Fan Shi
Orcid: 0000-0003-4533-2706Affiliations:
- National University of Defense Technology, College of Electronic Engineering, Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei, China
According to our database1,
Fan Shi
authored at least 24 papers
between 2020 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Pattern Anal. Mach. Intell., May, 2025
IEEE Trans. Geosci. Remote. Sens., 2025
Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice.
IEEE Trans. Dependable Secur. Comput., 2025
Proceedings of the 34th USENIX Security Symposium, 2025
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines.
Proceedings of the 34th USENIX Security Symposium, 2025
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
Proceedings of the Computer Security - ESORICS 2025, 2025
2024
IEEE Trans. Ind. Informatics, 2024
IEEE Trans. Inf. Forensics Secur., 2024
DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Poster: A Fistful of Queries: Accurate and Lightweight Anycast Enumeration of Public DNS.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
CAKGC: A Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature Fusion.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2022
Proceedings of the 4th International Conference on Advanced Information Science and System, 2022
2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.
Secur. Commun. Networks, 2020
Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020
IEEE Access, 2020
A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020
File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification.
IEEE Access, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020