default search action
Saihua Cai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j45]Saihua Cai, Han Tang, Jinfu Chen, Yikai Hu, Wuhao Guo:
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique. Comput. Secur. 148: 104121 (2025) - 2024
- [j44]Saihua Cai, Han Xu, Mingjie Liu, Zhilin Chen, Guofeng Zhang:
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. Comput. Secur. 136: 103580 (2024) - [j43]Jinfu Chen, Haodi Xie, Saihua Cai, Luo Song, Bo Geng, Wuhao Guo:
GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism. Comput. Secur. 147: 104083 (2024) - [j42]Jiayao Li, Saihua Cai, Li Li, Ruizhi Sun, Gang Yuan, Rui Zhu:
MIT-FRNet: Modality-invariant temporal representation learning-based feature reconstruction network for missing modalities. Expert Syst. Appl. 249: 123655 (2024) - [j41]Jinfu Chen, Weijia Wang, Bo Liu, Saihua Cai, Dave Towey, Shengran Wang:
Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism. Inf. Softw. Technol. 171: 107453 (2024) - [j40]Jinfu Chen, Zian Zhao, Saihua Cai, Xiao Chen, Bilal Ahmad, Luo Song, Kun Wang:
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree. Inf. Softw. Technol. 176: 107560 (2024) - [j39]Kaiyi Zhao, Pinle Qin, Saihua Cai, Ruizhi Sun, Zeqiu Chen, Jiayao Li:
A generalized weighted evidence fusion algorithm based on quantum modeling. Inf. Sci. 683: 121285 (2024) - [j38]Saihua Cai, Yingwei Zhao, Yikai Hu, Junzhe Wu, Jiaxu Wu, Guofeng Zhang, Chuan Zhao, Rexford Nii Ayitey Sosu:
CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning. Knowl. Based Syst. 294: 111681 (2024) - [j37]Chi Zhang, Jinfu Chen, Saihua Cai, Wen Zhang, Rexford Nii Ayitey Sosu, Haibo Chen:
TR-Fuzz: A syntax valid tool for fuzzing C compilers. Sci. Comput. Program. 238: 103155 (2024) - [j36]Jinfu Chen, Yemin Yin, Saihua Cai, Weijia Wang, Shengran Wang, Jiming Chen:
iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks. Sci. Comput. Program. 238: 103156 (2024) - [j35]Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
A novel test case prioritization approach for black-box testing based on K-medoids clustering. J. Softw. Evol. Process. 36(4) (2024) - [j34]Chi Zhang, Xiaoli Wang, Jinfu Chen, Saihua Cai, Rexford Nii Ayitey Sosu:
A novel defect prediction method based on semantic feature enhancement. J. Softw. Evol. Process. 36(9) (2024) - [j33]Shengran Wang, Jinfu Chen, Jianming Zhang, Saihua Cai, Wen Zhang, Jian Sun:
A novel memory usage guided fuzzing based on particle swarm optimization. Swarm Evol. Comput. 91: 101747 (2024) - [j32]Jinfu Chen, Jiaping Xu, Saihua Cai, Xiaoli Wang, Haibo Chen, Zhehao Li:
Software Defect Prediction Approach Based on a Diversity Ensemble Combined With Neural Network. IEEE Trans. Reliab. 73(3): 1487-1501 (2024) - [c30]Chi Zhang, Jinfu Chen, Saihua Cai, Jingyi Chen, Chunlei Huang:
JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers. QRS Companion 2024: 373-382 - [c29]Jinfu Chen, Fei Yan, Saihua Cai, Shengran Wang, Jingyi Chen:
FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling. QRS 2024: 550-561 - [c28]Dongjie Wang, Jinfu Chen, Saihua Cai, Qiaowei Feng, Yuhao Chen, Xinyi Hu:
SCVD-SA: A Smart Contract Vulnerability Detection Method Based on Hybrid Deep Learning Model and Self-attention Mechanism. SANER (Companion) 2024: 207-214 - 2023
- [j31]Saihua Cai, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Dengzhou Shi, Wei Lin:
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints. Comput. J. 66(1): 16-34 (2023) - [j30]Jinfu Chen, Yuhao Chen, Saihua Cai, Shang Yin, Lingling Zhao, Zikang Zhang:
An optimized feature extraction algorithm for abnormal network traffic detection. Future Gener. Comput. Syst. 149: 330-342 (2023) - [j29]Jinfu Chen, Tianxiang Lv, Saihua Cai, Luo Song, Shang Yin:
A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Inf. Softw. Technol. 157: 107166 (2023) - [j28]Jinfu Chen, Chi Zhang, Saihua Cai, Lin Zhang, Liang Ma:
A memory-related vulnerability detection approach based on vulnerability model with Petri Net. J. Log. Algebraic Methods Program. 132: 100859 (2023) - [j27]Jinfu Chen, Wei Lin, Saihua Cai, Yemin Yin, Haibo Chen, Dave Towey:
BiTCN_DRSN: An effective software vulnerability detection model based on an improved temporal convolutional network. J. Syst. Softw. 204: 111772 (2023) - [j26]Jinfu Chen, Jingyi Chen, Saihua Cai, Haibo Chen, Chi Zhang:
A novel combinatorial testing approach with fuzzing strategy. J. Softw. Evol. Process. 35(12) (2023) - [j25]Jinfu Chen, Luo Song, Saihua Cai, Haodi Xie, Shang Yin, Bilal Ahmad:
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. ACM Trans. Priv. Secur. 26(4): 44:1-44:21 (2023) - [c27]Saihua Cai, Wenjun Zhao, Han Tang, Jinfu Chen, Wuhao Guo:
CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism. QRS 2023: 541-549 - 2022
- [j24]Jinfu Chen, Chi Zhang, Saihua Cai, Zufa Zhang, Lu Liu, Longxia Huang:
Malware recognition approach based on self-similarity and an improved clustering algorithm. IET Softw. 16(5): 527-541 (2022) - [j23]Saihua Cai, Li Li, Jinfu Chen, Kaiyi Zhao, Gang Yuan, Ruizhi Sun, Rexford Nii Ayitey Sosu, Longxia Huang:
MWFP-outlier: Maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams. Inf. Sci. 591: 195-225 (2022) - [j22]Yun Li, Saihua Cai:
Detecting Outliers in Data Streams Based on Minimum Rare Pattern Mining and Pattern Matching. Inf. Technol. Control. 51(2): 268-282 (2022) - [j21]Jinfu Chen, Xiaoli Wang, Saihua Cai, Jiaping Xu, Jingyi Chen, Haibo Chen:
A software defect prediction method with metric compensation based on feature selection and transfer learning. Frontiers Inf. Technol. Electron. Eng. 23(5): 715-731 (2022) - [j20]Li Li, Kaiyi Zhao, Ruizhi Sun, Saihua Cai, Yongtao Liu:
Research for an Adaptive Classifier Based on Dynamic Graph Learning. Neural Process. Lett. 54(4): 2675-2693 (2022) - [c26]Jinfu Chen, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai:
Adaptive Random Testing based on the Modified Metric-memory Tree and Information Entropy. DSA 2022: 615-623 - [c25]Jinfu Chen, Zian Zhao, Xiao Chen, Saihua Cai, Shang Yin, Luo Song:
A novel classification approach for Android malware based on feature fusion and natural language processing. Internetware 2022: 28-36 - [c24]Bo Liu, Jinfu Chen, Weijia Wang, Saihua Cai, Jingyi Chen, Qiaowei Feng:
An adaptive search optimization algorithm for improving the detection capability of software vulnerability. Internetware 2022: 212-220 - [c23]Jinfu Chen, Shengran Wang, Saihua Cai, Chi Zhang, Haibo Chen, Jingyi Chen, Jianming Zhang:
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity. ASE 2022: 172:1-172:5 - [c22]Jinfu Chen, Yemin Yin, Saihua Cai, Ye Geng, Longxia Huang:
An Improved Test Case Generation Method based on Test Requirements for Testing Software Component. QRS Companion 2022: 209-218 - [c21]Shengran Wang, Jinfu Chen, Saihua Cai, Chi Zhang, Haibo Chen:
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization. QRS Companion 2022: 780-781 - [c20]Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang:
