Peian Yang

According to our database1, Peian Yang authored at least 12 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Simplified-Xception: A New Way to Speed Up Malicious Code Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
Cybersecur., 2022

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
Cybersecur., 2022

Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention.
Proceedings of the IEEE Smartworld, 2022

Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks.
Proceedings of the Advances in Digital Forensics XVII, 2021

2020
Towards Comprehensive Detection of DNS Tunnels.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2018
网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace).
计算机科学, 2018


  Loading...