Follow
Lei Pan
Lei Pan
Associate Professor, School of Information Technology, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377--391, 2022
3052022
A survey of Android malware detection with deep neural models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
ACM Computing Surveys 53 (6), 126:1--126:36, 2020
2982020
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
2322018
Security analysis methods on Ethereum smart contract vulnerabilities: A survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv:1908.08605, 2019
2092019
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1682017
Data-driven cyber security in perspective--intelligent traffic analysis
R Coulter, QL Han, L Pan, J Zhang, Y Xiang
IEEE Transactions on Cybernetics 50 (7), 3081-3093, 2020
1172020
Software vulnerability discovery via learning multi-domain knowledge bases
G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2019
1172019
Machine learning based cyber attacks targeting on controlled information: A survey
Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang
ACM Computing Surveys 54 (7), 139:1--139:36, 2021
1072021
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of Information Security and Applications 36, 90-100, 2017
952017
Software vulnerability analysis and discovery using deep learning techniques: A survey
P Zeng, G Lin, L Pan, Y Tai, J Zhang
IEEE Access 8, 197158--197172, 2020
742020
The importance of selecting clustering parameters in VANETs: A survey
R Kaur, RK Ramachandran, R Doss, L Pan
Computer Science Review 40, 100392:1--100392:23, 2021
642021
Protean authentication scheme--a time-bound dynamic keygen authentication technique for IoT edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE Access 7, 92419-92435, 2019
592019
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, RRM Doss, L Pan
Proceedings of the 2018 28th International Telecommunication Networks and …, 2018
592018
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
International Journal of Computers and Applications 40 (4), 202-213, 2018
572018
Intelligent agents defending for an IoT world: A review
R Coulter, L Pan
Computers & Security 73, 439-458, 2018
522018
Graph deep learning based anomaly detection in Ethereum blockchain network
V Patel, L Pan, S Rajasegarar
Proceedings of the 2020 International Conference on Network and System …, 2020
492020
A3CM: Automatic capability annotation for Android malware
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Wang, Y Xiang
IEEE Access 7, 147156-147168, 2019
462019
Domain-adversarial graph neural networks for text classification
M Wu, S Pan, X Zhu, C Zhou, L Pan
Proceedings of the 19th IEEE International Conference on Data Mining (ICDM'19), 2019
462019
Visualization of big data security: A case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
Digital Communications and Networks 3 (4), 250-259, 2017
432017
Cyber code intelligence for Android malware detection
J Qiu, QL Han, W Luo, L Pan, S Nepal, J Zhang, Y Xiang
IEEE Transactions on Cybernetics 53 (1), 617--627, 2022
422022
The system can't perform the operation now. Try again later.
Articles 1–20