Shengran Wang

Orcid: 0009-0001-1066-4340

According to our database1, Shengran Wang authored at least 24 papers between 2021 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
CL-ViME: Contrastive Learning and Vision Mixture of Experts for Encrypted Traffic Classification.
IEEE Trans. Netw. Serv. Manag., 2026

A novel android malware detection method based on CWInFs and MPTACF optimization.
J. Inf. Secur. Appl., 2026

SiftFuzz: Boosting structural diversity via efficient seed fusion.
Inf. Softw. Technol., 2026

MD-CGM: Malicious traffic detection model based on CycleGAN and multi-head self-attetion mechanism.
Future Gener. Comput. Syst., 2026

MTD-CDA: A novel malicious traffic detection method based on concept drift adaptation.
Expert Syst. Appl., 2026

A novel android malware classification approach based on multi-scale feature fusion for encrypted traffic.
Eng. Appl. Artif. Intell., 2026

2025
DialTest-EA: An Enhanced Fuzzing Approach With Energy Adjustment for Dialogue Systems via Metamorphic Testing.
Softw. Test. Verification Reliab., January, 2025

DDP-DAR: Network intrusion detection based on denoising diffusion probabilistic model and dual-attention residual network.
Neural Networks, 2025

MTD-FRD: Malicious traffic detection method based on feature representation and conditional diffusion model.
J. Netw. Comput. Appl., 2025

APT-ATT: An efficient APT attribution model based on heterogeneous threat intelligence representation and CTGAN.
Comput. Networks, 2025

SEAFuzz: Structural Exploration-Aware Seed Scheduling Approach for Fuzzing.
Proceedings of the 25th International Conference on Software Quality, 2025

DiFuzzNMT: A Differential Fuzzing Framework for Neural Machine Translation.
Proceedings of the 25th International Conference on Software Quality, 2025

IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics.
Proceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering, 2025

Multi - agent Cooperative Mechanisms for Legal Adjudication: The Crucial Role of Automatic Prompt Optimization.
Proceedings of the Twentieth International Conference on Artificial Intelligence and Law, 2025

JustEva: A Toolkit to Evaluate LLM Fairness in Legal Knowledge Inference.
Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025

2024
A novel memory usage guided fuzzing based on particle swarm optimization.
Swarm Evol. Comput., 2024

iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks.
Sci. Comput. Program., 2024

Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism.
Inf. Softw. Technol., 2024

FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

2022
A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2021

An Adaptive Random Test Method based on Variable Probability Density Function with Particle Swarm Optimization.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

L-KPCA: an efficient feature extraction method for network intrusion detection.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021


  Loading...