Yuanping Nie

Orcid: 0000-0002-8351-4108

According to our database1, Yuanping Nie authored at least 28 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S).
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Survey on Fuzzing Techniques in Deep Learning Libraries.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Detection and Tracking of Weak Exoatmospheric Target with Elliptical Hough Transform.
Remote. Sens., 2022

ICDF: Intrusion collaborative detection framework based on confidence.
Int. J. Intell. Syst., 2022

Group-based corpus scheduling for parallel fuzzing.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

An Automatic Code Generation Method Based on Sequence Generative Adversarial Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Fuzzing DBMS via NNLM.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Generating Highly Structured Inputs: A Survey.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features.
Wirel. Commun. Mob. Comput., 2020

Deception Approach to Track-to-Track Radar Fusion Using Noncoherent Dual-Source Jamming.
IEEE Access, 2020

A Hybrid Interface Recovery Method for Android Kernels Fuzzing.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Non-norm-bounded Attack for Generating Adversarial Examples.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2019
Calculation of Network Security Index Based on Convolution Neural Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2017
Attention-based encoder-decoder model for answer selection in question answering.
Frontiers Inf. Technol. Electron. Eng., 2017

A Multi-attention-Based Bidirectional Long Short-Term Memory Network for Relation Extraction.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

2016
Accurately and quickly calculating the weighted spectral distribution.
Telecommun. Syst., 2016

Identifying users across social networks based on dynamic core interests.
Neurocomputing, 2016

A Bidirectional LSTM Model for Question Title and Body Analysis in Question Answering.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Calculating the weighted spectral distribution with 5-cycles.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

2015
Spammer Detection on Online Social Networks Based on Logistic Regression.
Proceedings of the Web-Age Information Management, 2015

NudtMDP at TREC 2015 LiveQA Track.
Proceedings of The Twenty-Fourth Text REtrieval Conference, 2015

Performance Evaluations of Graph Spectra on Evolving Systems.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

Answer Quality Assessment in CQA Based on Similar Support Sets.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015

2014
Demographic Prediction of Online Social Network Based on Epidemic Model.
Proceedings of the Web Technologies and Applications, 2014

Identifying Users Based on Behavioral-Modeling across Social Media Sites.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

A Parallel and Scalable Framework for Non-overlapping Community Detection Algorithms.
Proceedings of the Web Technologies and Applications, 2014


  Loading...