


default search action
Peian Yang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j7]Mengjiao Cui, Zhengwei Jiang, Shuai Li, Chunyan Ma, Kai Zhang, Peian Yang, Huamin Feng:
MGDA: A provenance graph-based framework for threat detection and attack scenario reconstruction. Comput. Networks 274: 111806 (2026)- 2025
[j6]Chunyan Ma
, Zhengwei Jiang
, Kai Zhang, Zhiting Ling, Jun Jiang, Yizhe You, Peian Yang, Huamin Feng:
TIMFuser: A multi-granular fusion framework for cyber threat intelligence. Comput. Secur. 148: 104141 (2025)
[c14]Fangming Dong, Zhengwei Jiang, Chunyan Ma, Qiying He, Peian Yang, Yepeng Yao, Jian Wang:
From Threat Report to ATT&CK: Automated Extraction and Reasoning of TTPs Using Large Language Models. CSCWD 2025: 860-865
[c13]Mengjiao Cui, Zhengwei Jiang, Yepeng Yao, Chunyan Ma, Qiying He, Peian Yang, Huamin Feng:
AGLHunter: Automated Threat Hunting Using In-Context Learning-Enhanced LLM. CSCWD 2025: 1812-1819- 2024
[j5]Yizhe You, Zhengwei Jiang
, Peian Yang, Jun Jiang, Kai Zhang
, Xuren Wang, Chenpeng Tu
, Huamin Feng
:
P-TIMA: a framework of T witter threat intelligence mining and analysis based on a prompt-learning NER model. Comput. J. 67(12): 3221-3238 (2024)
[j4]Yiren Chen
, Mengjiao Cui
, Ding Wang, Yiyang Cao
, Peian Yang
, Bo Jiang, Zhigang Lu, Baoxu Liu:
A survey of large language models for cyber threat detection. Comput. Secur. 145: 104016 (2024)
[c12]Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang
, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. CSCWD 2024: 1687-1694
[c11]Chunyan Ma, Zhengwei Jiang, Jun Jiang, Peian Yang, Mengjiao Cui, Fangming Dong, Huamin Feng:
CTIFuser: Cyber Threat Intelligence Fusion via Unsupervised Learning Model. ISPA 2024: 534-543- 2023
[c10]Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu:
Simplified-Xception: A New Way to Speed Up Malicious Code Classification. CSCWD 2023: 582-587
[c9]Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang:
Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain. CSCWD 2023: 909-916
[c8]Chunyan Ma
, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. TrustCom 2023: 531-538- 2022
[j3]Yizhe You, Jun Jiang, Zhengwei Jiang
, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecur. 5(1): 3 (2022)
[j2]Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang
, Peian Yang, Ning Li:
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecur. 5(1): 8 (2022)
[c7]Xuren Wang, Runshi Liu, Jie Yang, Rong Chen, Zhiting Ling, Peian Yang, Kai Zhang:
Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering. CSCWD 2022: 406-413
[c6]Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. SciSec 2022: 522-538
[c5]Xuren Wang, Rong Chen, Binghua Song, Jungang An, Jun Jiang, Jian Wang, Peian Yang:
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1796-1803- 2021
[c4]Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang:
Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks. IFIP Int. Conf. Digital Forensics 2021: 193-211
[c3]Xuren Wang, Mengbo Xiong, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong:
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction. SEKE 2021: 79-85
[c2]Yali Luo, Zhengwei Jiang, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang:
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce. WCNC 2021: 1-6- 2020
[c1]Meng Luo, Qiuyun Wang
, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. ISCC 2020: 1-7
2010 – 2019
- 2018
[j1]Peian Yang, Yang Wu, Liya Su, Baoxu Liu:
网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace). 计算机科学 45(6): 9-18 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-16 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







