Follow
Ying Dong
Ying Dong
Verified email at mails.ucas.ac.cn
Title
Cited by
Cited by
Year
Towards the detection of inconsistencies in public security vulnerability reports
Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang
28th USENIX security symposium (USENIX Security 19), 869-885, 2019
1362019
An adaptive system for detecting malicious queries in web attacks
Y Dong, Y Zhang, H Ma, Q Wu, Q Liu, K Wang, W Wang
Science China Information Sciences 61, 1-16, 2018
522018
Predicting the popularity of online news based on multivariate analysis
C Liu, W Wang, Y Zhang, Y Dong, F He, C Wu
2017 IEEE international conference on computer and information technology …, 2017
262017
Mixed wavelet-based neural network model for cyber security situation prediction using MODWT and Hurst exponent analysis
F He, Y Zhang, D Liu, Y Dong, C Liu, C Wu
Network and System Security: 11th International Conference, NSS 2017 …, 2017
222017
A Novel Automatic Severity Vulnerability Assessment Framework.
T Wen, Y Zhang, Y Dong, G Yang
J. Commun. 10 (5), 320-329, 2015
172015
深度学习应用于网络空间安全的现状, 趋势与展望
张玉清, 董颖, 柳彩云, 雷柯楠, 孙鸿宇
计算机研究与发展 55 (6), 1117-1142, 2018
122018
Application of artificial intelligence technology in the field of security vulnerability
HY Sun, Y He, JC Wang, Y Dong, LP Zhu, H Wang, YQ ZHANG
Journal on Communications 39 (8), 1-17, 2018
112018
Crafting adversarial example to bypass flow-&ML-based botnet detector via RL
J Wang, L Qixu, W Di, Y Dong, X Cui
Proceedings of the 24th international symposium on research in attacks …, 2021
102021
人工智能技术在安全漏洞领域的应用
孙鸿宇, 何远, 王基策, 董颖, 朱立鹏, 王鹤, 张玉清
Journal on Communication/Tongxin Xuebao 39 (8), 2018
62018
A novel approach to network security situation assessment based on attack confidence
D Liu, L Dong, S Lv, Y Dong, F He, C Wu, Y Zhang, H Ma
Network and System Security: 11th International Conference, NSS 2017 …, 2017
32017
Application research on network attacks and defenses with zachman framework
C Wu, Y Zhang, Y Dong
Network and System Security: 11th International Conference, NSS 2017 …, 2017
22017
第三方追踪的安全研究
张玉清, 武倩如, 刘奇旭, 董颖
通信学报 35 (9), 1-11, 2014
22014
Vulnerability exploitation for Joomla content management system
D Ying, Z Yuqing, YUE Hongzhou
Journal of University of Chinese Academy of Sciences 32 (6), 825, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–13