·Paper Publications
- [31] 吕建强,Lansheng Han,李明,江帅,何帅.Fu Cai.Xgadget:基于动静结合的二进制 Gadget 搜索.[期刊].计算机工程与应用(CCF T2),4541,(9):299-308
- [32] 佘庚达,吕建强,岑泽威.Fu Cai.基于适应度和输入约束模型的内核驱动漏洞挖掘.[期刊].计算机应用研究(CCF T3),4510,(7):2151-2156
- [33] 冯冠云,Lansheng Han,吕建强.Fu Cai.基于操作注意力和数据增强的内部威胁检测.[期刊].网络与信息安全学报(CCF T2),4507,(3):102-112
- [34] Jiang,Shuai,Han,Lansheng,Lv,Jianqiang,He,Shuai.Qian,Yekui,Fu,Cai.IFAttn: Binary code similarity analysis based on interpretable features with attention.[期刊].Computer Security, Elsevier(CCF T2),4480,(102804):1-17
- [35] Hong,Fan,Hong,Chen,Jing,Hong,Liang.Fu,Cai.Bridge nodes based secure OLSR.[会议].2005 International Conference on Wireless Communications, Networking and Mobile Computing,3835,710-713
- [36] Liu,Xiaoyang,Han,LanSheng,Yang,Jiandong.Fu,Cai.Grey model-enhanced risk assessment and prediction for P2P nodes.[会议].4th International Conference on Frontier of Computer Science and Technology,3981,681-685
- [37] Fu,Fu,Cai,Chu,Huang.Fu,Cai,Cai.A risk assessment method based on grey relational projection in ad hoc networks.[会议].1st International Conference on Multimedia Information Networking and Security,3981,370-373
- [38] Ye,Jihang,Fu,Cai,Liu;,Mengyao.Trusted risk evaluation and attribute analysis in ad-hoc networks security mechanism based on projection pursuit principal component analysis.[会议].IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,4017,492-497
- [39] Fu,Cai,Han,LanSheng,Yunhe,Zhang;,Li,Ye;,Jihang.Cai,Fu,Cai.A dynamic risk assessment framework using principle component analysis with projection pursuit in ad-hoc networks.[会议].2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing(Q4),4017,154-159
- [40] Cai,Fu,Cai,Yunhe,Zhang,Li,Ye,Jihang.Cai,Fu.A principal component analysis and risk assessment framework based on projection pursuit in ad hoc networks.[会议].2010 3rd International Conference on Biomedical Engineering and Informatics(Q1),4017,2721-2725