关注
Zhiyang Fang
Zhiyang Fang
在 scu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Evading anti-malware engines with deep reinforcement learning
Z Fang, J Wang, B Li, S Wu, Y Zhou, H Huang
IEEE Access 7, 48867-48879, 2019
942019
Feature selection for malware detection based on reinforcement learning
Z Fang, J Wang, J Geng, X Kan
IEEE Access 7, 176177-176187, 2019
482019
DroidRL: Feature selection for android malware detection with reinforcement learning
Y Wu, M Li, Q Zeng, T Yang, J Wang, Z Fang, L Cheng
Computers & Security 128, 103126, 2023
252023
A systematic overview of android malware detection
L Meijin, F Zhiyang, W Junfeng, C Luyu, Z Qi, Y Tao, W Yinwei, G Jiaxuan
Applied Artificial Intelligence 36 (1), 2007327, 2022
242022
LMTracker: Lateral movement path detection based on heterogeneous graph embedding
Y Fang, C Wang, Z Fang, C Huang
Neurocomputing 474, 37-47, 2022
182022
A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning
Z Fang, J Wang, J Geng, Y Zhou, X Kan
Applied Soft Computing 109, 107505, 2021
132021
HGVul: A Code Vulnerability Detection Method Based on Heterogeneous Source‐Level Intermediate Representation
Z Song, J Wang, S Liu, Z Fang, K Yang
Security and Communication Networks 2022 (1), 1919907, 2022
82022
EvadeRL: Evading PDF malware classifiers with deep reinforcement learning
Z Mao, Z Fang, M Li, Y Fan
Security and Communication Networks 2022 (1), 7218800, 2022
62022
A new software birthmark based on weight sequences of dynamic control flow graph for plagiarism detection
B Yuan, J Wang, Z Fang, L Qi
The Computer Journal 61 (8), 1202-1215, 2018
62018
A Survey of strategy-driven evasion methods for PE malware: transformation, concealment, and attack
J Geng, J Wang, Z Fang, Y Zhou, D Wu, W Ge
Computers & Security 137, 103595, 2024
52024
An empirical study of the code generation of safety-critical software using llms
M Liu, J Wang, T Lin, Q Ma, Z Fang, Y Wu
Applied Sciences 14 (3), 1046, 2024
42024
Enhancing software modularization via semantic outliers filtration and label propagation
K Yang, J Wang, Z Fang, P Wu, Z Song
Information and Software Technology 145, 106818, 2022
42022
Droidrl: Reinforcement learning driven feature selection for android malware detection
Y Wu, M Li, J Wang, Z Fang, Q Zeng, T Yang, L Cheng
arXiv preprint arXiv:2203.02719, 2022
42022
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
X Cao, J Wang, P Wu, Z Fang
IET Information Security 2024 (1), 4313185, 2024
12024
Utilizing benign files to obfuscate malware via deep reinforcement learning
J Gao, Z Fang
2022 4th International Conference on Intelligent Information Processing (IIP …, 2022
12022
Web-Based Software Reliability Analysis and Measurement System
Z Fang, J Wang, D Liu, C She
International Conference on Applied Informatics and Communication, 664-670, 2011
12011
系统目前无法执行此操作,请稍后再试。
文章 1–16