Author of the publication

FSSRE: Fusing Semantic Feature and Syntactic Dependencies Feature for threat intelligence Relation Extraction.

, , , , , , , and . SEKE, page 79-85. KSI Research Inc., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ALT-Based Route Planning in Dynamic Time-Dependent Road Networks., , , and . MLMI, page 35-39. ACM, (2019)Improved Secure Lightweight RFID Authentication Protocol., , , , , and . MLMI, page 127-132. ACM, (2020)A Framework for Document-level Cybersecurity Event Extraction from Open Source Data., , , , , , and . CSCWD, page 422-427. IEEE, (2021)DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat Intelligence., , , , , , , , and . TrustCom, page 1842-1848. IEEE, (2020)Towards Comprehensive Detection of DNS Tunnels., , , , , and . ISCC, page 1-7. IEEE, (2020)Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests., , , , , and . CSCWD, page 391-396. IEEE, (2021)Attack Detection by Rough Set Theory in Recommendation System., , and . GrC, page 692-695. IEEE Computer Society, (2010)Towards Network Anomaly Detection Using Graph Embedding., , , , , and . ICCS (4), volume 12140 of Lecture Notes in Computer Science, page 156-169. Springer, (2020)A Weak Coupling of Semi-Supervised Learning with Generative Adversarial Networks for Malware Classification., , , , and . ICPR, page 3775-3782. IEEE, (2020)TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*., , , , , , , and . COMPSAC, page 272-279. IEEE, (2022)