Zhiyang Fang

ORCID: 0000-0001-6502-8053
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Software Engineering Research
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Software Reliability and Analysis Research
  • Web Application Security Vulnerabilities
  • Software System Performance and Reliability
  • Disaster Management and Resilience
  • Internet Traffic Analysis and Secure E-voting
  • Software Testing and Debugging Techniques
  • Mobile and Web Applications
  • RNA and protein synthesis mechanisms
  • Product Development and Customization
  • Imbalanced Data Classification Techniques
  • Stock Market Forecasting Methods
  • Digital and Cyber Forensics
  • Distributed systems and fault tolerance
  • Evacuation and Crowd Dynamics
  • Educational Games and Gamification
  • Manufacturing Process and Optimization
  • Blockchain Technology Applications and Security
  • Genomics and Phylogenetic Studies
  • Quality Function Deployment in Product Design
  • Machine Learning in Bioinformatics

Sichuan University
2007-2024

Chengdu University
2018-2019

To reduce the risks of malicious software, malware detection methods using machine learning have received tremendous attention in recent years. Most conventional are based on supervised learning, which relies static features with definite labels. However, studies shown models vulnerable to deliberate attacks. This work tends expose and demonstrate weakness these models. A DQEAF framework reinforcement evade anti-malware engines is presented. trains an AI agent through a neural network by...

10.1109/access.2019.2908033 article EN cc-by-nc-nd IEEE Access 2019-01-01

Bitcoin, one of the major cryptocurrencies, presents great opportunities and challenges with its tremendous potential returns accompanying high risks. The volatility Bitcoin complex factors affecting them make study effective price forecasting methods practical importance to financial investors researchers worldwide. In this paper, we propose a novel approach called MRC-LSTM, which combines Multi-scale Residual Convolutional neural network (MRC) Long Short-Term Memory (LSTM) implement...

10.1109/ijcnn52387.2021.9534453 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2021-07-18

Due to the completely open-source nature of Android, exploitable vulnerability malware attacks is increasing. To stay ahead other similar review work attempting deal with serious security problem Android environment, this not only summarizes approaches in classification phase but also lays emphasis on feature selection algorithm and presents some areas neglected previous works field detection, like limitations commonly applied datasets machine learning-based models. In paper, OS selection,...

10.1080/08839514.2021.2007327 article EN cc-by Applied Artificial Intelligence 2021-12-14

With the growing popularity of information digitization and advancement executable file detection technology, PDF has emerged as an important carrier malicious documents. Despite improved efficacy machine learning-based classifiers in detecting malware, adversaries have proposed a variety countermeasures to evade detection, such generating adversarial examples. In contrast other peer works attempting expose vulnerability models, this work addresses deficiencies existing research by pointing...

10.1155/2022/7218800 article EN cc-by Security and Communication Networks 2022-04-29

Source code vulnerabilities are one of the significant threats to software security. Existing deep learning-based detection methods have proven their effectiveness. However, most them extract information on a single intermediate representation (IRC), which often fails multiple hidden in fully, significantly limiting performance. To address this problem, we propose VulMPFF, vulnerability method that fuses features under perspectives. It extracts IRC from three perspectives: sequence, lexical...

10.1049/2024/4313185 article EN cc-by IET Information Security 2024-03-22

Vulnerability detection on source code can prevent the risk of cyber-attacks as early possible. However, lacking fine-grained analysis has rendered existing solutions still suffering from low performance; besides, explosive growth open-source projects dramatically increased complexity and diversity code. This paper presents HGVul, a vulnerability method based heterogeneous intermediate representation The key proposed is handling source-level (SIR) without expert knowledge. It first extracts...

10.1155/2022/1919907 article EN Security and Communication Networks 2022-04-11

With the large-scale development of open source software, software plagiarism has become a serious threat to industry and intellectual property. As latest technique detection, dynamic birthmark attracted much attention in recent years. Most existing birthmarks focus on how resist obfuscation techniques such as compiler optimizations strong obfuscations implemented tools. However, they pay little packers, especially encryption packer which is commonly used protection well plagiarism. When...

10.1093/comjnl/bxy055 article EN The Computer Journal 2018-05-30

Due to the completely open-source nature of Android, exploitable vulnerability malware attacks is increasing. Machine learning has led a great evolution in Android detection recent years, which typically applied classification phase. Applying neural networks feature selection phase another topic worth investigating, while correlation between features could be ignored some traditional ranking-based algorithms. And it time-consuming for exploring all possible valid subsets when processing...

10.2139/ssrn.4067267 article EN SSRN Electronic Journal 2022-01-01

Third-party library (TPL) reuse may introduce vulnerable or malicious code and expose the software, which exposes them to potential risks. Thus, it is essential identify third-party dependencies take immediate corrective action fix critical vulnerabilities when a damaged reusable component found reported. However, most of existing methods only rely on syntactic features, results in low recognition accuracy significantly discounts detection performance by obfuscation techniques. In addition,...

10.3390/app13010413 article EN cc-by Applied Sciences 2022-12-28

Engineering equipment can efficiently assist humans in completing engineering projects and reduce work intensity. As the difficulty scope of operations increase, higher requirements are placed on function integration. In product design, excessive user design constraints lead to discrete results, difficult converge. Under multi-functionality high integration constraints, traditional mapping sub-functions structures one by results overabundant mappings, discrete, redundant after mapping,...

10.1080/09544828.2023.2291286 article EN Journal of Engineering Design 2023-12-12

Abstract China is a country prone to geological hazards, and it has become especially urgent improve citizens’ awareness of earthquake safety prevention escape ability in the effort protect ourselves from disaster. However, effect current popular science education, there still significant lack skills masses emergency risk avoidance self-rescue. Based on Unity3D game engine, we developed an EES (Earthquake Escape Simulator) disaster knowledge system, training platform for primary secondary...

10.1088/1742-6596/2333/1/012002 article EN Journal of Physics Conference Series 2022-08-01

Due to the completely open-source nature of Android, exploitable vulnerability malware attacks is increasing. Machine learning, leading a great evolution in Android detection recent years, typically applied classification phase. Since correlation between features ignored some traditional ranking-based feature selection algorithms, applying wrapper-based models topic worth investigating. Though considering features, approaches are time-consuming for exploring all possible valid subsets when...

10.48550/arxiv.2203.02719 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Recently, many machine learning methods had been proposed to detect malware, and they were proved have a better performance on polymorphic malware families. However, it has shown that are vulnerable mancraft adversarial examples. This paper proposes deep reinforcement framework for generating examples automatically. The method includes extracting bytes from benign executable files, appending them the end of or inserting into binary. model is evaluated with state-of-the-art classifier...

10.1109/iip57348.2022.00067 article EN 2022-10-01
Coming Soon ...