What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Cheng Huang
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
LowPTor: A lightweight method for detecting extremely low-proportion darknet traffic.
Qiang Zhang
Cheng Huang
Jiaxuan Han
Shuyi Jiang
Jiayong Liu
2024
journals/compsec
bjCnet: A contrastive learning-based framework for software defect prediction.
Jiaxuan Han
Cheng Huang
Jiayong Liu
2024
journals/compsec
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence.
Lingzi Li
Cheng Huang
Junren Chen
2024
conf/uss
DONAPI: Malicious NPM Packages Detector using Behavior Sequence Knowledge Mapping.
Cheng Huang
Nannan Wang
Ziyan Wang
Siqi Sun
Lingzi Li
Junren Chen
Qianchong Zhao
Jiaxuan Han
Zhen Yang
Lei Shi
2023
journals/compsec
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Yan Wang
Peng Jia
Xi Peng
Cheng Huang
Jiayong Liu
2023
journals/compsec
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model.
Zhonglin Liu
Yong Fang
Cheng Huang
Yijia Xu
2023
journals/compsec
A framework for threat intelligence extraction and fusion.
Yongyan Guo
Zhengyu Liu
Cheng Huang
Nannan Wang
Hai Min
Wenbo Guo
Jiayong Liu
2022
journals/compsec
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network.
Wenbo Guo
Yong Fang
Cheng Huang
Haoran Ou
Chun Lin
Yongyan Guo
2022
journals/compsec
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network.
Yong Fang
Chaoyi Huang
Minchuan Zeng
Zhiying Zhao
Cheng Huang
2022
journals/compsec
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network.
Zhonglin Liu
Yong Fang
Cheng Huang
Jiaxuan Han
2022
journals/compsec
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Weina Niu
Jie Zhou
Yibin Zhao
Xiaosong Zhang
Yujie Peng
Cheng Huang
2021
journals/compsec
Exsense: Extract sensitive information from unstructured data.
Yongyan Guo
Jiayong Liu
Wenwu Tang
Cheng Huang
2021
journals/istr
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums.
Ying Li
Jiaxing Cheng
Cheng Huang
Zhouguo Chen
Weina Niu
2021
conf/icics
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts.
Yongyan Guo
Zhengyu Liu
Cheng Huang
Jiayong Liu
Wangyuan Jing
Ziwang Wang
Yanghao Wang
2020
journals/compsec
Detecting malicious JavaScript code based on semantic analysis.
Yong Fang
Cheng Huang
Yu Su
Yaoyao Qiu
2020
journals/compsec
Covert timing channel detection method based on time interval and payload length analysis.
Jiaxuan Han
Cheng Huang
Fan Shi
Jiayong Liu
2017
conf/ccs
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Cheng Huang
Shuang Hao
Luca Invernizzi
Jiayong Liu
Yong Fang
Christopher Kruegel
Giovanni Vigna
2016
journals/compsec
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Cheng Huang
Jiayong Liu
Yong Fang
Zheng Zuo
Coauthors
Chaoyi Huang
(1)
Cheng Huang
(18)
Christopher Kruegel
(1)
Chun Lin
(1)
Fan Shi
(1)
Giovanni Vigna
(1)
Hai Min
(1)
Haoran Ou
(1)
Jiaxing Cheng
(1)
Jiaxuan Han
(5)
Jiayong Liu
(9)
Jie Zhou
(1)
Junren Chen
(2)
Lei Shi
(1)
Lingzi Li
(2)
Luca Invernizzi
(1)
Minchuan Zeng
(1)
Nannan Wang
(2)
Peng Jia
(1)
Qianchong Zhao
(1)
Qiang Zhang
(1)
Shuang Hao
(1)
Shuyi Jiang
(1)
Siqi Sun
(1)
Wangyuan Jing
(1)
Weina Niu
(2)
Wenbo Guo
(2)
Wenwu Tang
(1)
Xi Peng
(1)
Xiaosong Zhang
(1)
Yan Wang
(1)
Yanghao Wang
(1)
Yaoyao Qiu
(1)
Yibin Zhao
(1)
Yijia Xu
(1)
Ying Li
(1)
Yong Fang
(7)
Yongyan Guo
(4)
Yu Su
(1)
Yujie Peng
(1)
Zhen Yang
(1)
Zheng Zuo
(1)
Zhengyu Liu
(2)
Zhiying Zhao
(1)
Zhonglin Liu
(2)
Zhouguo Chen
(1)
Ziwang Wang
(1)
Ziyan Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to