Fan Shi

Orcid: 0000-0003-4533-2706

Affiliations:
  • National University of Defense Technology, College of Electronic Engineering, Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei, China


According to our database1, Fan Shi authored at least 24 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Causal Adjustment Module for Debiasing Scene Graph Generation.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2025

Heterogeneous Binary Pixel Difference Networks for Remote Sensing Object Detection.
IEEE Trans. Geosci. Remote. Sens., 2025

Understanding and Characterizing the Adoption of Internationalized Domain Names in Practice.
IEEE Trans. Dependable Secur. Comput., 2025

Misty Registry: An Empirical Study of Flawed Domain Registry Operation.
Proceedings of the 34th USENIX Security Symposium, 2025

NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines.
Proceedings of the 34th USENIX Security Symposium, 2025

Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
An Intelligent Penetration Testing Method Using Human Feedback.
IEEE Trans. Ind. Informatics, 2024

GuessFuse: Hybrid Password Guessing With Multi-View.
IEEE Trans. Inf. Forensics Secur., 2024

DynPen: Automated Penetration Testing in Dynamic Network Scenarios Using Deep Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Proceedings of the 33rd USENIX Security Symposium, 2024

Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking the Security Threats of Stale DNS Glue Records.
Proceedings of the 33rd USENIX Security Symposium, 2024

Poster: Capture the List: Ranking Manipulation Leveraging Open Forwarders.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

Poster: A Fistful of Queries: Accurate and Lightweight Anycast Enumeration of Public DNS.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

CAKGC: A Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature Fusion.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2022
Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior.
Proceedings of the 4th International Conference on Advanced Information Science and System, 2022

2021
Mining Centralization of Internet Service Infrastructure in the Wild.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

A Nameserver Importance Ranking Method Based on Heterogeneous Information Network.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Binary File's Visualization and Entropy Features Analysis Combined with Multiple Deep Learning Networks for Malware Classification.
Secur. Commun. Networks, 2020

Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020

A Vulnerability Risk Assessment Method Based on Heterogeneous Information Network.
IEEE Access, 2020

A Lightweight Cross-Version Binary Code Similarity Detection Based on Similarity and Correlation Coefficient Features.
IEEE Access, 2020

File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification.
IEEE Access, 2020

Classification of Malware Variant Based on Ensemble Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020


  Loading...