Hong Song

Orcid: 0000-0002-1677-425X

Affiliations:
  • Central South University, Changsha, China


According to our database1, Hong Song authored at least 16 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ASDroid: Resisting Evolving Android Malware With API Clusters Derived From Source Code.
IEEE Trans. Inf. Forensics Secur., 2025

ProvGOutLiner: A lightweight anomaly detection method based on process behavior features within provenance graphs.
Comput. Secur., 2025

2024
SimLog: System Log Anomaly Detection Method Based on Simhash.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Building Trust: Security Analysis in IoT Pairing Stages.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024

2023
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey.
IEEE Open J. Comput. Soc., 2023

Exploration and Research on Ideological and Political Education in Course Operating Systems and Security.
Proceedings of the Computer Science and Education. Teaching and Curriculum, 2023

TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Cropping Graph Convolution Neural Network for Prediction of Compound Carcinogenicity.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2019
ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Project-driven information talents training mode in opening environment.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2015
EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Adaptive Relay Selection Algorithm Based on Network Coding in 802.16m Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Time Efficient Tag Searching in Multiple Reader RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2011
DENNC: A Wireless Malicious Detection Approach Based on Network Coding.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...