default search action
Yong Fang 0002
Person information
- affiliation: Sichuan University, Chengdu, China
Other persons with the same name
- Yong Fang — disambiguation page
- Yong Fang 0001 — Chang'an University, Xi'an, China (and 1 more)
- Yong Fang 0003 — Shanghai University, Shanghai, China
- Yong Fang 0004 — Shandong University of Science and Technology, Qingdao, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu, Weipeng Cao:
Hacker group identification based on dynamic heterogeneous graph node update. Appl. Soft Comput. 158: 111587 (2024) - [j37]Hongyu Pan, Yong Fang, Wenbo Guo, Yijia Xu, Changhui Wang:
Few-shot graph classification on cross-site scripting attacks detection. Comput. Secur. 140: 103749 (2024) - [j36]Kaiyang Wang, Huaxin Deng, Yijia Xu, Zhonglin Liu, Yong Fang:
Multi-target label backdoor attacks on graph neural networks. Pattern Recognit. 152: 110449 (2024) - [j35]Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
Graph Mining for Cybersecurity: A Survey. ACM Trans. Knowl. Discov. Data 18(2): 47:1-47:52 (2024) - [i4]Wenbo Guo, Chengwei Liu, Limin Wang, Jiahui Wu, Zhengzi Xu, Cheng Huang, Yong Fang, Yang Liu:
PackageIntel: Leveraging Large Language Models for Automated Intelligence Extraction in Package Ecosystems. CoRR abs/2409.15049 (2024) - 2023
- [j34]Zhonglin Liu, Yong Fang, Cheng Huang, Yijia Xu:
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. Comput. Secur. 124: 103015 (2023) - [j33]Yijia Xu, Yong Fang, Zhonglin Liu, Qiang Zhang:
PWAGAT: Potential Web attacker detection based on graph attention network. Neurocomputing 557: 126725 (2023) - [c18]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. ASE 2023: 166-177 - [i3]Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du:
Graph Mining for Cybersecurity: A Survey. CoRR abs/2304.00485 (2023) - [i2]Wenbo Guo, Zhengzi Xu, Chengwei Liu, Cheng Huang, Yong Fang, Yang Liu:
An Empirical Study of Malicious Code In PyPI Ecosystem. CoRR abs/2309.11021 (2023) - 2022
- [j32]Zhonglin Liu, Yong Fang, Cheng Huang, Jiaxuan Han:
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network. Comput. Secur. 114: 102597 (2022) - [j31]Yong Fang, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang:
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. Comput. Secur. 118: 102715 (2022) - [j30]Wenbo Guo, Yong Fang, Cheng Huang, Haoran Ou, Chun Lin, Yongyan Guo:
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network. Comput. Secur. 121: 102823 (2022) - [j29]Yong Fang, Congshuang Wang, Zhiyang Fang, Cheng Huang:
LMTracker: Lateral movement path detection based on heterogeneous graph embedding. Neurocomputing 474: 37-47 (2022) - [j28]Yijia Xu, Yong Fang, Cheng Huang, Zhonglin Liu:
HGHAN: Hacker group identification based on heterogeneous graph attention network. Inf. Sci. 612: 848-863 (2022) - [j27]Hongyu Pan, Yong Fang, Cheng Huang, Wenbo Guo, Xuelin Wan:
GCNXSS: An Attack Detection Approach for Cross-Site Scripting Based on Graph Convolutional Networks. KSII Trans. Internet Inf. Syst. 16(12): 4008-4023 (2022) - [j26]Xiaole Liu, Cheng Huang, Yong Fang:
DDIML: Explainable detection model for drive-by-download attacks. J. Intell. Fuzzy Syst. 43(3): 3429-3442 (2022) - [j25]Xiao-Wang Wu, Yan Wang, Yong Fang, Peng Jia:
Embedding vector generation based on function call graph for effective malware detection and classification. Neural Comput. Appl. 34(11): 8643-8656 (2022) - [c17]Zhonglin Liu, Yong Fang, Yijia Xu:
Cross-site Scripting Threat Intelligence Detection Based on Deep Learning. FCS 2022: 89-104 - [c16]Shaohua Wang, Yong Fang, Yijia Xu, Yaxian Wang:
Black-Box Adversarial Windows Malware Generation via United Puppet-based Dropper and Genetic Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 653-662 - [c15]Yijia Xu, Yong Fang, Zhonglin Liu:
Web Attack Payload Identification and Interpretability Analysis Based on Graph Convolutional Network. MSN 2022: 398-407 - [c14]Haoran Ou, Yong Fang, Yongyan Guo, Wenbo Guo, Cheng Huang:
Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites. RAID 2022: 409-430 - 2021
- [j24]Yong Fang, Yuchi Zhang, Cheng Huang:
CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network. Comput. J. 64(8): 1215-1225 (2021) - [j23]Yong Fang, Kai Li, Rongfeng Zheng, Shan Liao, Yue Wang:
A communication-channel-based method for detecting deeply camouflaged malicious traffic. Comput. Networks 197: 108297 (2021) - [j22]Yong Fang, Xiangyu Zhou, Cheng Huang:
Effective method for detecting malicious PowerShell scripts based on hybrid features☆. Neurocomputing 448: 30-39 (2021) - [j21]Yong Fang, Shaoshuai Yang, Bin Zhao, Cheng Huang:
Cyberbullying Detection in Social Networks Using Bi-GRU with Self-Attention Mechanism. Inf. 12(4): 171 (2021) - [j20]Wenbo Guo, Cheng Huang, Weina Niu, Yong Fang:
Intelligent mining vulnerabilities in python code snippets. J. Intell. Fuzzy Syst. 41(2): 3615-3628 (2021) - [j19]Yong Fang, Mingyu Xie, Cheng Huang:
PBDT: Python Backdoor Detection Model Based on Combined Features. Secur. Commun. Networks 2021: 9923234:1-9923234:13 (2021) - [j18]Wanping Liu, Zhoulan Zhang, Cheng Huang, Yong Fang:
CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers. EAI Endorsed Trans. Security Safety 7(24): e5 (2021) - [c13]Haoran Ou, Yongyan Guo, Chaoyi Huang, Zhiying Zhao, Wenbo Guo, Yong Fang, Cheng Huang:
No Pie in the Sky: The Digital Currency Fraud Website Detection. ICDF2C 2021: 176-193 - 2020
- [j17]Yong Fang, Wenjie Zhang, Beibei Li, Fan Jing, Lei Zhang:
Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API. IEEE Access 8: 2313-2326 (2020) - [j16]Yong Fang, Yangchen Gao, Fan Jing, Lei Zhang:
Android Malware Familial Classification Based on DEX File Section Features. IEEE Access 8: 10614-10627 (2020) - [j15]Gouheng Zhao, Peng Jia, Cheng Huang, Anmin Zhou, Yong Fang:
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks. IEEE Access 8: 65462-65471 (2020) - [j14]Yong Fang, Yue Yang, Cheng Huang:
EmailDetective: An Email Authorship Identification And Verification Model. Comput. J. 63(11): 1775-1787 (2020) - [j13]Yong Fang, Cheng Huang, Yu Su, Yaoyao Qiu:
Detecting malicious JavaScript code based on semantic analysis. Comput. Secur. 93: 101764 (2020) - [j12]Yong Fang, Cuirong Zhao, Cheng Huang, Liang Liu:
SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods. Digit. Investig. 35: 300981 (2020) - [j11]Fan Shi, Pengcheng Zhu, Xiangyu Zhou, Bintao Yuan, Yong Fang:
Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism. Int. J. Distributed Sens. Networks 16(4) (2020)
2010 – 2019
- 2019
- [j10]Yong Fang, Yusong Guo, Cheng Huang, Liang Liu:
Analyzing and Identifying Data Breaches in Underground Forums. IEEE Access 7: 48770-48777 (2019) - [j9]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang:
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism. IEEE Access 7: 56329-56340 (2019) - [j8]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning. Appl. Soft Comput. 82 (2019) - [j7]Yong Fang, Cheng Huang, Yijia Xu, Yang Li:
RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning. Future Internet 11(8): 177 (2019) - [j6]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. KSII Trans. Internet Inf. Syst. 13(10): 5260-5275 (2019) - [c12]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. ICAIS (3) 2019: 564-575 - [c11]Yong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ICICT (2) 2019: 99-115 - [i1]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning. CoRR abs/1903.10208 (2019) - 2018
- [j5]Yong Fang, Cheng Huang, Liang Liu, Min Xue:
Research on Malicious JavaScript Detection Technology Based on LSTM. IEEE Access 6: 59118-59125 (2018) - [j4]Fengping Rong, Yong Fang, Zheng Zuo, Liang Liu:
MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection). 计算机科学 45(5): 131-138 (2018) - [j3]Zheng Zuo, Liang Liu, Lei Zhang, Yong Fang:
Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization. Sensors 18(11): 3736 (2018) - [c10]Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. DSC 2018: 153-160 - [c9]Yong Fang, Yang Li, Liang Liu, Cheng Huang:
DeepXSS: Cross Site Scripting Detection Based on Deep Learning. ICCAI 2018: 47-51 - [c8]Yong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang:
Detecting Webshell Based on Random Forest with FastText. ICCAI 2018: 52-56 - [c7]Yong Fang, Xiao Long, Liang Liu, Cheng Huang:
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ICCSP 2018: 10-15 - [c6]Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang:
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. ICCSP 2018: 170-174 - 2017
- [c5]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505 - 2016
- [j2]Cheng Huang, Jiayong Liu, Yong Fang, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58: 47-62 (2016) - 2015
- [j1]Qian Zhang, Rongjun Qin, Xin Huang, Yong Fang, Liang Liu:
Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile. Remote. Sens. 7(12): 16422-16440 (2015) - [c4]Peng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang:
A framework for privacy information protection on Android. ICNC 2015: 1127-1131 - [c3]Binjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. IIH-MSP 2015: 333-336 - 2014
- [c2]Yi Gong, Yong Fang, Liang Liu, Juan Li:
Multi-agent Intrusion Detection System Using Feature Selection Approach. IIH-MSP 2014: 528-531 - 2013
- [c1]Liang He, Yong Fang, Liang Liu:
Website Regional Rapid Security Detection Method. CICSyN 2013: 185-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint