default search action
Limin Pan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Yao Cheng, Senlin Luo, Limin Pan, Yunwei Wan, Xinshuai Li:
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge. Appl. Intell. 54(17-18): 7994-8019 (2024) - [j42]Chenlong Zhang, Senlin Luo, Limin Pan, Chuan Lu, Zhao Zhang:
Making models more secure: An efficient model stealing detection method. Comput. Electr. Eng. 117: 109266 (2024) - [j41]Lingdi Kong, Senlin Luo, Limin Pan, Zhouting Wu, Xinshuai Li:
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement. Comput. Secur. 140: 103787 (2024) - [j40]Linghao Zhang, Senlin Luo, Limin Pan, Zhouting Wu, Kun Gong:
FSD-CLCD: Functional semantic distillation graph learning for cross-language code clone detection. Eng. Appl. Artif. Intell. 133: 108199 (2024) - [j39]Jiyuan Xing, Senlin Luo, Limin Pan, Jingwei Hao, Yingdan Guan, Zhouting Wu:
HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination. Expert Syst. Appl. 238(Part C): 121835 (2024) - [j38]Xinshuai Li, Senlin Luo, Limin Pan, Zhouting Wu:
Adapt to small-scale and long-term time series forecasting with enhanced multidimensional correlation. Expert Syst. Appl. 238(Part E): 122203 (2024) - [j37]Kun Gong, Senlin Luo, Limin Pan, Linghao Zhang, Yifei Zhang, Haomiao Yu:
LogETA: Time-aware cross-system log-based anomaly detection with inter-class boundary optimization. Future Gener. Comput. Syst. 157: 16-28 (2024) - [j36]Hui Pan, Senlin Luo, Xinshuai Li, Limin Pan, Zhouting Wu:
Meta-learning on dynamic node clustering knowledge graph for cold-start recommendation. Neurocomputing 602: 128192 (2024) - [j35]Yifei Zhang, Senlin Luo, Hangyi Wu, Limin Pan:
Antibypassing Four-Stage Dynamic Behavior Modeling for Time-Efficient Evasive Malware Detection. IEEE Trans. Ind. Informatics 20(3): 4627-4639 (2024) - 2023
- [j34]Jingwei Hao, Senlin Luo, Limin Pan, Chuantao Chen:
VD-HEN: Capturing Semantic Dependencies for Source Code Vulnerability Detection With a Hierarchical Embedding Network. Computer 56(10): 49-61 (2023) - [j33]Jingwei Hao, Senlin Luo, Limin Pan:
Byte-Level Function-Associated Method for Malware Detection. Comput. Syst. Sci. Eng. 46(1): 719-734 (2023) - [j32]Chengcheng Cai, Limin Pan, Xinshuai Li, Senlin Luo, Zhouting Wu:
A risk identification model for ICT supply chain based on network embedding and text encoding. Expert Syst. Appl. 228: 120459 (2023) - [j31]Ruizhi Zhang, Senlin Luo, Limin Pan, Yong Ma, Zhouting Wu:
Strengthened multiple correlation for multi-label few-shot intent detection. Neurocomputing 523: 191-198 (2023) - [j30]Jingwei Hao, Senlin Luo, Limin Pan:
A novel vulnerability severity assessment method for source code based on a graph neural network. Inf. Softw. Technol. 161: 107247 (2023) - [j29]Deshan Yang, Senlin Luo, Jinjie Zhou, Limin Pan, Xiaonan Yang, Jiyuan Xing:
Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning. Inf. Sci. 651: 119743 (2023) - 2022
- [j28]Xinshuai Li, Limin Pan, Yanru Zhou, Zhouting Wu, Senlin Luo:
A Temporal-Spatial network embedding model for ICT supply chain market trend forecasting. Appl. Soft Comput. 125: 109118 (2022) - [j27]Jingwei Hao, Senlin Luo, Limin Pan:
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning. Comput. Secur. 122: 102905 (2022) - [j26]Rongqian Zhang, Senlin Luo, Limin Pan, Jingwei Hao, Ji Zhang:
Generating adversarial examples via enhancing latent spatial features of benign traffic and preserving malicious functions. Neurocomputing 490: 413-430 (2022) - [j25]Yanru Zhou, Senlin Luo, Limin Pan, Lu Liu, Dandan Song:
Continuous temporal network embedding by modeling neighborhood propagation process. Knowl. Based Syst. 239: 107998 (2022) - 2021
- [j24]Han Yan, Senlin Luo, Limin Pan, Yifei Zhang:
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection. Comput. Secur. 108: 102286 (2021) - [j23]Jingwei Hao, Senlin Luo, Limin Pan:
Computer-aided intelligent design using deep multi-objective cooperative optimization algorithm. Future Gener. Comput. Syst. 124: 49-53 (2021) - [j22]Yifei Zhang, Senlin Luo, Limin Pan, Hanqing Zhang:
Syscall-BSEM: Behavioral semantics enhancement method of system call sequence for high accurate and robust host intrusion detection. Future Gener. Comput. Syst. 125: 112-126 (2021) - [j21]Ban Li, Senlin Luo, Xiaonan Qin, Limin Pan:
Improving GAN with inverse cumulative distribution function for tabular data synthesis. Neurocomputing 456: 373-383 (2021) - [j20]Yanru Zhou, Limin Pan, Chongyou Bai, Senlin Luo, Zhouting Wu:
