Yan Wang

Affiliations:
  • University of Chinese Academy of Science, School of Cyber Security, Beijing, China
  • Chinese Academy of Science, Institute of Information Engineering, Beijing, China


According to our database1, Yan Wang authored at least 36 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks.
Comput. Secur., December, 2023

CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication.
Comput. Secur., May, 2023

Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance.
CoRR, 2023

VN-SMT: An SMT-based Construction Method on Virtual Network to Defend Insider Reconnaissance.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

UAG: User Action Graph Based on System Logs for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

AdaptParse: Adaptive Contextual Aware Attention Network for Log Parsing via Word Classification.
Proceedings of the International Joint Conference on Neural Networks, 2023

ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

ABTD-Net: Autonomous Baggage Threat Detection Networks for X-ray Images.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Prompt Makes mask Language Models Better Adversarial Attackers.
Proceedings of the IEEE International Conference on Acoustics, 2023

ACG: Attack Classification on Encrypted Network Traffic using Graph Convolution Attention Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

GHunter: A Fast Subgraph Matching Method for Threat Hunting.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection.
Knowl. Inf. Syst., 2022

A novel deep framework for dynamic malware detection based on API sequence intrinsic features.
Comput. Secur., 2022

DMalNet: Dynamic malware analysis based on API feature engineering and graph learning.
Comput. Secur., 2022

A Software Security Entity Relationships Prediction Framework Based on Knowledge Graph Embedding Using Sentence-Bert.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

DGQAN: Dual Graph Question-Answer Attention Networks for Answer Selection.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

Implicit Continuous Authentication Model Based on Mobile Terminal Touch Behavior.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

MMSP: A LSTM Based Framework for Multi-Step Attack Prediction in Mixed Scenarios.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

CyEvent2vec: Attributed Heterogeneous Information Network based Event Embedding Framework for Cyber Security Events Analysis.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
AOPL: Attention Enhanced Oversampling and Parallel Deep Learning Model for Attack Detection in Imbalanced Network Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Multi-Modal fake news Detection on Social Media with Dual Attention Fusion Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FKTAN: Fusion Keystroke Time-Textual Attention Networks for Continuous Authentication.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

GSketch: A Comprehensive Graph Analytic Approach for Masquerader Detection Based on File Access Graph.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

ITDBERT: Temporal-semantic Representation for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

BERTDAN: Question-Answer Dual Attention Fusion Networks with Pre-trained Models for Answer Selection.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

Anomaly Detection in Unstructured Logs Using Attention-based Bi-LSTM Network.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

2020
AMQAN: Adaptive Multi-Attention Question-Answer Networks for Answer Selection.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

2019
Cyber Profiles Based Risk Prediction of Application Systems for Effective Access Control.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Risk Prediction for Imbalanced Data in Cyber Security : A Siamese Network-based Deep Learning Classification Framework.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
A Hybrid Model Based on Multi-dimensional Features for Insider Threat Detection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic Behavior.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Botnet Detection Method Analysis on the Effect of Feature Extraction.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015


  Loading...