The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
CoExpMiner: An AHIN-based Vulnerability Co-exploitation Mining Framework
Shuyi Jiang, Cheng Huang*, Jiaxuan Han
IEEE Transactions on Reliability, 2024
J
DOI
PDF
Q1
Donapi: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping
Cheng Huang, Nannan Wang*, Ziyan Wang, Siqi Sun, Lingzi Li, Junren Chen, Qianchong Zhao, Jiaxuan Han, Zhen Yang and Lei Shi
The 33rd USENIX Security Symposium (USENIX Security '24), 2024
C
DOI
Demo
PDF
CCF A
bjCnet: A Contrastive Learning-Based Framework for Software Defect Prediction
Jiaxuan Han, Cheng Huang*, Jiayong Liu
Computers & Security, 2024, 104024
J
DOI
Data
PDF
CCF B
bjEnet: a fast and accurate software bug localization method in natural language semantic space
Jiaxuan Han, Cheng Huang, Jiayong Liu*
Software Quality Journal, 2024
J
DOI
PDF
Q2
CMRight: Chinese Morph Resolution based on end-to-end model combined with enhancement algorithms
Nannan Wang, Cheng Huang*, Junren Chen, Lingzi Li
Expert Systems With Applications, 2024
J
DOI
PDF
Q1
Hacker group identification based on dynamic heterogeneous graph node update
Yijia Xu, Yong Fang, Cheng Huang*, Zhonglin Liu, Weipeng Cao
Applied Soft Computing, 2024(158), 111587
J
DOI
PDF
Q1
Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence
Lingzi Li, Cheng Huang*, Junren Chen
Computers & Security, 2024
J
DOI
Code
Data
PDF
CCF B
VioDroid-Finder: Automated Evaluation of Compliance and Consistency for Android Apps
Junren Chen, Cheng Huang*, Jiaxuan Han
Empirical Software Engineering, 2024(29), 2024
J
DOI
Code
Data
PDF
CCF B
基于目标识别与主题引导对话的黑灰产威胁情报挖掘
罗双春, 黄诚*, 孙恩博
信息安全学报, 2023.
J
DOI
PDF
CCF B
CyberEA: An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph
Yue Huang, Yongyan Guo, Cheng Huang*
The 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), 2023
C
CCF C
APTBert: Abstract Generation and Event Extraction from APT Reports
Chenxin Zhou, Cheng Huang*, Zheng Zuo
The 14th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2023), 2023
C
CCF C
An Empirical Study of Malicious Code In PyPI Ecosystem
Wenbo Guo, Zhengzi Xu*, Chengwei Liu, Cheng Huang, Yong Fang*, Yang Liu
The 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023), 2023:166-177
C
DOI
CCF A
SecTKG: A Knowledge Graph for Open Source Security Tools
Siqi Sun, Cheng Huang*, Tiejun Wu and Yi Shen
International Journal of Intelligent Systems, 2023
J
DOI
Code
PDF
Q1
A Framework for Threat Intelligence Extraction and Fusion
Yongyan Guo, Zhengyu Liu, Cheng Huang*, Nannan Wang, Hai Min, Wenbo Guo and Jiayong Liu
Computers & Security, 2023(132), 103371
J
DOI
CCF B
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach
Zhen Yang, Cheng Huang*, and Jiayong Liu
The 16th International Conference on Knowledge Science, Engineering and Management (KSEM 2023). 2023
C
DOI
CCF C
bjXnet: an improved bug localization model based on code property graph and attention mechanism
Jiaxuan Han, Cheng Huang*, Siqi Sun, Zhonglin Liu and Jiayong Liu
Automated Software Engineering, 2023(30), 12
J
DOI
CCF B
Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy
Zhengyu Liu, Haochen Su, Nannan Wang, Cheng Huang*
The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2022), Springer, Cham, 2023:89-108
C
DOI
Code
CCF C
VULDEFF: Vulnerability Detection Method Based on Function Fingerprints and Code Differences
Qianchong Zhao, Cheng Huang*, and Liuhu Dai
Knowledge-based Systems, 2023(260), 110139
J
DOI
Data
JCR Q1
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
Zhonglin Liu, Yong Fang, Cheng Huang*, Yijia Xu
Computers & Security, 2023(124), 103015
J
DOI
CCF B
ExpSeeker: Extract Public Exploit Code Information from Social Media
Yutong Du, Cheng Huang*, Genpei Liang, Zhihao Fu, Dunhan Li, Yong Ding
Applied Intelligence, 2023(53), 15772–15786
J
DOI
JCR Q1
CSCD: A Cyber Security Community Detection Scheme on Online Social Networks
Yutong Zeng, Honghao Yu, Tiejun Wu, Yong Chen, Xing Lan, and Cheng Huang*
The 13th EAI International Conference on Digital Forensics & Cyber Crime (ICDF2C 2022), 2022
C
DOI
CCF C
Viopolicy-Detector: An Automated Approach to Detecting GDPR Compliance Violations in Websites
Haoran Ou, Yong Fang, Wenbo Guo, Yongyan Guo, Cheng Huang*
The 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), 2022:409–430
C
DOI
CCF B
HyVulDect: A Hybrid Semantic Vulnerability Mining System Based on Graph Neural Network