A formalization-based vulnerability detection method for cross-subject network components. TrustCom 2022: 1054-1059 - 2021
- [j19]Li Li, Kaiyi Zhao, Jiangzhang Gan, Saihua Cai, Tong Liu, Huiyu Mu, Ruizhi Sun:
Robust Adaptive Semi-supervised Classification Method based on Dynamic Graph and Self-paced Learning. Inf. Process. Manag. 58(1): 102433 (2021) - [j18]Saihua Cai, Rubing Huang, Jinfu Chen, Chi Zhang, Bo Liu, Shang Yin, Ye Geng:
An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints. Inf. Sci. 555: 125-146 (2021) - [j17]Saihua Cai, Jinfu Chen, Haibo Chen, Chi Zhang, Qian Li, Rexford Nii Ayitey Sosu, Shang Yin:
An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints. Inf. Sci. 580: 620-642 (2021) - [c19]Xiaochen Shi, Saihua Cai, Sicong Li, Ruizhi Sun:
Visual analysis system for association-based outlier detection for data streams. CSCWD 2021: 232-237 - [c18]Jinfu Chen, Jingyi Chen, Saihua Cai, Haibo Chen, Chi Zhang, Chuangfei Huang:
A Test Case Generation Method of Combinatorial Testing based on τ-way Testing with Adaptive Random Testing. ISSRE Workshops 2021: 83-90 - [c17]Jinfu Chen, Jiaping Xu, Saihua Cai, Xiaoli Wang, Yuechao Gu, Shuhui Wang:
An efficient dual ensemble software defect prediction method with neural network. ISSRE Workshops 2021: 91-98 - [c16]Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen:
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity. ISSRE Workshops 2021: 105-110 - [c15]Jinfu Chen, Shang Yin, Saihua Cai, Lingling Zhao, Shengran Wang:
L-KPCA: an efficient feature extraction method for network intrusion detection. MSN 2021: 683-684 - [c14]Dengzhou Shi, Saihua Cai, Songling Qin, Zhenxin Wang, Qiyong Zhong, Ling Zhou:
An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree. QRS Companion 2021: 133-140 - [c13]Ye Geng, Saihua Cai, Songling Qin, Haibo Chen, Shang Yin:
An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction. QRS Companion 2021: 407-414 - [c12]Jinfu Chen, Shang Yin, Saihua Cai, Chi Zhang, Yemin Yin, Ling Zhou:
An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks. QRS 2021: 768-775 - [c11]Wei Lin, Saihua Cai:
An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning. QRS Companion 2021: 1159-1160 - [c10]Jin-Fu Chen, Bo Liu, Saihua Cai, Weijia Wang, Shengran Wang:
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. SETTA 2021: 161-177 - 2020
- [j16]Saihua Cai, Li Li, Qian Li, Sicong Li, Shangbo Hao, Ruizhi Sun:
UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams. Appl. Intell. 50(10): 3452-3470 (2020) - [j15]Saihua Cai, Li Li, Sicong Li, Ruizhi Sun, Gang Yuan:
An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns. Expert Syst. Appl. 160: 113646 (2020) - [j14]Saihua Cai, Sicong Li, Gang Yuan, Shangbo Hao, Ruizhi Sun:
MiFI-Outlier: Minimal infrequent itemset-based outlier detection approach on uncertain data stream. Knowl. Based Syst. 191: 105268 (2020) - [j13]Saihua Cai, Ruizhi Sun, Shangbo Hao, Sicong Li, Gang Yuan:
Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream. Neural Comput. Appl. 32(11): 6619-6639 (2020) - [j12]Li Li, Kaiyi Zhao, Sicong Li, Ruizhi Sun, Saihua Cai:
Extreme Learning Machine for Supervised Classification with Self-paced Learning. Neural Process. Lett. 52(3): 1723-1744 (2020) - [j11]Sicong Li, Saihua Cai, Li Li, Ruizhi Sun, Gang Yuan:
CAAS: a novel collective action-based ant system algorithm for solving TSP problem. Soft Comput. 24(12): 9257-9278 (2020) - [j10]Kaiyi Zhao, Li Li, Saihua Cai, Ruizhi Sun:
An optimized time series combined forecasting method based on neural networks. J. Supercomput. 76(4): 2986-3012 (2020) - [c9]Xiaochen Shi, Saihua Cai, Ruizhi Sun:
Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns. ChineseCSCW 2020: 542-557 - [c8]Saihua Cai, Jinfu Chen, Xinru Li, Bo Liu:
Minimal Rare-Pattern-Based Outlier Detection Method for Data Streams by Considering Anti-monotonic Constraints. ISC 2020: 274-289 - [c7]Chi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng:
iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. TrustCom 2020: 1455-1460
2010 – 2019
- 2019
- [j9]Saihua Cai, Shangbo Hao, Ruizhi Sun, Gang Wu:
Mining recent maximal frequent itemsets over data streams with sliding window. Int. Arab J. Inf. Technol. 16(6): 961-969 (2019) - [j8]Shangbo Hao, Saihua Cai, Ruizhi Sun, Sicong Li:
An Efficient Outlier Detection Approach Over Uncertain Data Stream Based on Frequent Itemset Mining. Inf. Technol. Control. 48(1): 34-46 (2019) - [j7]Saihua Cai, Qian Li, Sicong Li, Gang Yuan, Ruizhi Sun:
WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams. Inf. Technol. Control. 48(4): 505-521 (2019) - [j6]Li Li, Ruizhi Sun, Saihua Cai, Kaiyi Zhao, Qianqian Zhang:
A review of improved extreme learning machine methods for data stream classification. Multim. Tools Appl. 78(23): 33375-33400 (2019) - [c6]Huiyu Mu, Ruizhi Sun, Li Li, Saihua Cai, Qianqian Zhang:
A Constrained Self-adaptive Sparse Combination Representation Method for Abnormal Event Detection. Big Data (CCF) 2019: 3-15 - [c5]Saihua Cai, Ruizhi Sun, Huiyu Mu, Xiaochen Shi, Gang Yuan:
A Minimum Rare-Itemset-Based Anomaly Detection Method and Its Application on Sensor Data Stream. ChineseCSCW 2019: 116-130 - [c4]Sicong Li, Saihua Cai, Ruizhi Sun, Gang Yuan, Zeqiu Chen, Xiaochen Shi:
Improved Bat Algorithm for Multiple Knapsack Problems. ChineseCSCW 2019: 143-157 - [c3]Qian Li, Saihua Cai, Ruizhi Sun:
The Environment Quality Evaluation and Prediction Algorithm Based on WSN. FSDM 2019: 1077-1084 - 2018
- [j5]Chao Deng, Jinwei Song, Saihua Cai, Ruizhi Sun, Yinxue Shi, Shangbo Hao:
K-DBSCAN: an efficient density-based clustering algorithm supports parallel computing. Int. J. Simul. Process. Model. 13(5): 496-505 (2018) - [j4]Chao Deng, Jinwei Song, Ruizhi Sun, Saihua Cai, Yinxue Shi:
Gridwave: a grid-based clustering algorithm for market transaction data based on spatial-temporal density-waves and synchronization. Multim. Tools Appl. 77(22): 29623-29637 (2018) - [j3]Chao Deng, Jinwei Song, Ruizhi Sun, Saihua Cai, Yinxue Shi:
GRIDEN: An effective grid-based and density-based spatial clustering algorithm to support parallel computing. Pattern Recognit. Lett. 109: 81-88 (2018) - [c2]Shangbo Hao, Saihua Cai, Ruizhi Sun, Sicong Li:
FCI-Outlier: An Efficient Frequent Closed Itemset-Based Outlier Detecting Approach on Data Stream. ChineseCSCW 2018: 176-187 - [c1]Saihua Cai, Ruizhi Sun, Jiayao Li, Chao Deng, Sicong Li:
Abnormal Detecting over Data Stream Based on Maximal Pattern Mining Technology. ChineseCSCW 2018: 371-385 - 2017
- [j2]Jinfu Chen, Saihua Cai, Dave Towey, Lili Zhu, Rubing Huang, Hilary Ackah-Arthur, Michael Omari:
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method. Int. J. Softw. Eng. Knowl. Eng. 27(8): 1235-1268 (2017) - 2016
- [j1]Jinfu Chen, Lili Zhu, Yuchi Guo, Saihua Cai, Xiaolei Zhao:
A mining approach for component abnormal information based on monitor log. Int. J. Simul. Process. Model. 11(5): 353-362 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-04 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint