Yanchen Qiao
Yanchen Qiao
Peng Cheng Laboratory
Verified email at
Cited by
Cited by
DGA domain name classification method based on long short-term memory with attention mechanism
Y Qiao, B Zhang, W Zhang, AK Sangaiah, H Wu
Applied sciences 9 (20), 4205, 2019
A multi-channel visualization method for malware classification based on deep learning
Y Qiao, Q Jiang, Z Jiang, L Gu
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
Malware classification based on multilayer perception and Word2Vec for IoT security
Y Qiao, W Zhang, X Du, M Guizani
ACM Transactions on Internet Technology (TOIT) 22 (1), 1-22, 2021
How to automatically identify the homology of different malware
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 929-936, 2016
Research of network vulnerability analysis based on attack capability transfer
Y Wang, X Yun, Y Zhang, S Jin, Y Qiao
2012 IEEE 12th International Conference on Computer and Information …, 2012
Adversarial malware sample generation method based on the prototype of deep learning detector
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
Computers & Security 119, 102762, 2022
Fast reused function retrieval method based on simhash and inverted index
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 937-944, 2016
Adversarial ELF malware detection method using model interpretation
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
IEEE Transactions on Industrial Informatics 19 (1), 605-615, 2022
Malware classification method based on word vector of bytes and multilayer perception
Y Qiao, B Zhang, W Zhang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
Fast reused code tracing method based on simhash and inverted index
YC Qiao, XC Yun, Y Tuo, Y Zhang
Journal on Communications 37 (11), 104-113, 2016
Who Is Using the Phone? Representation‐Learning‐Based Continuous Authentication on Smartphones
H Wang, H He, C Song, H Tang, Y Sun, Y Qiao, W Zhang
Security and Communication Networks 2022 (1), 6339407, 2022
An automatic malware homology identification method based on calling habits
YC Qiao, XC Yun, YZ Zhang
Acta Electron Sin 44 (10), 2410-2414, 2016
A similar module extraction approach for android malware
Z Li, Y Qiao, T Hasan, Q Jiang
Proceedings of the 2018 International Conference on Modeling, Simulation and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–13