A novel dynamic android malware detection system with ensemble learning P Feng, J Ma, C Sun, X Xu, Y Ma IEEE Access 6, 30996-31011, 2018 | 212 | 2018 |
Lightweight security authentication mechanism towards UAV networks L Teng, M Jianfeng, F Pengbin, M Yue, M Xindi, Z Jiawei, C Gao, L Di 2019 International Conference on Networking and Network Applications (NaNA …, 2019 | 61 | 2019 |
Patchdb: A large-scale security patch dataset X Wang, S Wang, P Feng, K Sun, S Jajodia 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 44 | 2021 |
Enhancing malware analysis sandboxes with emulated user behavior S Liu, P Feng, S Wang, K Sun, J Cao Computers & Security 115, 102613, 2022 | 23 | 2022 |
Patchrnn: A deep learning-based system for security patch identification X Wang, S Wang, P Feng, K Sun, S Jajodia, S Benchaaboun, F Geck MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 595-600, 2021 | 23 | 2021 |
Android malware detection based on call graph via graph neural network P Feng, J Ma, T Li, X Ma, N Xi, D Lu 2020 International Conference on Networking and Network Applications (NaNA …, 2020 | 17 | 2020 |
Uber: Combating sandbox evasion via user behavior emulators P Feng, J Sun, S Liu, K Sun Information and Communications Security: 21st International Conference …, 2020 | 13 | 2020 |
Android malware detection via graph representation learning P Feng, J Ma, T Li, X Ma, N Xi, D Lu Mobile Information Systems 2021, 1-14, 2021 | 12 | 2021 |
Binprov: Binary code provenance identification without disassembly X He, S Wang, Y Xing, P Feng, H Wang, Q Li, S Chen, K Sun Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 11 | 2022 |
Selecting critical data flows in Android applications for abnormal behavior detection P Feng, J Ma, C Sun Mobile Information Systems 2017, 2017 | 11 | 2017 |
Honeybog: A hybrid webshell honeypot framework against command injection S Liu, P Feng, K Sun 2021 IEEE Conference on Communications and Network Security (CNS), 218-226, 2021 | 5 | 2021 |
BejaGNN: behavior-based Java malware detection via graph neural network P Feng, L Yang, D Lu, N Xi, J Ma The Journal of Supercomputing 79 (14), 15390-15414, 2023 | 3 | 2023 |
Catradroid: A call trace driven detection of malicious behaiviors in android applications C Sun, J Chen, P Feng, J Ma Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019 | 3 | 2019 |
Information flow based defensive chain for data leakage detection and prevention: a survey N Xi, C Chen, J Zhang, C Sun, S Liu, P Feng, J Ma arXiv preprint arXiv:2106.04951, 2021 | 2 | 2021 |
Data-oriented instrumentation against information leakages of Android applications C Sun, P Feng, T Li, J Ma 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017 | 2 | 2017 |
Measuring the risk value of sensitive dataflow path in Android applications P Feng, C Sun, J Ma Security and Communication Networks 9 (18), 5918-5933, 2016 | 2 | 2016 |
GlareShell: Graph learning-based PHP webshell detection for web server of industrial internet P Feng, D Wei, Q Li, Q Wang, Y Hu, N Xi, J Ma Computer Networks, 110406, 2024 | | 2024 |
DawnGNN: Documentation augmented windows malware detection using graph neural network P Feng, L Gai, L Yang, Q Wang, T Li, N Xi, J Ma Computers & Security, 103788, 2024 | | 2024 |
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning X He, S Wang, P Feng, X Wang, S Sun, Q Li, K Sun arXiv preprint arXiv:2312.07921, 2023 | | 2023 |
ACDroid: Detecting Collusion Applications on Smart Devices N Xi, Y He, Y Zhang, Z Wang, P Feng International Conference on Science of Cyber Security, 3-22, 2023 | | 2023 |