Wenbo Guo, Yong Fang, Cheng Huang*, Haoran Ou, Chun Lin, Yongyan Guo
Computers & Security, 2022(121), 102823
J
DOI
CCF B
WAIN: Automatic Web Application Identification and Naming Method
Yuqiang Sun, Dunhan Li, Yixin Wu, Xuelin Wan, Cheng Huang*
In 13th Asia-Pacific Symposium on Internetware (Internetware 2022). Association for Computing Machinery, New York, NY, USA, 37–44. 2022
C
DOI
CCF C
Spotlight on Video Piracy Websites: Familial Analysis Based on Multidimensional Feature
Chenlin Wang, Yonghao Yu, Ao Pu, Fan Shi*, Cheng Huang
The 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022), Lecture Notes in Computer Science, vol 13370. Springer, Cham. 2022
C
DOI
CCF C
JStrong: Malicious JavaScript Detection Based on Code Semantic Representation and Graph Neural Network
Yong Fang, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang*
Computers & Security, 2022(118),102715
J
DOI
CCF B
GraphXSS: An Efficient XSS Payload Detection Approach Based on Graph Convolutional Network
Zhonglin Liu, Yong Fang, Cheng Huang*, Jiaxuan Han
Computers & Security, 2022(114):102597
J
DOI
CCF B
GAXSS: Effective Payload Generation Method to Detect XSS Vulnerabilities Based on Genetic Algorithm
Zhonglin Liu, Yong Fang, Cheng Huang*, Yijia Xu
Security and Communication Networks, 2022:2031924
J
DOI
PDF
CCF C
HGHAN: Hacker group identification based on heterogeneous graph attention network
Yijia Xu, Yong Fang, Cheng Huang*, Zhonglin Liu
Information Sciences, 2022(612):848-863.
J
DOI
JCR 1
LMTracker: Lateral Movement Path Detection based on Heterogeneous Graph Embedding
Yong Fang, Congshuang Wang, Zhiyang Fang, Cheng Huang*
Neurocomputing, 2022(474):37-47.
J
DOI
JCR 2
面向项目版本差异性的漏洞识别技术研究
黄诚, 孙明旭*, 段仁语, 吴苏晟, 陈斌
网络与信息安全学报, 2022, 8(1):52-62.
J
DOI
PDF
CCF C
源代码漏洞静态分析技术
刘嘉勇, 韩家璇, 黄诚*
信息安全学报, 2022,7(4):100-113.
J
DOI
PDF
CCF B
No Pie in The Sky: The Digital Currency Fraud Website Detection
Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang, Cheng Huang*
International Conference on Digital Forensics & Cyber Crime (ICDF2C), 2021.
C
DOI
CCF C
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts
Yongyan Guo, Zhengyu Liu, Cheng Huang*, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang
International Conference on Information and Communications Security (ICICS), Springer, Cham, 2021:447-463.
C
DOI
PDF
Best Student Paper
CCF C
Malicious Packages Lurking in User-Friendly Python Package Index
Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang*
IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), Shenyang, China, 2021:606-613.
C
DOI
CCF C
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
Susheng Wu, Bin Chen, MingXu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang*
IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), Shengyang, China, 2021:598-605.
C
DOI
Data
CCF C
HackerRank: Identifying key hackers in underground forums
Cheng Huang, Yongyan Guo*, Wenbo Guo, Ying Li
International Journal of Distributed Sensor Networks, 2021, 17(5):15501477211015145.
J
DOI
PDF
Effective method for detecting malicious PowerShell scripts based on hybrid features
Yong Fang, Xiangyu Zhou, Cheng Huang*
Neurocomputing, 2021(448):30-39.
J
DOI
Data
JCR 2
NEDetector: Automatically Extracting Cybersecurity Neologisms from Hacker Forums
Ying Li, Jiaxing Cheng, Cheng Huang*, etc.
Journal of Information Security and Applications, 2021(58):102784.
J
DOI
CCF C
ExSense: Extract Sensitive Information from Unstructured Data
Yongyan Guo, Jiayong Liu, Wenwu Tang and Cheng Huang*
Computers & Security, 2021(102):102156.
J
DOI
PDF
CCF B
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
Yong Fang, Yuchi Zhang,Cheng Huang*
The Computer Journal, 2021, 64(8): 1215-1225.
J
DOI
PDF
CCF B
Detecting Web Spam Based on Novel Features from Web Page Source Code
Jiayong Liu, Yu Su, Shun Lv and Cheng Huang*
Security and Communication Networks, 2020:6662166.
J
DOI
CCF C
GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things
Yixin Wu, Cheng Huang*, Xing Zhang and Hongyi Zhou
Security and Communication Networks, 2020:8842539.
J
DOI
PDF
CCF C
Detecting DNS tunnels using session behavior and random forest method
Yang Zhao, Hongzhi Ye, Lingzi Li, Cheng Huang, Zhang Tao*
IEEE Fifth International Conference on Data Science in Cyberspace (DSC), IEEE, 2020: 45-52.
C
DOI
Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
Yong Fang, Jian Gao, Zhonglin Liu*, Cheng Huang
Applied Sciences, 2020, 10(17), 5922.
J
DOI
Data
PDF
JCR 3
Covert Timing Channel Detection Method Based on Time Interval and Payload Length Analysis
Jiaxuan Han, Cheng Huang, Fan Shi, Jiayong Liu*
Computers & Security, 2020(97), 101952.
J
DOI
CCF B
XSS Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining
Chenghao Li†, Yiding Wang†, Changwei Miao† and Cheng Huang*
Applied Sciences, 2020, 10(14), 4740.
J
DOI
PDF
Data
JCR 3
EmailDetective: An Email Authorship Identification and Verification Model
Yong Fang, Yue Yang, Cheng Huang*
The Computer Journal, 2020, 63(11):1775-1787.
J
DOI
Data
CCF B
Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
Yong Fang, Yijia Xu, Peng Jia and Cheng Huang*
Applied Sciences, 2020, 10(13), 4425.
J
DOI
PDF
JCR 3
MeLAD: an integrated resource for metalloenzyme-ligand associations
Gen Li†, Yu Su†, Yu-Hang Yan, Jia-Yi Peng, etc., Cheng Huang*, Guo-Bo Li*
Bioinformatics, 2020 36(3): 904-909.
J
DOI
Tool
JCR 2
Detecting Malicious JavaScript Code Based on Semantic Analysis
Yong Fang, Cheng Huang*, Yu Su, Yaoyao Qiu
Computers & Security, 2020(93):101764
J
DOI
CCF B
FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
Yong Fang, Yongcheng Liu, Cheng Huang*, Liang Liu
PLoS One, 2020, 15(2): e0228439.
J
DOI
PDF
Data
JCR 3
Session-based Webshell Detection using Machine Learning in Web Logs
Yixin Wu, Yuqiang Sun, Cheng Huang*, Peng Jia, and Luping Liu
Security and Communication Networks, 2019, 3093809.
J
DOI
PDF
CCF C
Automatic Identification of Honeypot Server Using Machine Learning Techniques
Cheng Huang, Jiaxuan Han, Xing Zhang, and Jiayong Liu*
Security and Communication Networks, 2019, 2627608.
J
DOI
PDF
CCF C
Credit Card Fraud Detection Based on Machine Learning
Yong Fang, Yunyun Zhang, Cheng Huang*
Computers, Materials and Continua, 2019 61(1): 185-195.
J
DOI
PDF
JCR 4
Self Multi-Head Attention-based Convolutional Neural Networks for fake news detection
Yong Fang, Jian Gao, Cheng Huang*, Hua Peng, Runpu Wu
PloS One, 2019 14(9):e0222713.
J
DOI
PDF
Data
JCR 3
TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology
Yong Fang, Shenjun Han, Cheng Huang*, Runpu Wu
PloS One, 2019 14(11):e0225196.
J
DOI
PDF
Data
JCR 3
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
Yong Fang, Cheng Zhang, Cheng Huang*, Liang Liu, Yue Yang
IEEE Access, 2019(7): 56329-56340.
J
DOI
PDF
JCR 2
Analyzing and Identifying Data Breaches in Underground Forums
Yong Fang, Yusong Guo, Cheng Huang*, Liang Liu
IEEE Access, 2019(7):48770-48777.
J
DOI
PDF
JCR 3
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
Yong Fang, Cheng Huang*, Yijia Xu, Yang Li
Future Internet, 2019, 11(8): 177.
J
DOI
PDF
Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
ZeYu Huang†, Cheng Huang†, JinWei Xie†, Jun Ma†, etc.
Transfusion, 2018, 58(8): 1855-1862.
J
DOI
JCR 3
Research on Malicious JavaScript Detection Technology Based on LSTM
Yong Fang, Cheng Huang*, Liang Liu, Min Xue
IEEE Access, 2018, 6: 59118-59125.
J
DOI
PDF
JCR 2
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm
Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang*
2018 IEEE Third International Conference on Data Science in Cyberspace(DSC)
Guangzhou, China, June 2018.
C
DOI
PDF
WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang*
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy(ICCSP)
Guiyang, China, March 2018.
C
DOI
PDF
Best Paper Award
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN
Yong Fang, Xiao Long, Liang Liu, Cheng Huang*
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy(ICCSP)
Guiyang, China, March 2018.
C
DOI
PDF
Best Paper Award
Detecting Webshell Based on Random Forest with FastText
Yong Fang, Yaoyao Qiu, Liang Liu*, Cheng Huang
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence(ICCAI)
Chengdu, China, March 2018.
C
DOI
PDF
DeepXSS: Cross Site Scripting Detection Based on Deep Learning
Yong Fang, Yang Li, Liang Liu*, Cheng Huang
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence(ICCAI)
Chengdu, China, March 2018.
C
DOI
PDF
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions
Cheng Huang, Shuang Hao, Luca Invernizzi, JiaYong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS)
Abu Dhabi, United Arab Emirates, April 2017.
C
DOI
PDF
CCF C