Follow
Weifeng Li
Title
Cited by
Cited by
Year
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops
V Benjamin, W Li, T Holt, H Chen
2015 IEEE international conference on intelligence and security informatics …, 2015
1392015
Identifying and profiling key sellers in cyber carding community: AZSecure text mining system
W Li, H Chen, JF Nunamaker Jr
Journal of Management Information Systems 33 (4), 1059-1086, 2016
972016
Descriptive analytics: Examining expert hackers in web forums
A Abbasi, W Li, V Benjamin, S Hu, H Chen
2014 IEEE Joint Intelligence and Security Informatics Conference, 56-63, 2014
892014
Identifying top sellers in underground economy using deep learning-based sentiment analysis
W Li, H Chen
2014 IEEE joint intelligence and security informatics conference, 64-67, 2014
842014
Cybersecurity as an industry: A cyber threat intelligence perspective
S Samtani, M Abate, V Benjamin, W Li
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 135-154, 2020
662020
Chinese underground market jargon analysis based on unsupervised learning
K Zhao, Y Zhang, C Xing, W Li, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 97-102, 2016
322016
An explainable multi-modal hierarchical attention model for developing phishing threat intelligence
Y Chai, Y Zhou, W Li, Y Jiang
IEEE Transactions on Dependable and Secure Computing 19 (2), 790-803, 2021
282021
Exploring key hackers and cybersecurity threats in chinese hacker communities
Z Fang, X Zhao, Q Wei, G Chen, Y Zhang, C Xing, W Li, H Chen
2016 IEEE conference on intelligence and security informatics (ISI), 13-18, 2016
282016
Identifying, collecting, and monitoring personally identifiable information: From the dark web to the surface web
Y Liu, FY Lin, Z Ahmad-Post, M Ebrahimi, N Zhang, JL Hu, J Xin, W Li, ...
2020 IEEE International Conference on Intelligence and Security Informatics …, 2020
272020
Supervised topic modeling using hierarchical dirichlet process-based inverse regression: Experiments on e-commerce applications
W Li, J Yin, H Chen
IEEE Transactions on Knowledge and Data Engineering 30 (6), 1192-1205, 2017
212017
Informing cyber threat intelligence through dark Web situational awareness: The AZSecure hacker assets portal
S Samtani, W Li, V Benjamin, H Chen
Digital Threats: Research and Practice (DTRAP) 2 (4), 1-10, 2021
162021
Curtailing fake news propagation with psychographics
H Safadi, W Li, S Soleymani, U Kursuncu, A Sheth
Available at SSRN 3558236, 2020
142020
Towards deep learning interpretability: A topic modeling approach
Y Chai, W Li
142019
Counteracting dark Web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence
N Zhang, M Ebrahimi, W Li, H Chen
ACM Transactions on Management Information Systems (TMIS) 13 (2), 1-21, 2022
132022
Binary black-box attacks against static malware detectors with reinforcement learning in discrete action spaces
M Ebrahimi, J Pacheco, W Li, JL Hu, H Chen
2021 IEEE Security and Privacy Workshops (SPW), 85-91, 2021
132021
Targeting key data breach services in underground supply chain
W Li, J Yin, H Chen
2016 IEEE Conference on Intelligence and Security Informatics (ISI), 322-324, 2016
92016
A generative adversarial learning framework for breaking text-based CAPTCHA in the dark web
N Zhang, M Ebrahimi, W Li, H Chen
2020 IEEE International conference on intelligence and security informatics …, 2020
72020
Identifying high quality carding services in underground economy using nonparametric supervised topic model
W Li, J Yin, H Chen
72016
Linking personally identifiable information from the dark web to the surface web: A deep entity resolution approach
F Lin, Y Liu, M Ebrahimi, Z Ahmad-Post, JL Hu, J Xin, S Samtani, W Li, ...
2020 International Conference on Data Mining Workshops (ICDMW), 488-495, 2020
62020
Assessing and enhancing adversarial robustness of predictive analytics: An empirically tested design framework
W Li, Y Chai
Journal of Management Information Systems 39 (2), 542-572, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20