The documents listed below have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Refereed Papers (Google Scholar)

2021
  • No Pie in The Sky: The Digital Currency Fraud Website Detection
    Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang, Cheng Huang*
    International Conference on Digital Forensics & Cyber Crime (ICDF2C), 2021.
    C DOI CCF C

  • CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts
    Yongyan Guo, Zhengyu Liu, Cheng Huang*, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang
    International Conference on Information and Communications Security (ICICS), 2021.
    C DOI PDF CCF C Best Paper Award

  • Malicious Packages Lurking in User-Friendly Python Package Index
    Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang*
    IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), 2021.
    C DOI CCF C

  • DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities
    Susheng Wu, Bin Chen, MingXu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang*
    IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom), 2021.
    C DOI Data CCF C

  • HackerRank: Identifying key hackers in underground forums
    Cheng Huang, Yongyan Guo*, Wenbo Guo, Ying Li
    International Journal of Distributed Sensor Networks, 2021, 17(5):15501477211015145.
    J DOI PDF

  • Effective method for detecting malicious PowerShell scripts based on hybrid features
    Yong Fang, Xiangyu Zhou, Cheng Huang*
    Neurocomputing, 2021.
    J DOI Data JCR 2

  • NEDetector: Automatically Extracting Cybersecurity Neologisms from Hacker Forums
    Ying Li, Jiaxing Cheng, Cheng Huang*, etc.
    Journal of Information Security and Applications, 2021(58):102784.
    J DOI CCF C

  • ExSense: Extract Sensitive Information from Unstructured Data
    Yongyan Guo, Jiayong Liu, Wenwu Tang and Cheng Huang*
    Computers & Security, 2021, 102: 102156.
    J DOI PDF CCF B

2020
  • Detecting Web Spam Based on Novel Features from Web Page Source Code
    Jiayong Liu, Yu Su, Shun Lv and Cheng Huang*
    Security and Communication Networks, vol. 2020, Article ID 6662166.
    J DOI CCF C

  • GroupTracer: Automatic Attacker TTP Profile Extraction and Group Cluster in Internet of Things
    Yixin Wu, Cheng Huang*, Xing Zhang and Hongyi Zhou
    Security and Communication Networks, vol. 2020, Article ID 8842539.
    J DOI PDF CCF C

  • CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network
    Yong Fang, Yuchi Zhang,Cheng Huang*
    The Computer Journal, 2020, bxaa141.
    J DOI PDF CCF B

  • Detecting DNS tunnels using session behavior and random forest method
    Yang Zhao, Hongzhi Ye, Lingzi Li, Cheng Huang, Zhang Tao*
    IEEE Fifth International Conference on Data Science in Cyberspace (DSC), IEEE, 2020: 45-52.
    C DOI

  • Detecting Cyber Threat Event from Twitter Using IDCNN and BiLSTM
    Yong Fang, Jian Gao, Zhonglin Liu*, Cheng Huang
    Applied Sciences, 2020, 10(17), 5922.
    J DOI Data PDF JCR 3

  • Covert Timing Channel Detection Method Based on Time Interval and Payload Length Analysis
    Jiaxuan Han, Cheng Huang, Fan Shi, Jiayong Liu*
    Computers & Security, 2020(97), 101952.
    J DOI CCF B

  • XSS Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining
    Chenghao Li†, Yiding Wang†, Changwei Miao† and Cheng Huang*
    Applied Sciences, 2020, 10(14), 4740.
    J DOI PDF Data JCR 3

  • EmailDetective: An Email Authorship Identification and Verification Model
    Yong Fang, Yue Yang, Cheng Huang*
    The Computer Journal, 2020, bxaa059.
    J DOI Data CCF B

  • Providing Email Privacy by Preventing Webmail from Loading Malicious XSS Payloads
    Yong Fang, Yijia Xu, Peng Jia and Cheng Huang*
    Applied Sciences, 2020, 10(13), 4425.
    J DOI PDF JCR 3

  • MeLAD: an integrated resource for metalloenzyme-ligand associations
    Gen Li†, Yu Su†, Yu-Hang Yan, Jia-Yi Peng, etc., Cheng Huang*, Guo-Bo Li*
    Bioinformatics, 2020 36(3): 904-909.
    J DOI Tool JCR 2

  • Detecting Malicious JavaScript Code Based on Semantic Analysis
    Yong Fang, Cheng Huang*, Yu Su, Yaoyao Qiu
    Computers & Security, 2020(93), 101764
    J DOI CCF B

  • FastEmbed: Predicting vulnerability exploitation possibility based on ensemble machine learning algorithm
    Yong Fang, Yongcheng Liu, Cheng Huang*, Liang Liu
    PLoS One, 2020, 15(2): e0228439.
    J DOI PDF Data JCR 3

2019
  • Session-based Webshell Detection using Machine Learning in Web Logs
    Yixin Wu, Yuqiang Sun, Cheng Huang*, Peng Jia, and Luping Liu
    Security and Communication Networks, 2019, 3093809.
    J DOI PDF CCF C

  • Automatic Identification of Honeypot Server Using Machine Learning Techniques
    Cheng Huang, Jiaxuan Han, Xing Zhang, and Jiayong Liu*
    Security and Communication Networks, 2019, 2627608.
    J DOI PDF CCF C

