default search action
Xuren Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]HuanZhou Yue, Xuren Wang, Rong Chen, Zhengwei Jiang, Yuxia Fu, Jun Jiang:
HRTC: A Triplet Joint Extraction Model Based on Cyber Threat Intelligence. KSEM (5) 2024: 214-223 - 2023
- [c33]Xinshuai Zhu, Songheng He, Xuren Wang, Chang Gao, Yushi Wang, Peian Yang, Yuxia Fu:
Simplified-Xception: A New Way to Speed Up Malicious Code Classification. CSCWD 2023: 582-587 - [c32]Chunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. TrustCom 2023: 531-538 - 2022
- [j3]Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecur. 5(1): 3 (2022) - [j2]Jian Liu, Junjie Yan, Jun Jiang, Yitong He, Xuren Wang, Zhengwei Jiang, Peian Yang, Ning Li:
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecur. 5(1): 8 (2022) - [c31]Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng:
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*. COMPSAC 2022: 272-279 - [c30]Xuren Wang, Runshi Liu, Jie Yang, Rong Chen, Zhiting Ling, Peian Yang, Kai Zhang:
Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering. CSCWD 2022: 406-413 - [c29]Xuren Wang, Songheng He, Zihan Xiong, Xinxin Wei, Zhengwei Jiang, Sihan Chen, Jun Jiang:
APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field. CSCWD 2022: 1233-1238 - [c28]Binghua Song, Rong Chen, Baoxu Liu, Zhengwei Jiang, Xuren Wang:
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. CSCWD 2022: 1353-1359 - [c27]Jian Liu, Junjie Yan, Zhengwei Jiang, Xuren Wang, Jun Jiang:
A Graph Learning Approach with Audit Records for Advanced Attack Investigation. GLOBECOM 2022: 897-902 - [c26]Binghua Song, Rong Chen, Baoxu Liu, Zhengwei Jiang, Xuren Wang:
Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence. ICCS (4) 2022: 17-30 - [c25]Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. SciSec 2022: 522-538 - [c24]Xuren Wang, Rong Chen, Binghua Song, Jungang An, Jun Jiang, Jian Wang, Peian Yang:
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation Networks Based on Multi-Head Relational Graph Attention. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1796-1803 - 2021
- [c23]Xuren Wang, Rong Chen, Binghua Song, Jie Yang, Zhengwei Jiang, Xiaoqing Zhang, Xiaomeng Li, Shengqin Ao:
A Method for Extracting Unstructured Threat Intelligence Based on Dictionary Template and Reinforcement Learning. CSCWD 2021: 262-267 - [c22]Shengqin Ao, Yitong He, Ning Luo, Xuren Wang, Zhengwei Jiang, Jun Jiang:
Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests. CSCWD 2021: 391-396 - [c21]Ning Luo, Xiangyu Du, Yitong He, Jun Jiang, Xuren Wang, Zhengwei Jiang, Kai Zhang:
A Framework for Document-level Cybersecurity Event Extraction from Open Source Data. CSCWD 2021: 422-427 - [c20]Zijing Fan, Chao Yuan, Liling Xin, Xuren Wang, Zhengwei Jiang, Qiuyun Wang:
HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest. CSCWD 2021: 1141-1147 - [c19]Zijian Jia, Yepeng Yao, Qiuyun Wang, Xuren Wang, Baoxu Liu, Zhengwei Jiang:
Trojan Traffic Detection Based on Meta-learning. ICCS (2) 2021: 167-180 - [c18]Xuren Wang, Mengbo Xiong, Famei He, Peian Yang, Binghua Song, Jun Jiang, Zhengwei Jiang, Zihan Xiong:
FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction. SEKE 2021: 79-85 - [c17]Yali Luo, Zhengwei Jiang, Jun Jiang, Peian Yang, Xuren Wang, Kai Zhang:
CAN: Complementary Attention Network for Aspect Level Sentiment Classification in Social E-Commerce. WCNC 2021: 1-6 - 2020
- [j1]Fangli Ren, Zhengwei Jiang, Xuren Wang, Jian Liu:
A DGA domain names detection modeling method based on integrating an attention mechanism and deep neural network. Cybersecur. 3(1): 4 (2020) - [c16]Xuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang:
Research on Database Anomaly Access Detection Based on User Profile Construction. FCS 2020: 388-399 - [c15]Qingsai Xiao, Jian Liu, Qiuyun Wang, Zhengwei Jiang, Xuren Wang, Yepeng Yao:
Towards Network Anomaly Detection Using Graph Embedding. ICCS (4) 2020: 156-169 - [c14]Shuwei Wang, Qiuyun Wang, Zhengwei Jiang, Xuren Wang, Rongqi Jing:
A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification. ICPR 2020: 3775-3782 - [c13]Meng Luo, Qiuyun Wang, Yepeng Yao, Xuren Wang, Peian Yang, Zhengwei Jiang:
Towards Comprehensive Detection of DNS Tunnels. ISCC 2020: 1-7 - [c12]Mengbo Xiong, Huizhen Ma, Zhou Fang, Dong Wang, Qiuyun Wang, Xuren Wang:
Bi-LSTM: Finding Network Anomaly Based on Feature Grouping Clustering. MLMI 2020: 88-94 - [c11]Famei He, Zhou Fang, Dong Wang, Qiuyun Wang, Yueyuan Hao, Xuren Wang:
Improved Secure Lightweight RFID Authentication Protocol. MLMI 2020: 127-132 - [c10]Xuren Wang, Zihan Xiong, Xiangyu Du, Jun Jiang, Zhengwei Jiang, Mengbo Xiong:
NER in Threat Intelligence Domain with TSFL. NLPCC (1) 2020: 157-169 - [c9]Xuren Wang, Jie Yang, Qiuyun Wang, Changxin Su:
Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning. SEKE 2020: 572-576 - [c8]Xuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong:
Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCN. TrustCom 2020: 584-591 - [c7]Xuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang:
DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence. TrustCom 2020: 1842-1848
2010 – 2019
- 2019
- [c6]Famei He, Yina Xu, Xuren Wang, Anran Feng:
ALT-Based Route Planning in Dynamic Time-Dependent Road Networks. MLMI 2019: 35-39 - 2012
- [c5]Xiangyang Huang, Cuihuan Du, Yan Peng, Xuren Wang, Jie Liu:
Goal-oriented action planning in partially observable stochastic domains. CCIS 2012: 1381-1385 - 2010
- [c4]Famei He, Xuren Wang, Baoxu Liu:
Attack Detection by Rough Set Theory in Recommendation System. GrC 2010: 692-695
2000 – 2009
- 2007
- [c3]Xuren Wang, Famei He, Lizhen Liu:
Application of Rough Set Theory to Intrusion Detection System. GrC 2007: 562-565 - 2006
- [c2]Xuren Wang, Famei He, Rongsheng Xu:
Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework. CIMCA/IAWTIC 2006: 24 - 2004
- [c1]Xuren Wang, Rongsheng Xu, Wansen Wang:
Rough Set Theory: Application in Electronic Commerce Data Mining. Web Intelligence 2004: 541-544
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint