30 June. 2022
Paper accepted by Computers & Security (CCF B) with Guo.
15 June. 2022
Paper accepted by RAID (CCF B) with Ou.
16 May. 2022
Paper accepted by KSEM (CCF C) with Wang.
1 May. 2022
Paper accepted by Internetware 2022 with Sun.
25 Mar. 2022
Paper accepted by Computers & Security (CCF B) with Huang.
28 Feb. 2022
Paper accepted by SCN (CCF C) with Liu.
24 Dec. 2021
Paper accepted by Computers & Security (CCF B) with Liu.
13 Dec. 2021
Paper accepted by Neurocomputing with Wang.
1 Nov. 2021
Paper accepted by JCS(CCF B) with Han.
25 Sep. 2021
Congrats to Dr. Huang won Second prize of Beijing Science and Technology Award.
31 Aug. 2021
Congrats to Zhao's team won first prize ciscn 2021.
30 Aug. 2021
Paper accepted by SCN(CCF C) with Xie.
11 Aug. 2021
Paper accepted by ICDF2C(CCF C) with Ou.
1 July. 2021
Paper accepted & Best Paper Award ICICS(CCF C) with Guo.
24 Jun. 2020
Congrats to five B.S. & six M.S. achived their degree today!!
7 June. 2021
Paper accepted by Trustcom(CCF C) with Su & Liang.
25 Jan. 2021
Paper accepted by JISA(CCF C) with Li.
20 Jan. 2021
Paper accepted by Neurocomputing with Zhou.
17 Dec. 2020
Paper accepted by Computers & Security with Guo.
30 Nov. 2020
Paper accepted by Security and Communication Networks with Su.
3 Nov. 2020
Paper accepted by Security and Communication Networks with Wu.
16 Sep. 2020
Paper accepted by The Computer with Zhang.
22 Aug. 2020
Paper accepted by Applied Sciences with Gao.
26 Jul. 2020
Congrats to new administrator groups for CTF student associations.
24 Jul. 2020
Congrats to Yicheng's team on the NCSISC 2020 contest.
1 Jul. 2020
Congrats to Yongyan on outstanding undergraduate thesis award!
I am an Associate Professor in the School of Cyber Science and Engineering, Sichuan University, China. I am broadly interested in all aspects of network and system security. My work follows a measurement and data driven approach to characterize and detect critical security issues in large-scale systems. My current research focuses on attack detection, underground economics, cyber threat intelligence, source code and supply chain security.
Yong Fang, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang*
Computers & Security, 2022(118),102715
DOI CCF B
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts
Yongyan Guo, Zhengyu Liu, Cheng Huang*, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang
International Conference on Information and Communications Security (ICICS), Springer, Cham, 2021:447-463.
DOI PDF CCF C Best Student Paper
Malicious Packages Lurking in User-Friendly Python Package Index
Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang*
IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), Shenyang, China, 2021:606-613.
DOI CCF C
NEDetector: Automatically Extracting Cybersecurity Neologisms from Hacker Forums
Ying Li, Jiaxing Cheng, Cheng Huang*, etc.
Journal of Information Security and Applications, 2021(58):102784.
DOI CCF C
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things
Yixin Wu, Cheng Huang*, Xing Zhang and Hongyi Zhou
Security and Communication Networks, 2020:8842539.
DOI PDF CCF C
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
Susheng Wu, Bin Chen, MingXu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang*
IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), Shengyang, China, 2021:598-605.
C DOI Data CCF C
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions
Cheng Huang, Shuang Hao, Luca Invernizzi, JiaYong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS)
Abu Dhabi, United Arab Emirates, April 2017.
DOI PDF CCF C
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Yong Fang, Yongcheng Liu, Cheng Huang*, Liang Liu
PLoS One, 2020, 15(2): e0228439.
DOI PDF Data JCR 3