  • Credit Card Fraud Detection Based on Machine Learning
    Yong Fang, Yunyun Zhang, Cheng Huang*
    Computers, Materials and Continua, 2019 61(1): 185-195.
    J DOI PDF JCR 4

  • Self Multi-Head Attention-based Convolutional Neural Networks for fake news detection
    Yong Fang, Jian Gao, Cheng Huang*, Hua Peng, Runpu Wu
    PloS One, 2019 14(9):e0222713.
    J DOI PDF Data JCR 3

  • TAP: A static analysis model for PHP vulnerabilities based on token and deep learning technology
    Yong Fang, Shenjun Han, Cheng Huang*, Runpu Wu
    PloS One, 2019 14(11):e0225196.
    J DOI PDF Data JCR 3

  • Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism
    Yong Fang, Cheng Zhang, Cheng Huang*, Liang Liu, Yue Yang
    IEEE Access, 2019(7): 56329-56340.
    J DOI PDF JCR 2

  • Analyzing and Identifying Data Breaches in Underground Forums
    Yong Fang, Yusong Guo, Cheng Huang*, Liang Liu
    IEEE Access, 2019(7):48770-48777.
    J DOI PDF JCR 3

  • RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning
    Yong Fang, Cheng Huang*, Yijia Xu, Yang Li
    Future Internet, 2019, 11(8): 177.
    J DOI PDF

2018
  • Analysis of a large data set to identify predictors of blood transfusion in primary total hip and knee arthroplasty
    ZeYu Huang†, Cheng Huang†, JinWei Xie†, Jun Ma†, etc.
    Transfusion, 2018, 58(8): 1855-1862.
    J DOI JCR 3

  • Research on Malicious JavaScript Detection Technology Based on LSTM
    Yong Fang, Cheng Huang*, Liang Liu, Min Xue
    IEEE Access, 2018, 6: 59118-59125.
    J DOI PDF JCR 2

  • Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm
    Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang*
    2018 IEEE Third International Conference on Data Science in Cyberspace(DSC)
    Guangzhou, China, June 2018.
    C DOI PDF

  • WOVSQLI: Detection of SQL injection behaviors using word vector and LSTM
    Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang*
    Proceedings of the 2nd International Conference on Cryptography, Security and Privacy(ICCSP)
    Guiyang, China, March 2018.
    C DOI PDF Best Paper Award

  • DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN
    Yong Fang, Xiao Long, Liang Liu, Cheng Huang*
    Proceedings of the 2nd International Conference on Cryptography, Security and Privacy(ICCSP)
    Guiyang, China, March 2018.
    C DOI PDF Best Paper Award

  • Detecting Webshell Based on Random Forest with FastText
    Yong Fang, Yaoyao Qiu, Liang Liu*, Cheng Huang
    Proceedings of the 2018 International Conference on Computing and Artificial Intelligence(ICCAI)
    Chengdu, China, March 2018.
    C DOI PDF

  • DeepXSS: Cross Site Scripting Detection Based on Deep Learning
    Yong Fang, Yang Li, Liang Liu*, Cheng Huang
    Proceedings of the 2018 International Conference on Computing and Artificial Intelligence(ICCAI)
    Chengdu, China, March 2018.
    C DOI PDF

2017
  • Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions
    Cheng Huang, Shuang Hao, Luca Invernizzi, JiaYong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS)
    Abu Dhabi, United Arab Emirates, April 2017.
    C DOI PDF CCF C

2016
  • A Study on Web Security Incidents in China by Analyzing Vulnerability Disclosure Platforms
    Cheng Huang, JiaYong Liu*, Yong Fang, Zheng Zuo
    Computers & Security, 2016(58): 47-62
    J DOI CCF B

Patents/Software Copyright

Patents
  • 一种TTP自动化提取与攻击团队聚类的方法
    黄诚; 吴怡欣
    ZL202010353068.3
  • 一种从非结构化数据中提取网络安全新词的方法
    黄诚; 李滢; 程嘉兴
    ZL202010353099.9
  • 一种面向文本数据的威胁情报知识图谱构建方法
    黄诚; 方勇; 姜政伟; 彭嘉毅; 杨悦
    ZL201910805363.5
  • 基于半监督密度聚类的恶意代码家族同源性分析技术
    方勇; 刘亮; 黄诚; 荣俸萍; 张与弛
    ZL201810744345.6
  • 一种基于迭代式TTL-IPID数据包分类的网络拓扑自动生成装置
    方勇; 黄诚; 刘亮; 季凡; 徐承文; 杜海章; 张钊; 何良
    ZL201310032181.1
Software Copyright
  • APT威胁情报查询平台, 四川大学, SN: 2020SR1750036
  • 面向源代码社区的漏洞情报检测平台, 四川大学, SN: 2020SR1750051
  • 开源包恶意性检测系统, 四川大学, SN: 2020SR1750048
  • Docker容器安全智能检测平台, 四川大学, SN: 2020SR0003540
  • Webshell智能检测平台, 四川大学, SN: 2020SR0003539
  • 社交平台威胁情报分析系统, 四川大学, SN: 2020SR0003538
  • 数据库智能审计系统, 四川大学, SN: 2020SR0003537