Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Fudong Shao"'
Autor:
Shifu Hou, Yujie Fan, Mingxuan Ju, Yanfang Ye, Wenqiang Wan, Kui Wang, Yinming Mei, Qi Xiong, Fudong Shao
Publikováno v:
Proceedings of the AAAI Conference on Artificial Intelligence. 35:7754-7761
In the fight against the COVID-19 pandemic, many social activities have moved online; society's overwhelming reliance on the complex cyberspace makes its security more important than ever. In this paper, we propose and develop an intelligent system n
Publikováno v:
ACSAC
Despite the persistent effort by law enforcement, illicit drug trafficking in darknet markets has shown great resilience with new markets rapidly appearing after old ones being shut down. In order to more effectively detect, disrupt and dismantle ill
Autor:
Qian Peng, Liang Zhao, Yanfang Ye, Chuan Shi, Jianfei Zhang, Xusheng Xiao, Qi Xiong, Yujie Fan, Fudong Shao, Yiming Zhang
Publikováno v:
ICDM
The emerging underground markets (e.g., Hack Forums) have been widely used by cybercriminals to trade in illicit products or services, which have played a vital role in the cybercriminal ecosystem. In order to combat the evolving cybercrimes, in this
Autor:
Jingwei Lei, Fudong Shao, Wenqiang Wan, Yiming Zhang, Shifu Hou, Jiabin Wang, Yanfang Ye, Qi Xiong, Yujie Fan
Publikováno v:
CIKM
The explosive growth and increasing sophistication of Android malware call for new defensive techniques that are capable of protecting mobile users against novel threats. To combat the evolving Android malware attacks, systems of HinDroid and AiDroid
Autor:
Wenqiang Wan, Fudong Shao, Jiabin Wang, Jingwei Lei, Qi Xiong, Shifu Hou, Yanfang Ye, Lingwei Chen
Publikováno v:
IJCAI
The increasingly sophisticated Android malware calls for new defensive techniques that are capable of protecting mobile users against novel threats. In this paper, we first extract the runtime Application Programming Interface (API) call sequences fr
Publikováno v:
ICBK
Underground forums have been widely used by cybercriminals to exchange knowledge and trade in illicit products or services, which have played a central role in the cybercriminal ecosystem. In order to facilitate the deployment of effective countermea