Wenqing Fan

According to our database1, Wenqing Fan authored at least 13 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference.
Cybersecur., December, 2023

APT Encrypted Traffic Detection Method based on Two-Parties and Multi-Session for IoT.
CoRR, 2023

2022
FIoTFuzzer: Response-Based Black-Box fuzzing for IoT Devices.
Proceedings of the 22nd IEEE/ACIS International Conference on Computer and Information Science, 2022

2019
Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural Network.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Feature Collection and Selection in Malware Classification.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

A CNN-based Approach to the Detection of SQL Injection Attacks.
Proceedings of the 18th IEEE/ACIS International Conference on Computer and Information Science, 2019

2018
JSEFuzz: Vulnerability Detection Method for Java Web Application.
Proceedings of the 3rd International Conference on System Reliability and Safety, 2018

Constructing an Intrusion Detection Model based on Long Short-term Neural Networks.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

Application of AES and RSA Hybrid Algorithm in E-mail.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

2016
The study of APT attack stage model.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016

2015
Scaling Concolic Testing for the Environment-Intensive Program.
IEICE Trans. Inf. Syst., 2015

2014
Obfuscated Malicious Code Detection with Path Condition Analysis.
J. Networks, 2014

Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution.
J. Multim., 2014


  Loading...