Pengbin Feng

Orcid: 0000-0002-9472-5226

According to our database1, Pengbin Feng authored at least 20 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput., September, 2023

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
CoRR, 2023

ACDroid: Detecting Collusion Applications on Smart Devices.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

2022
Enhancing malware analysis sandboxes with emulated user behavior.
Comput. Secur., 2022

BinProv: Binary Code Provenance Identification without Disassembly.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022

2021
Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

PatchRNN: A Deep Learning-Based System for Security Patch Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

PatchDB: A Large-Scale Security Patch Dataset.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

HoneyBog: A Hybrid Webshell Honeypot Framework against Command Injection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Compositional Information Flow Verification for Inter Application Communications in Android System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

UBER: Combating Sandbox Evasion via User Behavior Emulators.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

2017
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mob. Inf. Syst., 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Measuring the risk value of sensitive dataflow path in Android applications.
Secur. Commun. Networks, 2016


  Loading...