Evading Anti-Malware Engines With Deep Reinforcement Learning
Fang, Zhiyang, Wang, Junfeng, Li, Boya, Wu, Siqi, Zhou, Yingjie, Huang, Haiying
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives
Cao, Xiansheng, Wang, Junfeng, Wu, Peng, Fang, Zhiyang
Published in IET information security (22.03.2024)
Published in IET information security (22.03.2024)
Get full text
Journal Article
A Systematic Overview of Android Malware Detection
Meijin, Li, Zhiyang, Fang, Junfeng, Wang, Luyu, Cheng, Qi, Zeng, Tao, Yang, Yinwei, Wu, Jiaxuan, Geng
Published in Applied artificial intelligence (31.12.2022)
Published in Applied artificial intelligence (31.12.2022)
Get full text
Journal Article
An Empirical Study of the Code Generation of Safety-Critical Software Using LLMs
Liu, Mingxing, Wang, Junfeng, Lin, Tao, Ma, Quan, Fang, Zhiyang, Wu, Yanqun
Published in Applied sciences (01.01.2024)
Published in Applied sciences (01.01.2024)
Get full text
Journal Article
LMTracker: Lateral movement path detection based on heterogeneous graph embedding
Fang, Yong, Wang, Congshuang, Fang, Zhiyang, Huang, Cheng
Published in Neurocomputing (Amsterdam) (14.02.2022)
Published in Neurocomputing (Amsterdam) (14.02.2022)
Get full text
Journal Article
A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning
Fang, Zhiyang, Wang, Junfeng, Geng, Jiaxuan, Zhou, Yingjie, Kan, Xuan
Published in Applied soft computing (01.09.2021)
Published in Applied soft computing (01.09.2021)
Get full text
Journal Article
DroidRL: Feature selection for android malware detection with reinforcement learning
Wu, Yinwei, Li, Meijin, Zeng, Qi, Yang, Tao, Wang, Junfeng, Fang, Zhiyang, Cheng, Luyu
Published in Computers & security (01.05.2023)
Published in Computers & security (01.05.2023)
Get full text
Journal Article
Enhancing software modularization via semantic outliers filtration and label propagation
Yang, Kaiyuan, Wang, Junfeng, Fang, Zhiyang, Wu, Peng, Song, Zihua
Published in Information and software technology (01.05.2022)
Published in Information and software technology (01.05.2022)
Get full text
Journal Article
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
Geng, Jiaxuan, Wang, Junfeng, Fang, Zhiyang, Zhou, Yingjie, Wu, Di, Ge, Wenhan
Published in Computers & security (01.02.2024)
Published in Computers & security (01.02.2024)
Get full text
Journal Article
EvadeRL: Evading PDF Malware Classifiers with Deep Reinforcement Learning
Mao, Zhengyang, Fang, Zhiyang, Li, Meijin, Fan, Yang
Published in Security and communication networks (29.04.2022)
Published in Security and communication networks (29.04.2022)
Get full text
Journal Article
The Influence of the Metal Mesh to the Attachment Manner of CFRP Wind Turbine Blades
Guo, Zixin, Yu, Wanshui, Fang, Zhiyang, Zhang, Minhao, Li, Hongbo, Li, Qingmin, Siew, Wah Hoon
Published in 2019 11th Asia-Pacific International Conference on Lightning (APL) (01.06.2019)
Published in 2019 11th Asia-Pacific International Conference on Lightning (APL) (01.06.2019)
Get full text
Conference Proceeding
Utilizing benign files to obfuscate malware via deep reinforcement learning
Gao, Jiyao, Fang, Zhiyang
Published in 2022 4th International Conference on Intelligent Information Processing (IIP) (01.10.2022)
Published in 2022 4th International Conference on Intelligent Information Processing (IIP) (01.10.2022)
Get full text
Conference Proceeding