Lei Pan
Lei Pan
Senior Lecturer in Cyber Security, School of Information Technology, Deakin University
Verified email at - Homepage
Cited by
Cited by
Cross-project transfer representation learning for vulnerable function discovery
G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague
IEEE Transactions on Industrial Informatics 14 (7), 3289-3297, 2018
A survey of Android malware detection with deep neural models
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Xiang
ACM Computing Surveys 53 (6), 126:1--126:36, 2020
Security analysis methods on Ethereum smart contract vulnerabilities: A survey
P Praitheeshan, L Pan, J Yu, J Liu, R Doss
arXiv:1908.08605, 2019
POSTER: Vulnerability discovery with function representation learning from unlabeled projects
G Lin, J Zhang, W Luo, L Pan, Y Xiang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377--391, 2022
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of Information Security and Applications 36, 90-100, 2017
Data-driven cyber security in perspective--intelligent traffic analysis
R Coulter, QL Han, L Pan, J Zhang, Y Xiang
IEEE Transactions on Cybernetics 50 (7), 3081-3093, 2020
Machine learning based cyber attacks targeting on controlled information: A survey
Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang
ACM Computing Surveys 54 (7), 139:1--139:36, 2021
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
International Journal of Computers and Applications 40 (4), 202-213, 2018
Software vulnerability discovery via learning multi-domain knowledge bases
G Lin, J Zhang, W Luo, L Pan, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2019
Intelligent agents defending for an IoT world: A review
R Coulter, L Pan
Computers & Security 73, 439-458, 2018
Protean authentication scheme--a time-bound dynamic keygen authentication technique for IoT edge nodes in outdoor deployments
S Sathyadevan, K Achuthan, R Doss, L Pan
IEEE Access 7, 92419-92435, 2019
Visualization of big data security: A case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
Digital Communications and Networks 3 (4), 250-259, 2017
A scalable and efficient PKI based authentication protocol for VANETs
M Asghar, RRM Doss, L Pan
Proceedings of the 2018 28th International Telecommunication Networks and …, 2018
Code analysis for intelligent cyber systems: A data-driven approach
R Coulter, QL Han, L Pan, J Zhang, Y Xiang
Information Sciences 524 (July), 46--58, 2020
A3CM: Automatic capability annotation for Android malware
J Qiu, J Zhang, W Luo, L Pan, S Nepal, Y Wang, Y Xiang
IEEE Access 7, 147156-147168, 2019
Domain-adversarial graph neural networks for text classification
M Wu, S Pan, X Zhu, C Zhou, L Pan
Proceedings of the 19th IEEE International Conference on Data Mining (ICDM'19), 2019
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
Concurrency and Computation: Practice and Experience 30 (5), e4181, 2018
Software vulnerability analysis and discovery using deep learning techniques: A survey
P Zeng, G Lin, L Pan, Y Tai, J Zhang
IEEE Access 8, 197158--197172, 2020
Reproducibility of digital evidence in forensic investigations
L Pan, L Batten
Proceedings of the 5th Annual Digital Forensic Research Workshop (DFRWS 2005 …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20