Bio
We haven't found any bio for you yet.
Researcher Links
Loading links...
Publications by Type
Loading publications…
The last 5 uploaded publications
Software Vulnerability Detection Using Deep Neural Networks: A Survey
Guanjun Lin, Sheng Wen, Qinglong Qinglong Han, Jun Zhang, Yang Xiang (2020). Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proceedings of the IEEE, 108(10), pp. 1825-1848, DOI: 10.1109/jproc.2020.2993293.
Article241 days agoDetecting and Preventing Cyber Insider Threats: A Survey
Liu Liu, Olivier De Vel, Qinglong Qinglong Han, Jun Zhang, Yang Xiang (2018). Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Communications Surveys & Tutorials, 20(2), pp. 1397-1417, DOI: 10.1109/comst.2018.2800740.
Article241 days agoDeep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey
Jun Zhang, Lei Pan, Qinglong Qinglong Han, Chao Chen, Sheng Wen, Yang Xiang (2021). Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE/CAA Journal of Automatica Sinica, 9(3), pp. 377-391, DOI: 10.1109/jas.2021.1004261.
Article241 days agoData-Driven Cyber Security in Perspective—Intelligent Traffic Analysis
Rory Coulter, Qinglong Qinglong Han, Lei Pan, Jun Zhang, Yang Xiang (2019). Data-Driven Cyber Security in Perspective—Intelligent Traffic Analysis. IEEE Transactions on Cybernetics, 50(7), pp. 3081-3093, DOI: 10.1109/tcyb.2019.2940940.
Article241 days agoDeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection
Shigang Liu, Guanjun Lin, Qinglong Qinglong Han, Sheng Wen, Jun Zhang, Yang Xiang (2019). DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection. IEEE Transactions on Fuzzy Systems, pp. 1-1, DOI: 10.1109/tfuzz.2019.2958558.
Article241 days ago