Calculated based on number of publications stored in Pure and citations from Scopus
1997 …2025

Research activity per year

Filter
Conference contribution

Search results

  • 2020

    LAFuzz: Neural Network for Efficient Fuzzing

    Wang, X., Hu, C., Ma, R., Li, B. & Wang, X., Nov 2020, Proceedings - IEEE 32nd International Conference on Tools with Artificial Intelligence, ICTAI 2020. Alamaniotis, M. & Pan, S. (eds.). IEEE Computer Society, p. 603-611 9 p. 9288180. (Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • Research on Software Network Key Nodes Mining Methods Based on Complex Network

    Shan, C., Wang, P., Hu, C., Gao, X. & Mei, S., 2020, Trusted Computing and Information Security - 13th Chinese Conference, CTCIS 2019, Revised Selected Papers. Han, W., Zhu, L. & Yan, F. (eds.). Springer, p. 193-205 13 p. (Communications in Computer and Information Science; vol. 1149 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    An Improved Prediction Model for the Network Security Situation

    Hu, J., Ma, D., Chen, L., Yan, H. & Hu, C., 2019, Smart Computing and Communication - 4th International Conference, SmartCom 2019, Proceedings. Qiu, M. (ed.). Springer, p. 22-33 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11910 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A vulnerability detection model for java systems based on complex networks

    Xiong, L., Chun, S., Hu, C., Yu, Z. & Xiong, W., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 1339-1347 9 p. 9060132. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Detecting malicious urls using a deep learning approach based on stacked denoising autoencoder

    Yan, H., Zhang, X., Xie, J. & Hu, C., 2019, Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers. Zhang, H., Zhao, B. & Yan, F. (eds.). Springer Verlag, p. 372-388 17 p. (Communications in Computer and Information Science; vol. 960).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Network risk assessment method based on asset correlation graph

    Shan, C., Gao, J., Hu, C., Guan, F. & Zhao, X., 2019, Trusted Computing and Information Security - 12th Chinese Conference, CTCIS 2018, Revised Selected Papers. Zhang, H., Zhao, B. & Yan, F. (eds.). Springer Verlag, p. 65-83 19 p. (Communications in Computer and Information Science; vol. 960).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Segmental symbolic execution based on clustering

    Ma, R., Gao, H., Dou, B., Wang, X. & Hu, C., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 1289-1296 8 p. 9060117. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2018

    A double-layer detection and classification approach for network attacks

    Sun, C., Lv, K., Hu, C. & Xie, H., 9 Oct 2018, ICCCN 2018 - 27th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 8487460. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • A monte carlo graph search algorithm with ant colony optimization for optimal attack path analysis

    Xie, H., Lv, K., Hu, C. & Sun, C., 9 Oct 2018, ICCCN 2018 - 27th International Conference on Computer Communications and Networks. Institute of Electrical and Electronics Engineers Inc., 8487462. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2018-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • An attack graph generation method based on parallel computing

    Cao, N., Lv, K. & Hu, C., 2018, Science of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers. Liu, F., Yung, M. & Xu, S. (eds.). Springer Verlag, p. 34-48 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11287 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial Nets

    Xie, H., Lv, K. & Hu, C., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1777-1784 8 p. 8456136. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path Analysis

    Xie, H., Lv, K. & Hu, C., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 307-315 9 p. 8455922. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A partition matching method for optimal attack path analysis

    Xie, H., Lv, K. & Hu, C., 2 Jul 2018, Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018. Chen, J. & Yang, L. T. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 120-126 7 p. 8672220. (Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11th IEEE International Conference on Social Computing and Networking and 8th IEEE International Conference on Sustainable Computing and Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A secure pairing-free certificate-less authenticated key agreement protocol

    Chun, S., Kangwen, H., Jingfeng, X., Changzhen, H. & Rui, M., 2018, Lecture Notes in Real-Time Intelligent Systems. Mizera-Pietraszko, J. & Pichappan, P. (eds.). Springer Verlag, p. 205-216 12 p. (Advances in Intelligent Systems and Computing; vol. 613).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Establishing an optimal network defense system: A monte carlo graph search method

    Zhang, Z., Lv, K. & Hu, C., 2018, Science of Cyber Security - 1st International Conference, SciSec 2018, Revised Selected Papers. Liu, F., Yung, M. & Xu, S. (eds.). Springer Verlag, p. 181-190 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11287 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Software System Representation Methods Based on Algebraic Component

    Yu, Z., Shan, C., Mao, L., Hu, C. & Xiong, W., 5 Sept 2018, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1008-1013 6 p. 8456011. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2017

    A detecting method of array bounds defects based on symbolic execution

    Shan, C., Sun, S., Xue, J., Hu, C. & Zhu, H., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 373-385 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • A driver model based on emotion

    Xiao, Q., Hu, C. & Ding, G., 2017, Advances in Swarm Intelligence - 8th International Conference, ICSI 2017, Proceedings. Niu, B., Takagi, H., Shi, Y. & Tan, Y. (eds.). Springer Verlag, p. 608-614 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10386 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Analysis of vulnerability correlation based on data fitting

    Wang, L., Ma, R., Gao, H. R., Wang, X. J. & Hu, C. Z., 2017, Trusted Computing and Information Security - 11th Chinese Conference, CTCIS 2017, Proceedings. Yan, F., Xu, M., Fu, S. & Qin, Z. (eds.). Springer Verlag, p. 165-180 16 p. (Communications in Computer and Information Science; vol. 704).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • An automatic vulnerabilities classification method based on their relevance

    Zhang, H., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 475-485 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • An online approach to defeating return-oriented-programming attacks

    Tian, D., Jia, X., Zhan, L., Hu, C. & Xue, J., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (eds.). Springer Verlag, p. 236-247 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10581 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • A practical method to confine sensitive API invocations on commodity hardware

    Tian, D., Qi, D., Zhan, L., Yin, Y., Hu, C. & Xue, J., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 145-159 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • A quantitative method for evaluating network security based on attack graph

    Zheng, Y., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 349-358 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • Defenses against wormhole attacks in wireless sensor networks

    Ma, R., Chen, S., Ma, K., Hu, C. & Wang, X., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 413-426 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Mining frequent intra-sequence and inter-sequence patterns using bitmap with a maximal span

    Liao, W., Wang, Q., Yang, L., Ren, J., Davis, D. N. & Hu, C., 2 Jul 2017, Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017. Institute of Electrical and Electronics Engineers Inc., p. 56-61 6 p. (Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • Mining Frequent Patterns for Item-Oriented and Customer-Oriented Analysis

    Liao, W., Wang, Q., Yang, L., Ren, J., Davis, D. N. & Hu, C., 2 Jul 2017, Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017. Institute of Electrical and Electronics Engineers Inc., p. 62-67 6 p. (Proceedings - 2017 14th Web Information Systems and Applications Conference, WISA 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Optimal attack path generation based on supervised kohonen neural network

    Chen, Y., Lv, K. & Hu, C., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 399-412 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Predicting vulnerable software components using software network graph

    Wei, S., Du, X., Hu, C. & Shan, C., 2017, Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Proceedings. Wu, W., Castiglione, A. & Wen, S. (eds.). Springer Verlag, p. 280-290 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10581 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • SulleyEX: A fuzzer for stateful network protocol

    Ma, R., Zhu, T., Hu, C., Shan, C. & Zhao, X., 2017, Network and System Security - 11th International Conference, NSS 2017, Proceedings. Yan, Z., Molva, R., Mazurczyk, W. & Kantola, R. (eds.). Springer Verlag, p. 359-372 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10394 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2016

    Application of complexity and brittleness on software architecture

    Zhang, H., Hu, C. & Wang, X., 7 Oct 2016, Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 570-573 4 p. 7586587. (Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Dynamic tracking reinforcement based on simplified control flow

    Li, J., Tian, D. & Hu, C., 1 Feb 2016, Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015. Institute of Electrical and Electronics Engineers Inc., p. 358-362 5 p. 7397107. (Proceedings - 2015 11th International Conference on Computational Intelligence and Security, CIS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Outlier detection for time-evolving complex networks

    Zhang, H., Hu, C. & Wang, X., 2016, Proceedings of 2015 International Conference on Electrical and Information Technologies for Rail Transportation - Transportation. Qin, Y., Jia, L., Diao, L., Feng, J. & An, M. (eds.). Springer Verlag, p. 677-684 8 p. (Lecture Notes in Electrical Engineering; vol. 378).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Software defect prediction model based on improved LLE-SVM

    Shan, C., Zhu, H., Hu, C., Cui, J. & Xue, J., 13 Jun 2016, Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015. Institute of Electrical and Electronics Engineers Inc., p. 530-535 6 p. 7490804. (Proceedings of 2015 4th International Conference on Computer Science and Network Technology, ICCSNT 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Citations (Scopus)
  • The importance of k-shell in discovering key nodes in complex networks

    Zhang, H., Hu, C. & Wang, X., 7 Oct 2016, Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016. Institute of Electrical and Electronics Engineers Inc., p. 565-569 5 p. 7586586. (Proceedings of 2016 8th IEEE International Conference on Communication Software and Networks, ICCSN 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2015

    Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs

    Wang, Y., Li, M., Yan, H., Liu, Z., Xue, J. & Hu, C., 2015, Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015. Messina, F., Xhafa, F., Ogiela, M. R. & Barolli, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 430-434 5 p. 7424602. (Proceedings - 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Software behavior model measuring approach of combining structural analysis and language set

    Xue, J., Zhang, Y., Hu, C., Ren, H. & Li, Z., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 137-150 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Taint propagation path analysis based on program dependency

    Wang, Y., Wang, C., Hu, C. Z. & Shan, C., 2015, Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014. Zheng, D. (ed.). CRC Press/Balkema, p. 159-164 6 p. (Future Communication, Information and Computer Science - Proceedings of the International Conference on Future Communication, Information and Computer Science, FCICS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2014

    A discovery method of the dirty data transmission path based on complex network

    Zhao, X. L., Hao, G., Hu, C. Z. & Li, Z. Q., 2014, Material Science, Civil Engineering and Architecture Science, Mechanical Engineering and Manufacturing Technology II. Liu, H. W., Wang, G. & Zhang, G. W. (eds.). Trans Tech Publications Ltd., p. 1741-1747 7 p. (Applied Mechanics and Materials; vol. 651-653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fuzz testing data generation for network protocol using classification tree

    Ma, R., Ji, W., Hu, C., Shan, C. & Peng, W., 2014, IET Conference Publications. CP653 ed. Institution of Engineering and Technology, 0748. (IET Conference Publications; vol. 2014, no. CP653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Citations (Scopus)
  • Measurement of software structural properties based on the theory of complex networks

    Zhao, X. L., Chen, X. L. Y., Hu, C. Z., Wang, Y. & Li, Q. J., 2014, Advanced Manufacturing and Information Engineering, Intelligent Instrumentation and Industry Development. Trans Tech Publications Ltd., p. 2163-2169 7 p. (Applied Mechanics and Materials; vol. 602-605).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • Research on software behavior modeling based on extended finite state automata

    Zhao, X., Xue, J., Hu, C., Ma, R. & Zhang, S., 2014, IET Conference Publications. CP653 ed. Institution of Engineering and Technology, 0744. (IET Conference Publications; vol. 2014, no. CP653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Software defect prediction model based on LLE and SVM

    Shan, C., Chen, B., Hu, C., Xue, J. & Li, N., 2014, IET Conference Publications. CP653 ed. Institution of Engineering and Technology, 0749. (IET Conference Publications; vol. 2014, no. CP653).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Citations (Scopus)
  • Software structural stability evaluation method based on motifs

    Shan, C., Huang, L., Hu, C. Z., Zhao, X. L. & Ma, J. S., 2014, Materials Science, Computer and Information Technology. Trans Tech Publications Ltd., p. 2128-2134 7 p. (Advanced Materials Research; vol. 989-994).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    A dynamic detection method to C/C++ programs memory vulnerabilities based on pointer analysis

    Ma, R., Chen, L., Hu, C., Xue, J. & Zhao, X., 2013, Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013. IEEE Computer Society, p. 52-57 6 p. 6844337. (Proceedings - 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, DASC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • An approach for cross-domain access control policy generation from reputation evaluation to trust management

    Wang, Y., Liu, Z. Y., Hu, C. Z., Zhao, X. L., Xue, J. F. & Wei, L. X., 2013, 2013 International Conference on Information and Network Security, ICINS 2013. 643 CP ed. Institution of Engineering and Technology, (IET Conference Publications; vol. 2013, no. 643 CP).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cyber security datasets research

    Wang, Z., Hu, C., Hao, M. & Lu, F., 2013, Advanced Materials and Computer Science II. p. 191-195 5 p. (Advanced Materials Research; vol. 659).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2011

    A novel framework for active detection of HTTP based attacks

    Jie, L., Jianwei, S. & Changzhen, H., 2011, Communication Systems and Information Technology - Selected Papers from the 2011 International Conference on Electric and Electronics, EEIC 2011. VOL. 4 ed. p. 411-418 8 p. (Lecture Notes in Electrical Engineering; vol. 100 LNEE, no. VOL. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Integrating offline analysis and online protection to defeat buffer overflow attacks

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security - 13th International Conference, ISC 2010, Revised Selected Papers. Springer Verlag, p. 409-415 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6531 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Memory errors prevention technology for C/C++ program based on probability

    Xue, J., Hu, C., Ren, H., Ma, R. & Li, J., 2011, NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering. p. 233-237 5 p. 6138200. (NLP-KE 2011 - Proceedings of the 7th International Conference on Natural Language Processing and Knowledge Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Policy-centric protection of OS kernel from vulnerable loadable kernel modules

    Tian, D., Xiong, X., Hu, C. & Liu, P., 2011, Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Proceedings. p. 317-332 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)