Follow
Yanchen Qiao
Yanchen Qiao
Peng Cheng Laboratory
Verified email at pcl.ac.cn
Title
Cited by
Cited by
Year
DGA domain name classification method based on long short-term memory with attention mechanism
Y Qiao, B Zhang, W Zhang, AK Sangaiah, H Wu
Applied sciences 9 (20), 4205, 2019
572019
A multi-channel visualization method for malware classification based on deep learning
Y Qiao, Q Jiang, Z Jiang, L Gu
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
272019
Malware classification based on multilayer perception and Word2Vec for IoT security
Y Qiao, W Zhang, X Du, M Guizani
ACM Transactions on Internet Technology (TOIT) 22 (1), 1-22, 2021
262021
How to automatically identify the homology of different malware
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 929-936, 2016
182016
Research of network vulnerability analysis based on attack capability transfer
Y Wang, X Yun, Y Zhang, S Jin, Y Qiao
2012 IEEE 12th International Conference on Computer and Information …, 2012
122012
Adversarial malware sample generation method based on the prototype of deep learning detector
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
Computers & Security 119, 102762, 2022
102022
Fast reused function retrieval method based on simhash and inverted index
Y Qiao, X Yun, Y Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 937-944, 2016
102016
Adversarial ELF malware detection method using model interpretation
Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab
IEEE Transactions on Industrial Informatics 19 (1), 605-615, 2022
92022
Malware classification method based on word vector of bytes and multilayer perception
Y Qiao, B Zhang, W Zhang
ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020
92020
Fast reused code tracing method based on simhash and inverted index
YC Qiao, XC Yun, Y Tuo, Y Zhang
Journal on Communications 37 (11), 104-113, 2016
72016
Who Is Using the Phone? Representation‐Learning‐Based Continuous Authentication on Smartphones
H Wang, H He, C Song, H Tang, Y Sun, Y Qiao, W Zhang
Security and Communication Networks 2022 (1), 6339407, 2022
52022
An automatic malware homology identification method based on calling habits
YC Qiao, XC Yun, YZ Zhang
Acta Electron Sin 44 (10), 2410-2414, 2016
52016
A similar module extraction approach for android malware
Z Li, Y Qiao, T Hasan, Q Jiang
Proceedings of the 2018 International Conference on Modeling, Simulation and …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–13