Guanjun Lin

Orcid: 0000-0003-3280-1307

According to our database1, Guanjun Lin authored at least 19 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Boosting aquila optimizer by marine predators algorithm for combinatorial optimization.
J. Comput. Des. Eng., March, 2024

2023
Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis.
J. Inf. Secur. Appl., May, 2023

The application of neural network for software vulnerability detection: a review.
Neural Comput. Appl., 2023

Intelligent detection of vulnerable functions in software through neural embedding-based code analysis.
Int. J. Netw. Manag., 2023

Sensor Network Structure Recognition Based on P-law.
Comput. Syst. Sci. Eng., 2023

2022
CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation.
IEEE Trans. Dependable Secur. Comput., 2022

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization.
Secur. Commun. Networks, 2022

2021
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases.
IEEE Trans. Dependable Secur. Comput., 2021

Deep neural-based vulnerability discovery demystified: data, model and performance.
Neural Comput. Appl., 2021

A Context-Aware Neural Embedding for Function-Level Vulnerability Detection.
Algorithms, 2021

2020
Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform.
Wirel. Commun. Mob. Comput., 2020

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection.
IEEE Trans. Fuzzy Syst., 2020

Software Vulnerability Detection Using Deep Neural Networks: A Survey.
Proc. IEEE, 2020

Cyber Resilience in Healthcare Digital Twin on Lung Cancer.
IEEE Access, 2020

Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey.
IEEE Access, 2020

2019
Deep Learning-Based Vulnerable Function Detection: A Benchmark.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Cross-Project Transfer Representation Learning for Vulnerable Function Discovery.
IEEE Trans. Ind. Informatics, 2018

2017
Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability.
IEEE Access, 2017

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017


  Loading...