default search action
Weifeng Li 0002
Person information
- affiliation: University of Georgia, Management Information Systems, Athens, Georgia
- affiliation: University of Arizona, Department of Management Information Systems, Aritificial Intelligence Lab, Tucson, AZ, USA
Other persons with the same name
- Weifeng Li — disambiguation page
- Weifeng Li 0001 — Tsinghua University, Department of Electronic Engineering/Graduate School at Shenzhen, China (and 3 more)
- Weifeng Li 0003 — University of Hong Kong, Department of Urban Planning and Design, Hong Kong (and 1 more)
- Weifeng Li 0004 — Nanjing University, School of Electronic Science and Engineering, China
- Weifeng Li 0005 — North Carolina State University, Electrical and Computer Engineering Department, Raleigh, NC, USA
- Weifeng Li 0006 — Chinese Academy of Sciences, State Key Laboratory of Urban and Regional Ecology, Research Center for Eco-Environmental Sciences, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Jack Hughes, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li, Ericsson Santana Marin:
The Art of Cybercrime Community Research. ACM Comput. Surv. 56(6): 155:1-155:26 (2024) - [j6]Yidong Chai, Yi Liu, Weifeng Li, Bin Zhu, Hongyan Liu, Yuanchun Jiang:
An interpretable wide and deep model for online disinformation detection. Expert Syst. Appl. 237(Part B): 121588 (2024) - [i4]Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. CoRR abs/2402.02600 (2024) - 2023
- [c20]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM 2023: 101-109 - [c19]Brian Etter, James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach. ICDM (Workshops) 2023: 1313-1321 - [c18]Ruicheng Liang, Yidong Chai, Weifeng Li, Michael Chau, Yuanchun Jiang, Yezheng Liu:
Assessing and Enhancing Adversarial Robustness for Review-Based Recommender System: A Design Science Approach. PACIS 2023: 211 - 2022
- [j5]Weifeng Li, Yidong Chai:
Assessing and Enhancing Adversarial Robustness of Predictive Analytics: An Empirically Tested Design Framework. J. Manag. Inf. Syst. 39(2): 542-572 (2022) - [j4]Yidong Chai, Yonghang Zhou, Weifeng Li, Yuanchun Jiang:
An Explainable Multi-Modal Hierarchical Attention Model for Developing Phishing Threat Intelligence. IEEE Trans. Dependable Secur. Comput. 19(2): 790-803 (2022) - [j3]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. ACM Trans. Manag. Inf. Syst. 13(2): 21:1-21:21 (2022) - [c17]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. ICDM (Workshops) 2022: 1-8 - [c16]MohammadReza Ebrahimi, Weifeng Li, Yidong Chai, Jason Pacheco, Hsinchun Chen:
An Adversarial Reinforcement Learning Framework for Robust Machine Learning-based Malware Detection. ICDM (Workshops) 2022: 567-576 - [i3]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence. CoRR abs/2201.02799 (2022) - [i2]James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen:
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants. CoRR abs/2210.15429 (2022) - 2021
- [c15]Zhiyuan Ding, Victor A. Benjamin, Weifeng Li, Xueyan Yin:
Exploring Differences Among Darknet and Surface Internet Hacking Communities. ISI 2021: 1-3 - [c14]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. ISI 2021: 1-6 - [c13]Mohammadreza Ebrahimi, Jason Pacheco, Weifeng Li, James Lee Hu, Hsinchun Chen:
Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces. SP (Workshops) 2021: 85-91 - [i1]Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach. CoRR abs/2111.09415 (2021) - 2020
- [c12]Fang Yu Lin, Yizhi Liu, Mohammadreza Ebrahimi, Zara Ahmad-Post, James Lee Hu, Jingyu Xin, Sagar Samtani, Weifeng Li, Hsinchun Chen:
Linking Personally Identifiable Information from the Dark Web to the Surface Web: A Deep Entity Resolution Approach. ICDM (Workshops) 2020: 488-495 - [c11]Bingyan Du, Pranay Singhal, Victor A. Benjamin, Weifeng Li:
Detecting Cyber-Adversarial Videos in Traditional Social media. ISI 2020: 1-3 - [c10]Yizhi Liu, Fang Yu Lin, Zara Ahmad-Post, Mohammadreza Ebrahimi, Ning Zhang, James Lee Hu, Jingyu Xin, Weifeng Li, Hsinchun Chen:
Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. ISI 2020: 1-6 - [c9]Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen:
A Generative Adversarial Learning Framework for Breaking Text-Based CAPTCHA in the Dark Web. ISI 2020: 1-6
2010 – 2019
- 2019
- [c8]Yidong Chai, Weifeng Li:
Towards Deep Learning Interpretability: A Topic Modeling Approach. ICIS 2019 - 2018
- [j2]Weifeng Li, Junming Yin, Hsinchun Chen:
Supervised Topic Modeling Using Hierarchical Dirichlet Process-Based Inverse Regression: Experiments on E-Commerce Applications. IEEE Trans. Knowl. Data Eng. 30(6): 1192-1205 (2018) - 2016
- [j1]Weifeng Li, Hsinchun Chen, Jay F. Nunamaker Jr.:
Identifying and Profiling Key Sellers in Cyber Carding Community: AZSecure Text Mining System. J. Manag. Inf. Syst. 33(4): 1059-1086 (2016) - [c7]Weifeng Li, Junming Yin, Hsinchun Chen:
Identifying High Quality Carding Services in Underground Economy using Nonparametric Supervised Topic Model. ICIS 2016 - [c6]Zhen Fang, Xinyi Zhao, Qiang Wei, Guoqing Chen, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen:
Exploring key hackers and cybersecurity threats in Chinese hacker communities. ISI 2016: 13-18 - [c5]Kangzhi Zhao, Yong Zhang, Chunxiao Xing, Weifeng Li, Hsinchun Chen:
Chinese underground market jargon analysis based on unsupervised learning. ISI 2016: 97-102 - [c4]Weifeng Li, Junming Yin, Hsinchun Chen:
Targeting key data breach services in underground supply chain. ISI 2016: 322-324 - 2015
- [c3]Victor A. Benjamin, Weifeng Li, Thomas Holt, Hsinchun Chen:
Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops. ISI 2015: 85-90 - 2014
- [c2]Ahmed Abbasi, Weifeng Li, Victor A. Benjamin, Shiyu Hu, Hsinchun Chen:
Descriptive Analytics: Examining Expert Hackers in Web Forums. JISIC 2014: 56-63 - [c1]Weifeng Li, Hsinchun Chen:
Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis. JISIC 2014: 64-67
Coauthor Index
aka: MohammadReza Ebrahimi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint