Guanjun Lin
Guanjun Lin
Verified email at
Cited by
Cited by
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Statistical twitter spam detection demystified: performance, stability and scalability
G Lin, N Sun, S Nepal, J Zhang, Y Xiang, H Hassan
IEEE access 5, 11142-11154, 2017
Software vulnerability detection using deep neural networks: a survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE 108 (10), 1825-1848, 2020
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
Software vulnerability discovery via learning multi-domain knowledge bases
G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2019
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation
S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2020
Near real-time twitter spam detection with machine learning techniques
N Sun, G Lin, J Qiu, P Rimba
International Journal of Computers and Applications, 1-11, 2020
Deep learning-based vulnerable function detection: A benchmark
G Lin, W Xiao, J Zhang, Y Xiang
International Conference on Information and Communications Security, 219-232, 2019
Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform
L Zhang, G Lin, B Gao, Z Qin, Y Tai, J Zhang
Wireless Communications and Mobile Computing 2020, 2020
Software Vulnerability Analysis and Discovery using Deep Learning Techniques: A Survey
P Zeng, G Lin, L Pan, Y Tai, J Zhang
IEEE Access, 2020
Cyber Resilience in Healthcare Digital Twin on Lung Cancer
J Zhang, L Li, G Lin, D Fang, Y Tai, J Huang
IEEE Access 8, 201900-201913, 2020
The Application of Neural Models for Software
G Lin
Swinburne University of Technology, 2019
The system can't perform the operation now. Try again later.
Articles 1–13