, Y Xiang Proceedings of the australasian computer science week multiconference, 1-8, 2017 | 189 | 2017 |
POSTER: Vulnerability discovery with function representation learning from unlabeled projects G Lin, J Zhang, W Luo, L Pan, Y Xiang Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 170 | 2017 |
6 million spam tweets: A large ground truth for timely Twitter spam detection C Chen, J Zhang, X Chen, Y Xiang, W Zhou 2015 IEEE international conference on communications (ICC), 7065-7070, 2015 | 169 | 2015 |
A performance evaluation of machine learning-based streaming spam tweets detection C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ... IEEE Transactions on Computational social systems 2 (3), 65-76, 2015 | 163 | 2015 |
Addressing the class imbalance problem in twitter spam detection using ensemble learning S Liu, Y Wang, J Zhang, C Chen, Y Xiang Computers & Security 69, 35-49, 2017 | 154 | 2017 |
An effective network traffic classification method with unknown flow detection J Zhang, C Chen, Y Xiang, W Zhou, AV Vasilakos IEEE transactions on network and service management 10 (2), 133-147, 2013 | 154 | 2013 |
Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives N Sun, M Ding, J Jiang, W Xu, X Mo, Y Tai, J Zhang IEEE Communications Surveys & Tutorials 25 (3), 1748-1774, 2023 | 141 | 2023 |