default search action
Cai Fu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Hongle Liu, Xiang Long:
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network. Comput. Secur. 139: 103570 (2024) - [j37]Shuai Jiang, Cai Fu, Shuai He, Jianqiang Lv, Lansheng Han, Hong Hu:
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection. IEEE Trans. Software Eng. 50(10): 2485-2497 (2024) - [c28]Shuai He, Cai Fu, Hong Hu, Jiahe Chen, Jianqiang Lv, Shuai Jiang:
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection. ICSE 2024: 172:1-172:12 - [c27]Xiaowei Guo, Cai Fu, Juan Chen, Hongle Liu, Lansheng Han, Wenjin Li:
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge. ISSTA 2024: 199-209 - [i8]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Chunjie Zhou:
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems. CoRR abs/2403.02616 (2024) - 2023
- [j36]Yuanhai Fan, Chuanhao Wan, Cai Fu, Lansheng Han, Hao Xu:
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs. Comput. Secur. 130: 103247 (2023) - [j35]Shengqing Zhang, Xiaoyan Zhai, Peng Yang, Jun Xia, Sheng Hu, Libo Zhou, Cai Fu:
Ecological health analysis of wetlands in the middle reaches of Yangtze River under changing environment. Int. J. Digit. Earth 16(1): 3125-3144 (2023) - [j34]Shuai He, Cai Fu, Guanyun Feng, Jianqiang Lv, Fengyang Deng:
Singular Value Manipulating: An Effective DRL-Based Adversarial Attack on Deep Convolutional Neural Network. Neural Process. Lett. 55(9): 12459-12480 (2023) - [j33]Jia Yang, Cai Fu, Fengyang Deng, Ming Wen, Xiaowei Guo, Chuanhao Wan:
Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding. ACM Trans. Softw. Eng. Methodol. 32(5): 115:1-115:40 (2023) - [c26]Ke Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu:
Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis. ISSREW 2023: 120-127 - [c25]Wenke Li, Feng Wu, Cai Fu, Fan Zhou:
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem. ASE 2023: 1604-1614 - [i7]Ke Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu:
Deciphering the Code: Distinguishing ChatGPT-Generated Code from Human-authored Code through Discriminative Feature Analysis and Dataset Optimization. CoRR abs/2306.14397 (2023) - [i6]Wenke Li, Feng Wu, Cai Fu, Fan Zhou:
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem. CoRR abs/2309.02894 (2023) - [i5]Haili Sun, Yan Huang, Lansheng Han, Cai Fu, Hongle Liu, Xiang Long:
MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network. CoRR abs/2311.02378 (2023) - 2022
- [j32]Shuai Jiang, Cai Fu, Yekui Qian, Shuai He, Jianqiang Lv, Lansheng Han:
IFAttn: Binary code similarity analysis based on interpretable features with attention. Comput. Secur. 120: 102804 (2022) - [j31]Jia Yang, Cai Fu, Xiao-Yang Liu, Anwar Walid:
Recommendations in Smart Devices Using Federated Tensor Learning. IEEE Internet Things J. 9(11): 8425-8437 (2022) - [j30]Fengyang Deng, Cai Fu, Yekui Qian, Jia Yang, Shuai He, Hao Xu:
Federated learning based multi-task feature fusion framework for code expressive semantic extraction. Softw. Pract. Exp. 52(8): 1849-1866 (2022) - [j29]Jia Yang, Cai Fu, Xiao-Yang Liu, Heng Yin, Pan Zhou:
Codee: A Tensor Embedding Scheme for Binary Code Search. IEEE Trans. Software Eng. 48(7): 2224-2244 (2022) - [j28]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu, Yekui Qian:
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system. Veh. Commun. 34: 100417 (2022) - 2021
- [j27]Jia Yang, Cai Fu, Hongwei Lu:
Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems. Inf. Sci. 564: 103-123 (2021) - [j26]Shuai Jiang, Hong Yao, Cai Fu, Yekui Qian, Lansheng Han:
Function-level obfuscation detection method based on Graph Convolutional Networks. J. Inf. Secur. Appl. 61: 102953 (2021) - [j25]Cai Fu, Zhaokang Ke, Yunhe Zhang, Xiwu Chen, Liqing Cao, Mingjun Yin:
The Impact of Search Engines on Virus Propagation. J. Circuits Syst. Comput. 30(13): 2150230:1-2150230:18 (2021) - [j24]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu:
Intrusion Detection System for IoT Heterogeneous Perceptual Network. Mob. Networks Appl. 26(4): 1461-1474 (2021) - [j23]Jing Wu, Juzhen Wang, Qimei Chen, Zenghui Yuan, Pan Zhou, Xiumin Wang, Cai Fu:
Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Netw. Sci. Eng. 8(2): 1873-1886 (2021) - [c24]Houxiang Fan, Binghui Wang, Pan Zhou, Ang Li, Zichuan Xu, Cai Fu, Hai Li, Yiran Chen:
Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs. HPCC/DSS/SmartCity/DependSys 2021: 933-940 - 2020
- [j22]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu:
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant. Comput. Networks 172: 107174 (2020) - [j21]Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu, Dezhi An:
Cooperative malicious network behavior recognition algorithm in E-commerce. Comput. Secur. 95: 101868 (2020) - [j20]Cai Fu, Zhao Yang, Xiao-Yang Liu, Jia Yang, Anwar Walid, Laurence T. Yang:
Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing. IEEE Trans. Comput. Soc. Syst. 7(1): 247-260 (2020) - [c23]Chenglong Yang, Cai Fu, Yekui Qian, Hong Yao, Guanyun Feng, Lansheng Han:
Deep Learning-Based Reverse Method of Binary Protocol. SPDE 2020: 606-624 - [i4]Houxiang Fan, Binghui Wang, Pan Zhou, Ang Li, Meng Pang, Zichuan Xu, Cai Fu, Hai Li, Yiran Chen:
Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs. CoRR abs/2009.00163 (2020) - [i3]Binghui Wang, Tianxiang Zhou, Minhua Lin, Pan Zhou, Ang Li, Meng Pang, Cai Fu, Hai Li, Yiran Chen:
Evasion Attacks to Graph Neural Networks via Influence Function. CoRR abs/2009.00203 (2020)
2010 – 2019
- 2019
- [j19]Lansheng Han, Man Zhou, Yekui Qian, Cai Fu, Deqing Zou:
An Optimized Static Propositional Function Model to Detect Software Vulnerability. IEEE Access 7: 143499-143510 (2019) - [j18]Lansheng Han, Man Zhou, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Targeting malware discrimination based on reversed association task. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j17]Cai Fu, Chenchen Peng, Xiao-Yang Liu, Laurence T. Yang, Jia Yang, Lansheng Han:
Search engine: The social relationship driving power of Internet of Things. Future Gener. Comput. Syst. 92: 972-986 (2019) - [j16]Cai Fu, Xiao-Yang Liu, Jia Yang, Laurence T. Yang, Shui Yu, Tianqing Zhu:
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks. IEEE Trans. Dependable Secur. Comput. 16(4): 693-710 (2019) - [c22]Youqiang Deng, Cai Fu, Yang Li:
CodeeGAN: Code Generation via Adversarial Training. DependSys 2019: 18-30 - [c21]Deliang Xu, Zewei Cen, Cai Fu, Tao Liu, Guohui Li, Lansheng Han, Zhaokang Ke:
A live migration strategy for virtual encryption card equipment. HP3C 2019: 106-112 - [c20]Qingfeng Huang, Xiaotao Huang, Cai Fu:
The Application Of Critical Thinking In C Programming Language Course. ICCSE 2019: 420-422 - [c19]Zhaokang Ke, Cai Fu, Liqing Cao, Mingjun Yin, Xiwu Chen, Yang Li:
Community Partition immunization strategy based on Search Engine. ISI 2019: 223 - 2018
- [c18]Haotian Zhou, Xiao-Yang Liu, Cai Fu, Chen Shang, Xinyi Chang:
Differentially Private Matrix Completion via Distributed Matrix Factorization. TrustCom/BigDataSE 2018: 1628-1631 - 2017
- [j15]Deliang Xu, Cai Fu, Guohui Li, Deqing Zou, Honghao Zhang, Xiao-Yang Liu:
Virtualization of the Encryption Card for Trust Access in Cloud Computing. IEEE Access 5: 20652-20667 (2017) - [j14]Dezhang Kong, Cai Fu, Jia Yang, Deliang Xu, Lansheng Han:
The Impact of the Collective Influence of Search Engines on Social Networks. IEEE Access 5: 24920-24930 (2017) - [j13]Min Li, Cai Fu, Xiao-Yang Liu, Jia Yang, Tianqing Zhu, Lansheng Han:
Evolutionary virus immune strategy for temporal networks based on community vitality. Future Gener. Comput. Syst. 74: 276-290 (2017) - [j12]Zili Xiong, Lansheng Han, Xingbo Xu, Cai Fu, Buyu Liu:
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory). 计算机科学 44(Z6): 326-332 (2017) - [c17]Cai Fu, Chenchen Peng, Xiao-Yang Liu:
Search engine drives the evolution of social networks. ACM TUR-C 2017: 49:1-49:5 - [c16]Lansheng Han, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu:
Malware Discrimination Based on Reversed Association Task. TrustCom/BigDataSE/ICESS 2017: 120-127 - [i2]Cai Fu, Chenchen Peng, Xiao-Yang Liu:
Search Engine Drives the Evolution of Social Networks. CoRR abs/1703.05922 (2017) - 2016
- [j11]Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. Int. J. Commun. Syst. 29(1): 155-169 (2016) - [j10]Tao Wang, Lansheng Han, Cai Fu, Deqing Zou, Ming Liu:
软件漏洞静态检测模型及检测框架 (Static Detection Model and Framework for Software Vulnerability). 计算机科学 43(5): 80-86 (2016) - [c15]Hong Yao, Cai Fu, Qingfeng Huang, Zhicun Fang, JieHua Zeng, Lansheng Han:
Communities Evolution Analysis Based on Events in Dynamic Complex Network. DASC/PiCom/DataCom/CyberSciTech 2016: 497-503 - 2015
- [j9]Nan Du, Lansheng Han, Cai Fu, Zhongke Zhang, Ming Liu:
基于相识度的恶意代码检测 (Detection of Malware Code Based on Acquaintance Degree). 计算机科学 42(1): 187-192 (2015) - [c14]Cai Fu, Li Min, Jia Yang, Deliang Xu, Xiaoyang Liu, Lansheng Han:
Evolutionary Virus Immune Strategy Based on Community Vitality. CIT/IUCC/DASC/PICom 2015: 1725-1732 - [c13]Jia Yang, Cai Fu, Deliang Xu, Lansheng Han, Xiao-Yang Liu:
Search Engine: A Hidden Power for Virus Propagation in Community Networks. CSCloud 2015: 87-92 - [c12]Changming Liu, Cai Fu, Deliang Xu, Lin Sun, Lansheng Han:
An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery. ICA3PP (1) 2015: 730-743 - [c11]Rui Ye, Cai Fu, Lansheng Han, Deliang Xu:
Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation. SKG 2015: 212-216 - 2014
- [c10]Cai Fu, Kang Zhang, Zhicun Fang, Lansheng Han, Jing Chen:
K-clique community detection based on union-find. CITS 2014: 1-5 - 2013
- [j8]Cai Fu, Qingfeng Huang, Lansheng Han, Li Shen, Xiaoyang Liu:
Virus propagation power of the dynamic network. EURASIP J. Wirel. Commun. Netw. 2013: 210 (2013) - [j7]Cai Fu, Min Li, Deqing Zou, Shuyan Qu, Lansheng Han, James Hyuk Park:
Community Vitality in Dynamic Temporal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c9]Cai Fu, Deliang Xu, Lansheng Han, Jingfang Xu, Zhicun Fang:
Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN. CSS 2013: 429-440 - [c8]Cai Fu, Yongquan Cui, Lansheng Han, Zhicun Fang:
Projection Pursuit Based Wormhole Detection in Ad Hoc Network. HPCC/EUC 2013: 1315-1322 - [c7]Ou Ruan, Cai Fu, Jing Zhou, Lansheng Han, Xiaoyang Liu:
Efficient Fair UC-Secure Two-Party Computation on Committed Inputs. TrustCom/ISPA/IUCC 2013: 544-551 - 2012
- [j6]Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia:
Task-based behavior detection of illegal codes. Math. Comput. Model. 55(1-2): 80-86 (2012) - 2011
- [j5]Cai Fu, Liu Ming, Chen Jing, Zhang Li, Xiao-Yang Liu:
A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks. Int. J. Comput. Intell. Syst. 4(5): 749-758 (2011) - [j4]Cai Fu, Xiang Gao, Ming Liu, Xiaoyang Liu, Lansheng Han, Jing Chen:
GRAP: Grey risk assessment based on projection in ad hoc networks. J. Parallel Distributed Comput. 71(9): 1249-1260 (2011) - [i1]Ou Ruan, Cai Fu, Guohua Cui:
An Efficient Protocol for the Commit-Prove-Fair-Open functionality. IACR Cryptol. ePrint Arch. 2011: 577 (2011) - 2010
- [j3]Peng Xu, Guohua Cui, Cai Fu, Xueming Tang:
A more efficient accountable authority IBE scheme under the DL assumption. Sci. China Inf. Sci. 53(3): 581-592 (2010) - [j2]Jing Chen, Shiguo Lian, Cai Fu, Ruiying Du:
A hybrid game model based on reputation for spectrum allocation in wireless networks. Comput. Commun. 33(14): 1623-1631 (2010) - [j1]Feng-Yu Lei, Guohua Cui, Cai Fu, Peng Xu, Jing Chen:
Secure Authentication Scheme based on IBE. J. Networks 5(9): 1106-1113 (2010) - [c6]Jihang Ye, Mengyao Liu, Cai Fu:
Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis. EUC 2010: 492-497 - [c5]Cai Fu, Jihang Ye, Li Zhang, Yunhe Zhang, Lansheng Han:
A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks. UIC/ATC Workshops 2010: 154-159
2000 – 2009
- 2009
- [c4]Xiaoyang Liu, Cai Fu, Jiandong Yang, Lansheng Han:
Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes. FCST 2009: 681-685 - [c3]Cai Fu, Fugui Tang, Yongquan Cui, Ming Liu, Bing Peng:
Grey Theory Based Nodes Risk Assessment in P2P Networks. ISPA 2009: 479-483 - [c2]Yunhe Zhang, Zhitang Li, Song Mei, Cai Fu:
Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN. MUE 2009: 505-510 - 2005
- [c1]Fan Hong, Liang Hong, Cai Fu:
Secure OLSR. AINA 2005: 713-718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint