scispace - formally typeset
F

Fang Ying

Researcher at National University of Defense Technology

Publications -  4
Citations -  59

Fang Ying is an academic researcher from National University of Defense Technology. The author has contributed to research in topics: Malware & Feature selection. The author has an hindex of 4, co-authored 4 publications receiving 40 citations.

Papers
More filters
Journal ArticleDOI

A survey of malware behavior description and analysis

TL;DR: This paper conducts a survey on malware behavior description and analysis considering three aspects: malware behavior described, behavior analysis methods, and visualization techniques.
Book ChapterDOI

A New Malware Classification Approach Based on Malware Dynamic Analysis

TL;DR: The experimental results demonstrate that the ensemble learning based dynamic malware classification approach can classify malware variants in high F1-score while imposing low classification time in datasets of different scales.
Patent

Image matching-based malicious code detection method

TL;DR: Zhang et al. as mentioned in this paper proposed an image matching-based malicious code detection method, which comprises the steps of S1, obtaining training samples corresponding to malicious codes of different family categories, converting the training samples into grayscale images and extracting corresponding image texture features; S2, converting to-be-detected malicious codes into coarse-to-fine images and matching the image textures extracted in the step S2 with the reference sample set corresponding to each family category.
Patent

Multi-dimension behavior characteristic-based malicious code classification method

TL;DR: In this article, a multi-dimensional behavior characteristic-based malicious code classification method is proposed, which comprises the steps of S1, obtaining behavior data of a malicious code; S2, calculating a time difference of two adjacent system function calls according to a function call sequence, and constructing a time-difference information table of the system function call; S3, extracting frequency information of the System Function Call (SFC) names; S4, extracting behavior classification frequency information; S5, performing weighted calculation and normalized processing on the time difference information table, the frequency information