Leiqi Wang

According to our database1, Leiqi Wang authored at least 13 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023

Adaptive Machine Learning-Based Proactive Thermal Management for NoC Systems.
IEEE Trans. Very Large Scale Integr. Syst., August, 2023

UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

CTP: Defending Against Data Poisoning in Attack Traffic Detection Based Deep Neural Networks.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023

ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022

MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

PEPC: A Deep Parallel Convolutional Neural Network Model with Pre-trained Embeddings for DGA Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

2016
Cyber-Enabled Traditional Chinese Medicine.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016


  Loading...