default search action
Peian Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Yiren Chen, Mengjiao Cui, Ding Wang, Yiyang Cao, Peian Yang, Bo Jiang, Zhigang Lu, Baoxu Liu:
A survey of large language models for cyber threat detection. Comput. Secur. 145: 104016 (2024) - [c11]Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. CSCWD 2024: 1687-1694 - 2023
- [c10]Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu:
Simplified-Xception: A New Way to Speed Up Malicious Code Classification. CSCWD 2023: 582-587 - [c9]Yue Ma, Zhengwei Jiang, Jun Jiang, Kai Zhang, Zhiting Ling, Peian Yang:
Phishsifter: An Enhanced Phishing Pages Detection Method Based on the Relevance of Content and Domain. CSCWD 2023: 909-916 - [c8]Chunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. TrustCom 2023: 531-538 - 2022
- [j3]Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecur. 5(1): 3 (2022) - [j2]Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang, Ning Li:
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecur. 5(1): 8 (2022) - [c7]Xuren Wang, Runshi Liu, Jie Yang, Rong Chen, Zhiting Ling, Peian Yang, Kai Zhang:
Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering. CSCWD 2022: 406-413 - [c6]Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. SciSec 2022: 522-538 - [c5]Xuren Wang, Rong Chen, Binghua Song, Jungang An, Jun Jiang, Jian Wang, Peian Yang:
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1796-1803 - 2021
- [c4]Yali Luo, Shengqin Ao, Ning Luo, Changxin Su, Peian Yang, Zhengwei Jiang:
Extracting Threat Intelligence Relations Using Distant Supervision and Neural Networks. IFIP Int. Conf. Digital Forensics 2021: 193-211 - [c3]Xuren Wang, Mengbo Xiong, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong:
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction. SEKE 2021: 79-85 - [c2]Yali Luo, Zhengwei Jiang, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang:
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce. WCNC 2021: 1-6 - 2020
- [c1]Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. ISCC 2020: 1-7
2010 – 2019
- 2018
- [j1]Peian Yang, Yang Wu, Liya Su, Baoxu Liu:
网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace). 计算机科学 45(6): 9-18 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint