default search action
Cheng Huang 0003
Person information
- affiliation: Sichuan University, Chengdu, China
Other persons with the same name
- Cheng Huang — disambiguation page
- Cheng Huang 0001 — University of Waterloo, Department of Electrical and Computer Engineering, Ontario, Canada
- Cheng Huang 0002 — Microsoft Research, Redmond, WA, USA
- Cheng Huang 0004 — Iowa State University, Ames, IA, USA
- Cheng Huang 0005 — Southeast University, National ASIC Center, Nanjing, China
- Cheng Huang 0006 — Harbin University of Science and Technology, Heilongjiang Provincial Key Laboratory of Complex Intelligent System and Integration, Harbin, China
- Cheng Huang 0007 — Shanghai Jiao Tong University, UM-SJTU Joint Institute, Shanghai, China
- Cheng Huang 0008 — Cranfield University, School of Aerospace, Transport and Manufacturing, Cranfield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu, Weipeng Cao:
Hacker group identification based on dynamic heterogeneous graph node update. Appl. Soft Comput. 158: 111587 (2024) - [j53]Lingzi Li, Cheng Huang, Junren Chen:
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence. Comput. Secur. 140: 103815 (2024) - [j52]Jiaxuan Han, Cheng Huang, Jiayong Liu:
bjCnet: A contrastive learning-based framework for software defect prediction. Comput. Secur. 145: 104024 (2024) - [j51]Junren Chen, Cheng Huang, Jiaxuan Han:
VioDroid-Finder: automated evaluation of compliance and consistency for Android apps. Empir. Softw. Eng. 29(3): 64 (2024) - [j50]Nannan Wang, Cheng Huang, Junren Chen, Lingzi Li:
CMRight: Chinese Morph Resolution based on end-to-end model combined with enhancement algorithms. Expert Syst. Appl. 254: 124294 (2024) - [j49]Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, Cheng Huang:
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning. J. Cloud Comput. 13(1): 125 (2024) - [c22]Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi:
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping. USENIX Security Symposium 2024 - [i2]Cheng Huang, Nannan Wang, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang, Lei Shi:
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping. CoRR abs/2403.08334 (2024) - 2023
- [j48]Yutong Du, Cheng Huang, Genpei Liang, Zhihao Fu, Dunhan Li, Yong Ding:
ExpSeeker: extract public exploit code information from social media. Appl. Intell. 53(12): 15772-15786 (2023) - [j47]Jiaxuan Han, Cheng Huang, Siqi Sun, Zhonglin Liu, Jiayong Liu:
bjXnet: an improved bug localization model based on code property graph and attention mechanism. Autom. Softw. Eng. 30(1): 12 (2023) - [j46]Zhonglin Liu, Yong Fang, Cheng Huang, Yijia Xu:
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. Comput. Secur. 124: 103015 (2023) - [j45]Yan Wang, Peng Jia, Xi Peng, Cheng Huang, Jiayong Liu:
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention. Comput. Secur. 125: 103023 (2023) - [j44]Yongyan Guo, Zhengyu Liu, Cheng Huang, Nannan Wang, Hai Min, Wenbo Guo, Jiayong Liu:
A framework for threat intelligence extraction and fusion. Comput. Secur. 132: 103371 (2023) - [j43]Siqi Sun, Cheng Huang, Tiejun Wu, Yi Shen:
SecTKG: A Knowledge Graph for Open-Source Security Tools. Int. J. Intell. Syst. 2023: 1-22 (2023) - [j42]Qianchong Zhao, Cheng Huang, Liuhu Dai:
VULDEFF: Vulnerability detection method based on function fingerprints and code differences. Knowl. Based Syst. 260: 110139 (2023) - [c21]Chenxin Zhou, Cheng Huang, Yanghao Wang, Zheng Zuo:
APTBert: Abstract Generation and Event Extraction from APT Reports. ICDF2C (2) 2023: 209-223 - [c20]Yi Shen, Yuhan Zhang, Yuwei Li, Wanmeng Ding, Miao Hu, Yang Li, Cheng Huang, Jie Wang:
IoT Malicious Traffic Detection Based on Federated Learning. ICDF2C (1) 2023: 249-263 - [c19]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. ASE 2023: 166-177 - [c18]Zhen Yang, Cheng Huang, Jiayong Liu:
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach. KSEM (4) 2023: 175-188 - [i1]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. CoRR abs/2309.11021 (2023) - 2022
- [j41]Zhenfei Zhao, Weina Niu, Xiaosong Zhang, Runzi Zhang, Zhenqi Yu, Cheng Huang:
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Appl. Intell. 52(8): 8810-8819 (2022) - [j40]Zhonglin Liu, Yong Fang, Cheng Huang, Jiaxuan Han:
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network. Comput. Secur. 114: 102597 (2022) - [j39]Yong Fang, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang:
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. Comput. Secur. 118: 102715 (2022) - [j38]Weina Niu, Jie Zhou, Yibin Zhao, Xiaosong Zhang, Yujie Peng, Cheng Huang:
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis. Comput. Secur. 120: 102809 (2022) - [j37]Wenbo Guo, Yong Fang, Cheng Huang, Haoran Ou, Chun Lin, Yongyan Guo:
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network. Comput. Secur. 121: 102823 (2022) - [j36]Yong Fang, Congshuang Wang, Zhiyang Fang, Cheng Huang:
LMTracker: Lateral movement path detection based on heterogeneous graph embedding. Neurocomputing 474: 37-47 (2022) - [j35]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu:
HGHAN: Hacker group identification based on heterogeneous graph attention network. Inf. Sci. 612: 848-863 (2022) - [j34]Hongyu Pan, Yong Fang, Cheng Huang, Wenbo Guo, Xuelin Wan:
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks. KSII Trans. Internet Inf. Syst. 16(12): 4008-4023 (2022) - [j33]Anmin Zhou, Tianyi Huang, Cheng Huang, Dunhan Li, Chuangchuang Song:
PyComm: Malicious commands detection model for python scripts. J. Intell. Fuzzy Syst. 42(3): 2261-2273 (2022) - [j32]Xiaole Liu, Cheng Huang, Yong Fang:
DDIML: Explainable detection model for drive-by-download attacks. J. Intell. Fuzzy Syst. 43(3): 3429-3442 (2022) - [c17]Yuqiang Sun, Dunhan Li, Yixin Wu, Xuelin Wan, Cheng Huang:
WAIN: Automatic Web Application Identification and Naming Method. Internetware 2022: 37-44 - [c16]Haoran Ou, Yong Fang, Yongyan Guo, Wenbo Guo, Cheng Huang:
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. RAID 2022: 409-430 - [c15]Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang:
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy. SecureComm 2022: 89-108 - 2021
- [j31]Yong Fang, Yuchi Zhang, Cheng Huang:
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network. Comput. J. 64(8): 1215-1225 (2021) - [j30]Yongyan Guo, Jiayong Liu, Wenwu Tang, Cheng Huang:
Exsense: Extract sensitive information from unstructured data. Comput. Secur. 102: 102156 (2021) - [j29]Cheng Huang, Yongyan Guo, Wenbo Guo, Ying Li:
HackerRank: Identifying key hackers in underground forums. Int. J. Distributed Sens. Networks 17(5): 155014772110151 (2021) - [j28]Yong Fang, Xiangyu Zhou, Cheng Huang:
Effective method for detecting malicious PowerShell scripts based on hybrid features☆. Neurocomputing 448: 30-39 (2021) - [j27]Yong Fang, Shaoshuai Yang, Bin Zhao, Cheng Huang:
Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism. Inf. 12(4): 171 (2021) - [j26]Ying Li, Jiaxing Cheng, Cheng Huang, Zhouguo Chen, Weina Niu:
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums. J. Inf. Secur. Appl. 58: 102784 (2021) - [j25]Wenbo Guo, Cheng Huang, Weina Niu, Yong Fang:
Intelligent mining vulnerabilities in python code snippets. J. Intell. Fuzzy Syst. 41(2): 3615-3628 (2021) - [j24]Juan Tang, Hualu Xu, Pengsen Cheng, Jiayong Liu, Cheng Huang, Xun Tang:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. Secur. Commun. Networks 2021: 6656470:1-6656470:12 (2021) - [j23]Yong Fang, Mingyu Xie, Cheng Huang:
PBDT: Python Backdoor Detection Model Based on Combined Features. Secur. Commun. Networks 2021: 9923234:1-9923234:13 (2021) - [j22]Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang:
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. EAI Endorsed Trans. Security Safety 7(24): e5 (2021) - [c14]Peiran Wang, Yuqiang Sun, Cheng Huang, Yutong Du, Genpei Liang, Gang Long:
MineDetector: JavaScript Browser-side Cryptomining Detection using Static Methods. CSE 2021: 87-93 - [c13]Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang, Cheng Huang:
No Pie in the Sky: The Digital Currency Fraud Website Detection. ICDF2C 2021: 176-193 - [c12]Yongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang:
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts. ICICS (1) 2021: 447-463 - [c11]Susheng Wu, Bin Chen, Mingxu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang:
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities. TrustCom 2021: 598-605 - [c10]Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang:
Malicious Packages Lurking in User-Friendly Python Package Index. TrustCom 2021: 606-613 - 2020
- [j21]Gouheng Zhao, Peng Jia, Cheng Huang, Anmin Zhou, Yong Fang:
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks. IEEE Access 8: 65462-65471 (2020) - [j20]Hui Guo, Shuguang Huang, Cheng Huang, Min Zhang, Zulie Pan, Fan Shi, Hui Huang, Donghui Hu, Xiaoping Wang:
A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features. IEEE Access 8: 120501-120512 (2020) - [j19]Hui Guo, Shuguang Huang, Cheng Huang, Zulie Pan, Min Zhang, Fan Shi:
File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification. IEEE Access 8: 158961-158971 (2020) - [j18]Gen Li, Yu Su, Yu-Hang Yan, Jiayi Peng, Qing-Qing Dai, Xiang-Li Ning, Cheng-Long Zhu, Chen Fu, Michael A. McDonough, Christopher J. Schofield, Cheng Huang, Guo-Bo Li:
MeLAD: an integrated resource for metalloenzyme-ligand associations. Bioinform. 36(3): 904-909 (2020) - [j17]Yong Fang, Yue Yang, Cheng Huang:
EmailDetective: An Email Authorship Identification And Verification Model. Comput. J. 63(11): 1775-1787 (2020) - [j16]Yong Fang, Cheng Huang, Yu Su, Yaoyao Qiu:
Detecting malicious JavaScript code based on semantic analysis. Comput. Secur. 93: 101764 (2020) - [j15]Jiaxuan Han, Cheng Huang, Fan Shi, Jiayong Liu:
Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97: 101952 (2020) - [j14]Yong Fang, Cuirong Zhao, Cheng Huang, Liang Liu:
SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods. Digit. Investig. 35: 300981 (2020) - [j13]Zheng Zuo, Liang Liu, Jiayong Liu, Cheng Huang:
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data. Neural Comput. Appl. 32(13): 9581-9592 (2020) - [j12]Jiayong Liu, Yu Su, Shun Lv, Cheng Huang:
Detecting Web Spam Based on Novel Features from Web Page Source Code. Secur. Commun. Networks 2020: 6662166:1-6662166:14 (2020) - [j11]Yixin Wu, Cheng Huang, Xing Zhang, Hongyi Zhou:
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things. Secur. Commun. Networks 2020: 8842539:1-8842539:14 (2020) - [j10]Hui Guo, Shuguang Huang, Cheng Huang, Fan Shi, Min Zhang, Zulie Pan:
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification. Secur. Commun. Networks 2020: 8881760:1-8881760:19 (2020) - [j9]Jiaxing Cheng, Ying Li, Cheng Huang, Ailing Yu, Tao Zhang:
ACER: detecting Shadowsocks server based on active probe technology. J. Comput. Virol. Hacking Tech. 16(3): 217-227 (2020) - [c9]Yang Zhao, Hongzhi Ye, Lingzi Li, Cheng Huang, Tao Zhang:
Detecting DNS Tunnels Using Session Behavior and Random Forest Method. DSC 2020: 45-52
2010 – 2019
- 2019
- [j8]Yong Fang, Yusong Guo, Cheng Huang, Liang Liu:
Analyzing and Identifying Data Breaches in Underground Forums. IEEE Access 7: 48770-48777 (2019) - [j7]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang:
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism. IEEE Access 7: 56329-56340 (2019) - [j6]Yong Fang, Cheng Huang, Yijia Xu, Yang Li:
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet 11(8): 177 (2019) - [j5]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. KSII Trans. Internet Inf. Syst. 13(10): 5260-5275 (2019) - [j4]Cheng Huang, Jiaxuan Han, Xing Zhang, Jiayong Liu:
Automatic Identification of Honeypot Server Using Machine Learning Techniques. Secur. Commun. Networks 2019: 2627608:1-2627608:8 (2019) - [j3]Yixin Wu, Yuqiang Sun, Cheng Huang, Peng Jia, Luping Liu:
Session-Based Webshell Detection Using Machine Learning in Web Logs. Secur. Commun. Networks 2019: 3093809:1-3093809:11 (2019) - [c8]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. ICAIS (3) 2019: 564-575 - [c7]Yong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ICICT (2) 2019: 99-115 - 2018
- [j2]Yong Fang, Cheng Huang, Liang Liu, Min Xue:
Research on Malicious JavaScript Detection Technology Based on LSTM. IEEE Access 6: 59118-59125 (2018) - [c6]Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. DSC 2018: 153-160 - [c5]Yong Fang, Yang Li, Liang Liu, Cheng Huang:
DeepXSS: Cross Site Scripting Detection Based on Deep Learning. ICCAI 2018: 47-51 - [c4]Yong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang:
Detecting Webshell Based on Random Forest with FastText. ICCAI 2018: 52-56 - [c3]Yong Fang, Xiao Long, Liang Liu, Cheng Huang:
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ICCSP 2018: 10-15 - [c2]Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang:
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. ICCSP 2018: 170-174 - 2017
- [c1]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - 2016
- [j1]Cheng Huang, Jiayong Liu, Yong Fang, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58: 47-62 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint