Cai Fu

Orcid: 0000-0002-7706-6898

According to our database1, Cai Fu authored at least 68 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems.
CoRR, 2024

2023
Singular Value Manipulating: An Effective DRL-Based Adversarial Attack on Deep Convolutional Neural Network.
Neural Process. Lett., December, 2023

Ecological health analysis of wetlands in the middle reaches of Yangtze River under changing environment.
Int. J. Digit. Earth, December, 2023

Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding.
ACM Trans. Softw. Eng. Methodol., September, 2023

MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network.
CoRR, 2023

Deciphering the Code: Distinguishing ChatGPT-Generated Code from Human-authored Code through Discriminative Feature Analysis and Dataset Optimization.
CoRR, 2023

VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs.
Comput. Secur., 2023

A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

2022
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.
Veh. Commun., 2022

Codee: A Tensor Embedding Scheme for Binary Code Search.
IEEE Trans. Software Eng., 2022

Federated learning based multi-task feature fusion framework for code expressive semantic extraction.
Softw. Pract. Exp., 2022

Recommendations in Smart Devices Using Federated Tensor Learning.
IEEE Internet Things J., 2022

IFAttn: Binary code similarity analysis based on interpretable features with attention.
Comput. Secur., 2022

2021
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2021

Intrusion Detection System for IoT Heterogeneous Perceptual Network.
Mob. Networks Appl., 2021

The Impact of Search Engines on Virus Propagation.
J. Circuits Syst. Comput., 2021

Function-level obfuscation detection method based on Graph Convolutional Networks.
J. Inf. Secur. Appl., 2021

Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems.
Inf. Sci., 2021

Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing.
IEEE Trans. Comput. Soc. Syst., 2020

Evasion Attacks to Graph Neural Networks via Influence Function.
CoRR, 2020

Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.
CoRR, 2020

Cooperative malicious network behavior recognition algorithm in E-commerce.
Comput. Secur., 2020

Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.
Comput. Networks, 2020

Deep Learning-Based Reverse Method of Binary Protocol.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Search engine: The social relationship driving power of Internet of Things.
Future Gener. Comput. Syst., 2019

Targeting malware discrimination based on reversed association task.
Concurr. Comput. Pract. Exp., 2019

An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019

Community Partition immunization strategy based on Search Engine.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

The Application Of Critical Thinking In C Programming Language Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

A live migration strategy for virtual encryption card equipment.
Proceedings of the 3rd International Conference on High Performance Compilation, 2019

CodeeGAN: Code Generation via Adversarial Training.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Differentially Private Matrix Completion via Distributed Matrix Factorization.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory).
计算机科学, 2017

Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017

Virtualization of the Encryption Card for Trust Access in Cloud Computing.
IEEE Access, 2017

The Impact of the Collective Influence of Search Engines on Social Networks.
IEEE Access, 2017

Malware Discrimination Based on Reversed Association Task.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Search engine drives the evolution of social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability).
计算机科学, 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016

Communities Evolution Analysis Based on Events in Dynamic Complex Network.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
基于相识度的恶意代码检测 (Detection of Malware Code Based on Acquaintance Degree).
计算机科学, 2015

Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Search Engine: A Hidden Power for Virus Propagation in Community Networks.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Evolutionary Virus Immune Strategy Based on Community Vitality.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
K-clique community detection based on union-find.
Proceedings of the International Conference on Computer, 2014

2013
Community Vitality in Dynamic Temporal Networks.
Int. J. Distributed Sens. Networks, 2013

Virus propagation power of the dynamic network.
EURASIP J. Wirel. Commun. Netw., 2013

Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Projection Pursuit Based Wormhole Detection in Ad Hoc Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Task-based behavior detection of illegal codes.
Math. Comput. Model., 2012

2011
GRAP: Grey risk assessment based on projection in ad hoc networks.
J. Parallel Distributed Comput., 2011

A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks.
Int. J. Comput. Intell. Syst., 2011

An Efficient Protocol for the Commit-Prove-Fair-Open functionality.
IACR Cryptol. ePrint Arch., 2011

2010
Secure Authentication Scheme based on IBE.
J. Networks, 2010

A hybrid game model based on reputation for spectrum allocation in wireless networks.
Comput. Commun., 2010

A more efficient accountable authority IBE scheme under the DL assumption.
Sci. China Inf. Sci., 2010

A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Grey Theory Based Nodes Risk Assessment in P2P Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2005
Secure OLSR.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...