Self-selective attention using correlation between instances for distant supervision relation extraction. Neural Networks 142: 213-220 (2021) - [j19]Senlin Luo, Weixiao Zhao, Limin Pan:
Online GBDT with Chunk Dynamic Weighted Majority Learners for Noisy and Drifting Data Streams. Neural Process. Lett. 53(5): 3783-3799 (2021) - 2020
- [j18]Yaxian Hu, Senlin Luo, Longfei Han, Limin Pan, Tiemei Zhang:
Deep supervised learning with mixture of neural networks. Artif. Intell. Medicine 102: 101764 (2020) - [j17]Chongyou Bai, Limin Pan, Senlin Luo, Zhouting Wu:
Joint extraction of entities and relations by a novel end-to-end model with a double-pointer module. Neurocomputing 377: 325-333 (2020) - [j16]Longlong Jiao, Senlin Luo, Wangtong Liu, Limin Pan:
AIT: A method for operating system kernel function call graph generation with a virtualization technique. KSII Trans. Internet Inf. Syst. 14(5): 2084-2100 (2020) - [j15]Xiaoshuang Liu, Senlin Luo, Limin Pan:
Robust boosting via self-sampling. Knowl. Based Syst. 193: 105424 (2020) - [c4]Guo Luo, Xiaofen Liang, Hui Li, Cuijing Lu, Limin Pan, Siwen Zhang:
Intelligent Kitchen Based on STC89C52RC Micro Control Unit. CSIA (1) 2020: 348-353 - [c3]Guo Luo, Siwen Zhang, Limin Pan, Cuijing Lu, Hui Li, Xiaofen Liang, Peiyi Qiu:
Motion Control of Four-Axis Aircraft Based on LabVIEW. CSIA (2) 2020: 663-667
2010 – 2019
- 2019
- [j14]Hanqing Zhang, Senlin Luo, Yifei Zhang, Limin Pan:
An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis. IEEE Access 7: 69246-69256 (2019) - [j13]Yuan Wei, Senlin Luo, Jianwei Zhuge, Jing Gao, Ennan Zheng, Bo Li, Limin Pan:
ARG: Automatic ROP Chains Generation. IEEE Access 7: 120152-120163 (2019) - [j12]Ruiyi Wang, Senlin Luo, Limin Pan, Zhouting Wu, Yujiao Yuan, Qianrou Chen:
Microblog summarization using Paragraph Vector and semantic structure. Comput. Speech Lang. 57: 1-19 (2019) - 2018
- [j11]Qamas Gul Khan Safi, Senlin Luo, Limin Pan, Wangtong Liu, Rasheed Hussain, Safdar Hussain Bouk:
SVPS: Cloud-based smart vehicle parking system over ubiquitous VANETs. Comput. Networks 138: 18-30 (2018) - [j10]Wangtong Liu, Senlin Luo, Yu Liu, Limin Pan, Qamas Gul Khan Safi:
A kernel stack protection model against attacks from kernel execution units. Comput. Secur. 72: 96-106 (2018) - [j9]Qamas Gul Khan Safi, Senlin Luo, Chao Wei, Limin Pan, Guanglu Yan:
Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs. Comput. Stand. Interfaces 56: 107-115 (2018) - [j8]Chao Wei, Senlin Luo, Limin Pan, Zhouting Wu, Ji Zhang, Qamas Gul Khan Safi:
Locally weighted embedding topic modeling by markov random walk structure approximation and sparse regularization. Neurocomputing 285: 35-50 (2018) - [j7]Qamas Gul Khan Safi, Senlin Luo, Limin Pan, Wangtong Liu, Guanglu Yan:
Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs. Pervasive Mob. Comput. 48: 43-58 (2018) - 2017
- [j6]Qamas Gul Khan Safi, Senlin Luo, Chao Wei, Limin Pan, Qianrou Chen:
PIaaS: Cloud-oriented secure and privacy-conscious parking information as a service using VANETs. Comput. Networks 124: 33-45 (2017) - [j5]Chao Wei, Senlin Luo, Jia Guo, Zhouting Wu, Limin Pan:
Discriminative locally document embedding: Learning a smooth affine map by approximation of the probabilistic generative structure of subspace. Knowl. Based Syst. 121: 41-57 (2017) - [j4]Longfei Han, Senlin Luo, Huaiqing Wang, Limin Pan, Xincheng Ma, Tiemei Zhang:
An Intelligible Risk Stratification Model Based on Pairwise and Size Constrained Kmeans. IEEE J. Biomed. Health Informatics 21(5): 1288-1296 (2017) - 2015
- [j3]Guanglu Yan, Senlin Luo, Fan Feng, Limin Pan, Qamas Gul Khan Safi:
MOSKG: countering kernel rootkits with a secure paging mechanism. Secur. Commun. Networks 8(18): 3580-3591 (2015) - [j2]Longfei Han, Senlin Luo, Jianmin Yu, Limin Pan, Songjing Chen:
Rule Extraction From Support Vector Machines Using Ensemble Learning Approach: An Application for Diagnosis of Diabetes. IEEE J. Biomed. Health Informatics 19(2): 728-734 (2015) - 2014
- [j1]Senlin Luo, Songjing Chen, Limin Pan, Tiemei Zhang, Longfei Han, Yue Wang, Qamas Gul Khan Safi:
Exploring the effects of intervention for those at high risk of developing type 2 diabetes using a computer simulation. Comput. Biol. Medicine 53: 105-114 (2014) - 2011
- [c2]Limin Pan, Liang Chen, Jian Hui, Jian Wu:
QoS-Based Distributed Service Selection in Large-Scale Web Services. IEEE SCC 2011: 725-726
2000 – 2009
- 2006
- [c1]Yang Feng, Senlin Luo, Limin Pan:
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template. PCM 2006: 31-40
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint