Deep learning based attack detection for cyber-physical system cybersecurity: A survey J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang IEEE/CAA Journal of Automatica Sinica 9 (3), 377--391, 2022 | 305 | 2022 |
A survey of Android malware detection with deep neural models J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang ACM Computing Surveys 53 (6), 126:1--126:36, 2020 | 298 | 2020 |
Cross-project transfer representation learning for vulnerable function discovery G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018 | 232 | 2018 |
Security analysis methods on Ethereum smart contract vulnerabilities: A survey P Praitheeshan, L Pan, J Yu, J Liu, R Doss arXiv:1908.08605, 2019 | 209 | 2019 |
POSTER: Vulnerability discovery with function representation learning from unlabeled projects G Lin, J Zhang, W Luo, L Pan, Y Xiang Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 168 | 2017 |
Data-driven cyber security in perspective--intelligent traffic analysis R Coulter, QL Han, L Pan, J Zhang, Y Xiang IEEE Transactions on Cybernetics 50 (7), 3081-3093, 2020 | 117 | 2020 |
Software vulnerability discovery via learning multi-domain knowledge bases G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang IEEE Transactions on Dependable and Secure Computing, 2019 | 117 | 2019 |
Machine learning based cyber attacks targeting on controlled information: A survey Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang ACM Computing Surveys 54 (7), 139:1--139:36, 2021 | 107 | 2021 |
Cyber security attacks to modern vehicular systems L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten Journal of Information Security and Applications 36, 90-100, 2017 | 95 | 2017 |
Software vulnerability analysis and discovery using deep learning techniques: A survey P Zeng, G Lin, L Pan, Y Tai, J Zhang IEEE Access 8, 197158--197172, 2020 | 74 | 2020 |
The importance of selecting clustering parameters in VANETs: A survey R Kaur, RK Ramachandran, R Doss, L Pan Computer Science Review 40, 100392:1--100392:23, 2021 | 64 | 2021 |
Protean authentication scheme--a time-bound dynamic keygen authentication technique for IoT edge nodes in outdoor deployments S Sathyadevan, K Achuthan, R Doss, L Pan IEEE Access 7, 92419-92435, 2019 | 59 | 2019 |
A scalable and efficient PKI based authentication protocol for VANETs M Asghar, RRM Doss, L Pan Proceedings of the 2018 28th International Telecommunication Networks and …, 2018 | 59 | 2018 |
Practical overview of security issues in wireless sensor network applications H Radhappa, L Pan, J Xi Zheng, S Wen International Journal of Computers and Applications 40 (4), 202-213, 2018 | 57 | 2018 |
Intelligent agents defending for an IoT world: A review R Coulter, L Pan Computers & Security 73, 439-458, 2018 | 52 | 2018 |
Graph deep learning based anomaly detection in Ethereum blockchain network V Patel, L Pan, S Rajasegarar Proceedings of the 2020 International Conference on Network and System …, 2020 | 49 | 2020 |
A3CM: Automatic capability annotation for Android malware J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Wang, Y Xiang IEEE Access 7, 147156-147168, 2019 | 46 | 2019 |
Domain-adversarial graph neural networks for text classification M Wu, S Pan, X Zhu, C Zhou, L Pan Proceedings of the 19th IEEE International Conference on Data Mining (ICDM'19), 2019 | 46 | 2019 |
Visualization of big data security: A case study on the KDD99 cup data set Z Ruan, Y Miao, L Pan, N Patterson, J Zhang Digital Communications and Networks 3 (4), 250-259, 2017 | 43 | 2017 |
Cyber code intelligence for Android malware detection J Qiu, QL Han, W Luo, L Pan, S Nepal, J Zhang, Y Xiang IEEE Transactions on Cybernetics 53 (1), 617--627, 2022 | 42 | 2022 |