Huayang Cao

According to our database1, Huayang Cao authored at least 19 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
InFuzz: An Interactive Tool for Enhancing Efficiency in Fuzzing through Visual Bottleneck Analysis (Registered Report).
Proceedings of the 2nd International Fuzzing Workshop, 2023

A Study on Vulnerability Code Labeling Method in Open-Source C Programs.
Proceedings of the Database and Expert Systems Applications, 2023

Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
A Survey of Human-machine Collaboration in Fuzzing.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical Approach.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2019
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A General Testing Framework Based on Veins for Securing VANET Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Data-Driven Vulnerability Pattern Analysis for Fuzzing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Fuzzing the Font Parser of Compound Documents.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2013
A layered encryption mechanism for networked critical infrastructures.
IEEE Netw., 2013

Worm Detection without Knowledge Base in Industrial Networks.
J. Commun., 2013

Scaling Inter-domain Routing System via Path Exploration Aggregation.
KSII Trans. Internet Inf. Syst., 2013

Secure process control system of industrial networks.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2012
AS Alliance based security enhancement for inter-domain routing protocol.
Math. Comput. Model., 2012

A Systematic Approach to Evaluating the Trustworthiness of the Internet Inter-Domain Routing Information.
IEICE Trans. Inf. Syst., 2012

2009
TTM Based Security Enhancement for Inter-domain Routing Protocol.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

A Packet-Based Anomaly Detection Model for Inter-domain Routing.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Routing Policy Conflict Detection without Violating ISP's Privacy.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...