Follow
Guanjun Lin
Guanjun Lin
Verified email at swin.edu.au
Title
Cited by
Cited by
Year
Software vulnerability detection using deep neural networks: a survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE 108 (10), 1825-1848, 2020
3382020
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
1992018
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1312017
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
1012019
Software vulnerability discovery via learning multi-domain knowledge bases
G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2469-2485, 2019
882019
Cyber resilience in healthcare digital twin on lung cancer
J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang
IEEE access 8, 201900-201913, 2020
802020
Deep learning-based vulnerable function detection: A benchmark
G Lin, W Xiao, J Zhang, Y Xiang
Information and Communications Security: 21st International Conference …, 2020
742020
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation
S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (1), 438-451, 2020
632020
Near real-time twitter spam detection with machine learning techniques
N Sun, G Lin, J Qiu, P Rimba
International Journal of Computers and Applications 44 (4), 338-348, 2022
572022
Statistical twitter spam detection demystified: performance, stability and scalability
G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan
IEEE access 5, 11142-11154, 2017
522017
Software vulnerability analysis and discovery using deep learning techniques: A survey
P Zeng, G Lin, L Pan, Y Tai, J Zhang
IEEE Access 8, 197158-197172, 2020
502020
Deep neural embedding for software vulnerability discovery: Comparison and optimization
X Yuan, G Lin, Y Tai, J Zhang
Security and Communication Networks 2022, 1-12, 2022
232022
Deep neural-based vulnerability discovery demystified: data, model and performance
G Lin, W Xiao, LY Zhang, S Gao, Y Tai, J Zhang
Neural Computing and Applications 33 (20), 13287-13300, 2021
172021
A context-aware neural embedding for function-level vulnerability detection
H Wei, G Lin, L Li, H Jia
Algorithms 14 (11), 335, 2021
92021
Senior Member, Houcine Hassan,“Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability”
G Lin, SN Sun, J Zhang, Y Xiang
IEEE TRANSACTIONS–2017, 2017
92017
Neural model stealing attack to smart mobile device on intelligent medical platform
L Zhang, G Lin, B Gao, Z Qin, Y Tai, J Zhang
Wireless Communications and Mobile Computing 2020, 1-10, 2020
62020
Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis
H Mei, G Lin, D Fang, J Zhang
Journal of Information Security and Applications 74, 103467, 2023
52023
Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis
P Zeng, G Lin, J Zhang, Y Zhang
International Journal of Network Management 33 (3), e2198, 2023
32023
The application of neural network for software vulnerability detection: a review
Y Zhu, G Lin, L Song, J Zhang
Neural Computing and Applications 35 (2), 1279-1301, 2023
32023
Distilled and Contextualized Neural Models Benchmarked for Vulnerable Function Detection
G Lin, H Jia, D Wu
Mathematics 10 (23), 4482, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20