Dr. Saihua Cai

IEEE/ACM/CCF Member, Lecturer, School of Computer Science and Communication Engineering, Jiangsu University.

Saihua received his M.Eng degree in School of Computer Science and Communication Engineering from Jiangsu University and Ph.D. degree in College of Information and Electrical Engineering from China Agricultural University. Currently, he is a lecture at the School of Computer Science and Communication Engineering, Jiangsu University, China.

He has more than 80 publications in journals and proceedings, including ACM Transactions on Privacy and Security (TOPS), IEEE Transactions on Reliability (TRel), Information Sciences, Computers & Security (COSE), The Computer Journal, Information and Software Technology (IST), Journal of Systems & Software (JSS), IET Software, Journal of Software: Evolution and Process (JSEP), Science of Computer Programming (SCP), Information Processing and Management (IPM), Knowledge-Based Systems (KBS), Expert Systems with Applications (ESWA), Future Generation Computer Systems (FGCS), Applied Intelligence (APIN), Neural Computing & Applications (NCA), International Journal of Software Engineering and Knowledge Engineering (IJSEKE), Frontiers of Information Technology & Electronic Engineering (FITEE), Journal of Logical and Algebraic Methods in Programming (JLAMP), China Communications, Tsinghua Science and Technology, ASE, ISSRE, SANER, ISC, QRS, TrustCom, etc.

He has served as the program committee member of APSEC 2023 (SRC track), and has served as the reviewer for many journals such as IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Systems, Man and Cybernetics: Systems (TSMC), IEEE Transactions on Network and Service Management (TNSM), IEEE Transactions on Sustainable Computing (TSUSC), IEEE Transactions on Intelligent Transportation Systems (TITS), Pattern Recognition (PR), Information Sciences, COSE, Journal of Computer Science and Technology (JCST), Machine Learning, The Computer Journal, IET Software, Knowledge and Information Systems (KAIS), KBS, ESWA, EAAI, IJIS, APIN, NCA, Computers and Electronics in Agriculture, etc. He is a member of the IEEE, the ACM and the China Computer Federation (CCF).

His current research interests include: 1) Malicious Traffic Detection; 2) Network Intrusion Detection; 3) Vulnerability Detection; 4) Software Testing; 5) Outlier Detection.

I am looking for highly motivated MPhil students with strong background in Cyberspace Security, Computer Science, Artificial Intelligence, Software Engineering, and Programming. Undergraduate students who are interested in my research areas are also warmly welcome to join us. Please feel free to contact me via email caisaih@ujs.edu.cn.

News

  • [2024.06.01]. Our paper "iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks" has been accepted by Science of Computer Programming.
  • [2024.05.31]. Our paper "TR-Fuzz: A Syntax Valid Tool for Fuzzing C Compilers" has been accepted by Science of Computer Programming.
  • [2024.05.08]. Our paper "FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling" has been accepted by the 24th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2024).
  • [2024.05.08]. Our paper "JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers" has been accepted by the 24th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2024).
  • [2024.04.03]. Our paper "A Novel Defect Prediction Method Based on Semantic Feature Enhancement" has been accepted by Journal of Software: Evolution and Process.
  • [2024.03.20]. Our paper "Hybrid Semantics-based Vulnerability Detection Incorporating a Temporal Convolutional Network and Self-attention Mechanism" has been accepted by Information and Software Technology.
  • [2024.03.19]. Our paper "CD-BTMSE: A Concept Drift Detection Model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble Learning" has been accepted by Knowledge-Based Systems.
  • [2024.03.09]. Our paper "MIT-FRNet: Modality-Invariant Temporal Representation Learning-based Feature Reconstruction Network for Missing Modalities" has been accepted by Expert Systems With Applications.
  • [2024.01.12]. Our paper "Software Defect Prediction Approach based on A Diversity Ensemble Combined with Neural Network" has been accepted by IEEE Transactions on Reliability.
  • [2024.01.08]. Our paper "SCVD-SA: A Smart Contract Vulnerability Detection Method based on Hybrid Deep Learning Model and Self-attention Mechanism" has been accepted by the 31st IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2024).
  • [2023.12.14]. 我们的文章 "一种聚类分析驱动种子调度的模糊测试方法" 被 软件学报 录用.
  • [2023.12.13]. 我们的文章 "基于形式化方法的区块链系统漏洞检测模型" 被 软件学报 录用.
  • [2023.10.31]. Our paper "A Malicious Network Traffic Detection Model Based on Bidirectional Temporal Convolutional Network with Multi-Head Self-Attention Mechanism" has been accepted by Computers & Security.
  • [2023.09.21]. Our paper "CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism" has been accepted by the 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023).
  • [2023.09.12]. 我们的文章 "基于蜕变测试的区块链智能合约漏洞检测方法" 被 通信学报 录用.
  • [2023.08.10]. Our paper "VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detection" has been accepted by the 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023).
  • [2023.07.29]. Our paper "An optimized feature extraction algorithm for abnormal network traffic detection" has been accepted by Future Generation Computer Systems.
  • [2023.07.27]. Our paper "TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism" has been accepted by ACM Transactions on Privacy and Security.
  • [2023.05.17]. I have been invited to the technical program committee of the student research competition (SRC) track, co-located with the 30th Asia-Pacific Software Engineering Conference (APSEC 2023).

Selected Paper List

    2024:
  1. Saihua Cai*, Han Xu, Mingjie Liu, Zhilin Chen, Guofeng Zhang. A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. Computers & Security, 136:103580, 2024.
  2. Saihua Cai*, Yingwei Zhao, Yikai Hu, Junzhe Wu, Jiaxu Wu, Guofeng Zhang, Chuan Zhao, Rexford Nii Ayitey Sosu. CD-BTMSE: A Concept Drift Detection Model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble Learning. Knowledge-Based Systems, 294:111681, 2024.
  3. Jinfu Chen, Jiaping Xu, Saihua Cai*, Xiaoli Wang, Haibo Chen, Zhehao Li. Software Defect Prediction Approach based on A Diversity Ensemble Combined with Neural Network. IEEE Transactions on Reliability, 2024, accept.
  4. Jinfu Chen, Yuechao Gu, Saihua Cai*, Haibo Chen, Jingyi Chen. A novel test case prioritization approach for black-box testing based on K-medoids clustering. Journal of Software: Evolution and Process, 36(4): e2565, 2024.
  5. 陈锦富, 冯乔伟, 蔡赛华*, 施登洲, Rexford Nii Ayitey Sosu. 基于形式化方法的区块链系统漏洞检测模型. 软件学报, 35(9):?-?, 2024.
  6. Jiayao Li, Saihua Cai, Li Li, Ruizhi Sun*, Gang Yuan, Rui Zhu. MIT-FRNet: Modality-Invariant Temporal Representation Learning-based Feature Reconstruction Network for Missing Modalities. Expert Systems With Applications, 249:123655, 2024.
  7. Jinfu Chen*, Weijia Wang, Bo Liu, Saihua Cai, Dave Towey, Shengran Wang. Hybrid Semantics-based Vulnerability Detection Incorporating a Temporal Convolutional Network and Self-attention Mechanism. Information and Software Technology, 171:107453, 2024.
  8. Chi Zhang, Xiaoli Wang, Jinfu Chen*, Saihua Cai, Rexford Nii Ayitey Sosu. A Novel Defect Prediction Method Based on Semantic Feature Enhancement. Journal of Software: Evolution and Process, 2024, e2674.
  9. Chi Zhang, Jinfu Chen*, Saihua Cai, Wen Zhang, Rexford Nii Ayitey Sosu, Haibo Chen. TR-Fuzz: A Syntax Valid Tool for Fuzzing C Compilers. Science of Computer Programming, 238:103155, 2024.
  10. Jinfu Chen*, Yemin Yin, Saihua Cai, Weijia Wang, Shengran Wang, Jiming Chen*. iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks. Science of Computer Programming, 238:103156, 2024.
  11. 张文, 陈锦富*, 蔡赛华, 张翅, 刘一松*. 一种聚类分析驱动种子调度的模糊测试方法. 软件学报, 35(7):?-?, 2024.
  12. Dongjie Wang, Jinfu Chen*, Saihua Cai, Qiaowei Feng, Yuhao Chen, Xinyi Hu. SCVD-SA: A Smart Contract Vulnerability Detection Method based on Hybrid Deep Learning Model and Self-attention Mechanism. In: 31st IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2024), accept.
  13. Jinfu Chen*, Fei Yan, Saihua Cai, Shengran Wang, Jingyi Chen. FMUZZ: A Novel Greybox Fuzzing Approach based on Mutation Strategy Optimization with Byte Scheduling. In: 24th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2024), accept.
  14. Chi Zhang, Jinfu Chen*, Saihua Cai, Jingyi Chen, Chunlei Huang. JFuzzer: Detecting Optimization Errors in JavaScript Just-In-Time Compilers. In: 24th IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2024), accept.
    2023:
  1. Saihua Cai, Jinfu Chen*, Haibo Chen, Chi Zhang, Qian Li, Dengzhou Shi, Wei Lin. Minimal rare pattern-based outlier detection approach for uncertain data streams under monotonic constraints. The Computer Journal, 66(1):16-34, 2023.
  2. Jinfu Chen, Yuhao Chen, Saihua Cai*, Shang Yin, Lingling Zhao, Zikang Zhang. An optimized feature extraction algorithm for abnormal network traffic detection. Future Generation Computer Systems, 149:330-342, 2023.
  3. Jinfu Chen, Luo Song, Saihua Cai*, Haodi Xie, Shang Yin, Bilal Ahmad. TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism. ACM Transactions on Privacy and Security, 26(4), 44:1-21, 2023.
  4. Jinfu Chen, Wei Lin, Saihua Cai*, Yemin Yin, Haibo Chen, Dave Towey. BiTCN_DRSN: An Effective Software Vulnerability Detection Model based on an Improved Temporal Convolutional Network. Journal of Systems & Software, 204:111772, 2023.
  5. Jinfu Chen, Tianxiang Lv, Saihua Cai*, Luo Song, Shang Yin. A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Information and Software Technology, 157:107166, 2023.
  6. Jinfu Chen, Jingyi Chen, Saihua Cai*, Haibo Chen, Chi Zhang. A novel combinatorial testing approach with fuzzing strategy. Journal of Software: Evolution and Process, 35(12): e2537, 2023.
  7. Jinfu Chen, Chi Zhang, Saihua Cai*, Lin Zhang, Liang Ma. A Memory-related Vulnerability Detection Approach based on Vulnerability Model with Petri Net. Journal of Logical and Algebraic Methods in Programming, 132:100859, 2023.
  8. 陈锦富, 王震鑫, 蔡赛华*, 冯乔伟, 陈宇豪, 许容天, Patrick Kwaku Kudjo. 基于蜕变测试的区块链智能合约漏洞检测方法. 通信学报, 44(10):164-176, 2023.
  9. Saihua Cai, Wenjun Zhao, Han Tang, Jinfu Chen*, Wuhao Guo. CGSA-RNN: Abnormal Network Traffic Detection Model Based on CycleGAN and Self-Attention Mechanism. In: 23rd IEEE International Conference on Software Quality, Reliability, and Security (QRS 2023), pp.541-549, 2023.
  10. Jinfu Chen, Qiaowei Feng, Saihua Cai*, Dengzhou Shi, Dave Towey, Yuhao Chen, Dongjie Wang. VDABSys: A novel security-testing framework for blockchain systems based on vulnerability detection. In: 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023), accept.
    2022:
  1. Saihua Cai*, Li Li, Jinfu Chen, Kaiyi Zhao, Gang Yuan, Ruizhi Sun*, Rexford Nii Ayitey Sosu, Longxia Huang. MWFP-Outlier: maximal weighted frequent-pattern-based approach for detecting outliers from uncertain weighted data streams. Information Sciences, 591:195-225, 2022.
  2. Saihua Cai, Jinfu Chen*, Baoquan Yin, Ruizhi Sun, Chi Zhang, Haibo Chen, Jingyi Chen, Min Lin. An efficient outlier detection approach for streaming sensor data based on neighbor difference and clustering. Security and Communication Networks, 3062541, 2022.
  3. Jinfu Chen, Xiaoli Wang, Saihua Cai*, Jiaping Xu, Jingyi Chen, Haibo Chen. A software defect prediction method with metric compensation based on feature selection and transfer learning. Frontiers of Information Technology & Electronic Engineering, 2100468, 2022.
  4. Jinfu Chen, Chi Zhang, Saihua Cai*, Zufa Zhang, Lu Liu, Longxia Huang. Malware recognition approach based on self‐similarity and an improved clustering algorithm. IET Software, 16(5):527-541, 2022.
  5. Li Li, Kaiyi Zhao, Ruizhi Sun*, Saihua Cai, Yongtao Liu. Research for an Adaptive Classifier Based on Dynamic Graph Learning. Neural Processing Letters, 54(4):2675-2693, 2022.
  6. Yun Li, Saihua Cai*. Detecting Outliers in Data Streams Based on Minimum Rare Pattern Mining and Pattern Matching. Information Technology and Control, 51(2):268-282, 2022.
  7. Jinfu Chen, Shengran Wang, Saihua Cai*, Chi Zhang, Haibo Chen, Jingyi Chen, Jianmin Zhang. A Novel Coverage-gudied Greybox Fuzzing based on Power Schedule Optimization with Time Complexity. In: 37th IEEE/ACM International Conference on Automated Software Engineering (ASE 2022), pp.1-5, 2022.
  8. Jinfu Chen, Haodi Xie, Saihua Cai*, Ye Geng, Yemin Yin, Zikang Zhang. A formalization-based vulnerability detection method for cross-subject network components. In: 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2022), pp.1054-1059, 2022.
  9. Jinfu Chen, Yemin Yin, Saihua Cai*, Ye Geng, Longxia Huang. An Improved Test Case Generation Method based on Test Requirements for Testing Software Component. In: 22nd IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2022), pp.209-218, 2022.
  10. Shengran Wang, Jinfu Chen*, Saihua Cai, Chi Zhang, Haibo Chen. A Novel Coverage-Guided Greybox Fuzzing Method based on Grammar-Aware with Particle Swarm Optimization. In: 22nd IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2022), pp.781-782, 2022.
  11. Jinfu Chen*, Zian Zhao, Xiao Chen, Saihua Cai, Shang Yin, Luo Song. A novel classification approach for Android malware based on feature fusion and natural language processing. In: 13th Asia-Pacific Symposium on Internetware (Internetware 2022), pp.28-36, 2022.
  12. Bo Liu, Jinfu Chen*, Weijia Wang, Saihua Cai, Jingyi Chen, Qiaowei Feng. An adaptive search optimization algorithm for improving the detection capability of software vulnerability. In: 13th Asia-Pacific Symposium on Internetware (Internetware 2022), pp.212-220, 2022.
  13. Jinfu Chen*, Haibo Chen, Yiming Wu, Chengying Mao, Saihua Cai. Adaptive Random Testing based on the Modified Metric-Memory Tree and Information Entropy. In: 9th IEEE International Conference on Dependable Systems and Their Applications (DSA 2022), pp.615-623, 2022.
    2021:
  1. Saihua Cai, Jinfu Chen*, Haibo Chen, Chi Zhang, Qian Li, Rexford Nii Ayitey Sosu, Shang Yin. An efficient anomaly detection method for uncertain data based on minimal rare patterns with the consideration of anti-monotonic constraints. Information Sciences, 580:620-642, 2021.
  2. Saihua Cai, Rubing Huang, Jinfu Chen*, Chi Zhang, Bo Liu, Shang Yin, Ye Geng. An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints. Information Sciences, 555:125-146, 2021.
  3. Jinfu Chen, Jingyi Chen, Saihua Cai*, Haibo Chen, Chi Zhang, Chuangfei Huang. A Test Case Generation Method of Combinatorial Testing based on t-way Testing with Adaptive Random Testing. In: 32nd IEEE International Symposium on Software Reliability Engineering (ISSRE 2021), pp.83-90, 2021.
  4. Jinfu Chen, Jiaping Xu, Saihua Cai*, Xiaoli Wang, Yuechao Gu, Shuhui Wang. An efficient dual ensemble software defect prediction method with neural network. In: 32nd International Symposium on Software Reliability Engineering (ISSRE 2021), pp.91-98, 2021.
  5. Jinfu Chen, Yuechao Gu, Saihua Cai*, Haibo Chen, Jingyi Chen, Haiyi Liu. KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity. In: 32nd International Symposium on Software Reliability Engineering (ISSRE 2021), pp.105-110, 2021.
  6. Jinfu Chen, Shang Yin, Saihua Cai*, Lingling Zhao, Shengran Wang. L-KPCA: an efficient feature extraction method for network intrusion detection. In: 17th International Conference on Mobility, Sensing and Networking (MSN 2021), pp.683-684, 2021.
  7. Jinfu Chen, Shang Yin, Saihua Cai*, Chi Zhang, Yemin Yin, Ling Zhou. An Efficient Network Intrusion Detection Model Based on Temporal Convolutional Networks. In: 21st IEEE International Conference on Software Quality, Reliability, and Security (QRS 2021), pp.768-775, 2021.
  8. Ye Geng, Saihua Cai*, Songling Qin, Haibo Chen, Shang Yin. An Efficient Network Traffic Classification Method based on Combined Feature Dimensionality Reduction. In: 21st IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2021), pp.407-414, 2021.
  9. Dengzhou Shi, Saihua Cai*, Songling Qin, Zhenxin Wang, Qiyong Zhong, Ling Zhou. An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree. In: 21st IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2021), pp.133-140, 2021.
  10. Wei Lin, Saihua Cai*. An Empirical Study on Vulnerability Detection for Source Code Software based on Deep Learning. In: 21st IEEE International Conference on Software Quality, Reliability, and Security (QRS-C 2021), pp.1159-1160, 2021.
  11. Jinfu Chen, Bo Liu, Saihua Cai*, Weijia Wang, Shengran Wang. AIdetectorX: A Vulnerability Detector Based on TCN and Self-attention Mechanism. In: Symposium on Dependable Software Engineering-Theories, Tools and Applications (SETTA), pp.161-177, 2021.
  12. Li Li, Kaiyi Zhao, Jiangzhang Gan, Saihua Cai, Tong Liu, Huiyu Mu, Ruizhi Sun*. Robust Adaptive Semi-supervised Classification Method based on Dynamic Graph and Self-paced Learning. Information Processing and Management, 58:102433, 2021.
  13. Xiaochen Shi, Saihua Cai, Sicong Li, Ruizhi Sun*. Visual analysis system for association-based outlier detection for data streams. In: 24th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp.232-237, 2021.
    2020:
  1. Saihua Cai, Sicong Li, Gang Yuan, Shangbo Hao, Ruizhi Sun*. MiFI-Outlier: Minimal infrequent itemset-based outlier detection approach on uncertain data stream. Knowledge-Based Systems, 191:105268, 2020.
  2. Saihua Cai, Li Li, Sicong Li, Ruizhi Sun*, Gang Yuan. An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns. Expert Systems with Applications, 160:113646, 2020.
  3. Saihua Cai, Ruizhi Sun*, Shangbo Hao, Sicong Li, Gang Yuan. Minimal weighted infrequent itemset mining-based outlier detection approach on uncertain data stream. Neural Computing and Applications, 32:6619–6639, 2020.
  4. Saihua Cai, Li Li, Qian Li, Sicong Li, Shangbo Hao, Ruizhi Sun*. UWFP-Outlier: an efficient frequent-pattern-based outlier detection method for uncertain weighted data streams. Applied Intelligence, 50:3452-3470, 2020.
  5. Saihua Cai, Jinfu Chen*, Xinru Li, Bo Liu. Minimal rare-pattern-based outlier detection method for data streams by considering anti-monotonic constraints. In: 23rd International Conference on Information Security (ISC 2020), pp.274-289, 2020.
  6. Sicong Li, Saihua Cai, Li Li, Ruizhi Sun*, Gang Yuan. CAAS: a novel collective action-based ant system algorithm for solving TSP problem. Soft Computing, 24:9257-9278, 2020.
  7. Kaiyi Zhao, Li Li, Saihua Cai, Ruizhi Sun*. An optimized time series combined forecasting method based on neural networks. Journal of Supercomputing, 76:2986-3012, 2020.
  8. Li Li, Kaiyi Zhao, Sicong Li, Ruizhi Sun*, Saihua Cai. Extreme Learning Machine for Supervised Classification with Self-paced Learning. Neural Processing Letters, 52(3):6619-6639, 2020.
  9. Chi Zhang, Jinfu Chen*, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng. iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection Methods. In: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), pp.1455-1460, 2020.
  10. Xiaochen Shi, Saihua Cai, Sicong Li, Ruizhi Sun*. Design and implementation of visualization abnormal detection system for agricultural sensor data stream. International Agricultural Engineering Journal, 29(1):418-427, 2020.
    2019:
  1. Saihua Cai, Ruizhi Sun*, Shangbo Hao, Sicong Li, Gang Yuan. An Efficient Outlier Detection Approach on Weighted Data Stream Based on Minimal Rare Pattern Mining. China Communications, 16(10):83-99, 2019.
  2. Saihua Cai, Qian Li, Sicong Li, Gang Yuan, Ruizhi Sun*. WMFP-Outlier: An Efficient Maximal Frequent-Pattern-Based Outlier Detection Approach for Weighted Data Streams. Information Technology and Control, 48(4):505-521, 2019.
  3. Saihua Cai, Ruizhi Sun*, Shangbo Hao, Gang Wu. Mining Recent Maximal Frequent Itemsets Over Data Streams with Sliding Window. International Arab Journal of Information Technology, 16(6):961-969, 2019.
  4. Li Li, Ruizhi Sun*, Saihua Cai, Kaiyi Zhao, Qianqian Zhang. A review of improved extreme learning machine methods for data stream classification. Multimedia Tools and Applications, 78(23):33375-33400, 2019.
  5. Shangbo Hao, Saihua Cai, Ruizhi Sun*, Sicong Li. An Efficient Outlier Detection Approach Over Uncertain Data Stream Based on Frequent Itemset Mining. Information Technology and Control, 48(1):34-46, 2019.
  6. Saihua Cai, Ruizhi Sun*, Huiyu Mu, Xiaochen Shi, Gang Yuan. A Minimum Rare-Itemset-based Anomaly Detection Method and Its Application on Sensor Data Stream. In: CCF Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW), pp.116-130, 2019.
  7. Sicong Li, Saihua Cai, Ruizhi Sun*, Gang Yuan, Zeqiu Chen, Xiaochen Shi. Improved Bat Algorithm for Multiple Knapsack Problems. In: CCF Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW), pp.143-157, 2019.
  8. Gang Yuan*, Saihua Cai, Shangbo Hao. A Novel Weighted Frequent Pattern-Based Outlier Detection Method Applied to Data Stream. In: IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), pp.503-510, 2019.
  9. Qian Li, Saihua Cai, Ruizhi Sun*. The Environment Quality Evaluation and Prediction Algorithm Based on WSN. In: 5th International Conference on Fuzzy Systems and Data Mining (FSDM), pp.1077-1084, 2019.
  10. Huiyu Mu, Ruizhi Sun*, Li Li, Saihua Cai, Qianqian Zhang. A Constrained Self-adaptive Sparse Combination Representation Method for Abnormal Event Detection. In: CCF Conference on Big Data, pp.3-15, 2019.
  11. 陈锦富*, 赵小磊, 刘一松, 黄如兵, 蔡赛华, 郭昱池. 基于形式化单子的第三方构件安全性测试模型及其应用. 计算机学报, 42(7):1626-1639, 2019.
    2016-2018:
  1. Saihua Cai, Ruizhi Sun*, Jiayao Li, Chao Deng, Sicong Li. Abnormal Detecting over Data Stream Based on Maximal Pattern Mining Technology. In: CCF Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW), pp.371-385, 2018.
  2. Shangbo Hao, Saihua Cai, Ruizhi Sun*, Sicong Li. FCI-Outlier: An Efficient Frequent Closed Itemset-Based Outlier Detecting Approach on Data Stream. In: CCF Conference on Computer Supported Cooperative Work and Social Computing (ChineseCSCW), pp.176-187, 2018.
  3. Chao Deng, Jinwei Song, Ruizhi Sun*, Saihua Cai, Yinxue Shi. Gridwave: a grid-based clustering algorithm for market transaction data based on spatial-temporal density-waves and synchronization. Multimedia Tools and Applications, 77(21):1-15, 2018.
  4. Chao Deng, Jinwei Song, Ruizhi Sun*, Saihua Cai, Yinxue Shi. GRIDEN: An effective grid-based and density-based spatial clustering algorithm to support parallel computing. Pattern Recognition Letters, 109:81-88, 2018.
  5. Chao Deng, Jinwei Song, Saihua Cai, Ruizhi Sun*, Yinxue Shi, Shangbo Hao. K-DBSCAN: an efficient density-based clustering algorithm supports parallel computing. International Journal of Simulation and Process Modelling, 13(5):496-505, 2018.
  6. Chunming Cheng, Li Kang, Saihua Cai, Jiayao Li, Ruizhi Sun*. Virtual Display and Interactive Experience Platform of Farming Culture Based on Unity3D. IFAC-PapersOnLine, 51(17):637-642, 2018.
  7. Saihua Cai, Ruizhi Sun*, Chunming Cheng, Gang Wu. Exception Detection of Data Stream Based on Improved Maximal Frequent Itemsets Mining. In: Chinese Conference on Trusted Computing and Information Security (CTCIS), pp.112-125, 2017.
  8. Jinfu Chen, Saihua Cai*, Dave Towey, Lili Zhu, Rubing Huang, Hilary Ackah-Arthur, Michael Omari. Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method. International Journal of Software Engineering and Knowledge Engineering, 27(8):1235-1268, 2017.
  9. 李春晓, 孙瑞志*, 戴佚舟, 蔡赛华, 李骞, 李嘉瑶. 基于Unity 3D的中国古代农耕虚拟场景智能展示平台. 农业工程学报, 33(sup1):308-314, 2017.
  10. Shangbo Hao, Saihua Cai, Ruizhi Sun*, Jiayao Li, Chunming Cheng. Design and implement of IoT-based beef cattle breeding system. International Agricultural Engineering Journal, 26(3):302-309, 2017.
  11. Chunxiao Li, Ruizhi Sun*, Yizhou Dai, Saihua Cai, Qian Li, Jiayao Li. Intelligent exhibition platform of Chinese ancient farming virtual scene based on Unity3D. Transactions of the Chinese Society of Agricultural Engineering, 33(supp1):308-314, 2017. (In Chinese)
  12. Zhihong Li, Jianqin Wang*, Ye Zhang, Saihua Cai, Shangbo Hao. Efficient GPU-Based Parallel Kriging Algorithm for Predicting the Air Quality Index. In: International Conference on Green Informatics (ICGI), pp.1-5, 2017.
  13. Jinfu Chen, Saihua Cai, Lili Zhu, Yuchi Guo, Rubing Huang*, Xiaolei Zhao, Yunqi Sheng. An Improved String-Searching Algorithm and Its Application in Component Security Testing. Tsinghua Science and Technology, 21(3):281-294, 2016.
  14. Jinfu Chen, Lili Zhu, Zhibin Xie*, Michael Omari, Hilary Ackah-Arthur, Saihua Cai, Rubing Huang. An Effective Long String Searching Algorithm towards Component Security Testing. China Communications, 13(11):153-169, 2016.
  15. Jinfu Chen, Lili Zhu, Yuchi Guo, Rubing Huang*, Saihua Cai, Xiaolei Zhao. A mining approach for component abnormal information based on monitor log. International Journal of Simulation and Process Modelling, 11(5):496-505, 2016.

Services

  • Member of IEEE
  • Member of ACM
  • Member of CCF
  • TPC Member of the 30th Asia-Pacific Software Engineering Conference (APSEC), SRC track, 2023
  • Journal Reviewer for the IEEE Transactions on Information Forensics and Security (TIFS), IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE Transactions on Systems, Man and Cybernetics: Systems (TSMC), IEEE Transactions on Network and Service Management (TNSM), IEEE Transactions on Sustainable Computing (TSUSC), IEEE Transactions on Intelligent Transportation Systems (TITS), Pattern Recognition (PR), Information Sciences, Computers & Security (COSE), Journal of Computer Science and Technology (JCST), Machine Learning, The Computer Journal, IET Software, Knowledge and Information Systems (KAIS), Knowledge-based Systems (KBS), Expert Systems with Applications (ESWA), Engineering Applications of Artificial Intelligence (EAAI), Applied Intelligence (APIN), Neural Computing & Applications (NCA), International Journal of Intelligent Systems (IJIS), Computers and Electronics in Agriculture, IEEE Access, IET Image Processing, Information Technology and Control, etc.

Projects

  • Research on Network Traffic Abnormal Detection and Recognition Based on Feature Association Analysis
    supported by the China Postdoctoral Science Foundation
    Jul. 2021 - Jun. 2023, PI (中国博士后基金面上项目)
  • Research on Detection and Recognition of Abnormal Network Traffic Based on Association Analysis
    supported by the Natural Science Foundation of Jiangsu Higher Education Institutions of China
    Oct. 2021 - Sept. 2023, PI (江苏省高校自然科学研究面上项目)
  • Research on Abnormal Network Traffic Identification Based on Concept Drift Detection and Adaptation
    supported by the Natural Science Foundation of Jiangsu Province
    Jul. 2022 - Jun. 2025, PI (江苏省自然科学基金青年项目)
  • Research on Abnormal Network Traffic Identification Approach Based on Association Analysis Under Concept Drift Pheomenon
    supported by the National Natural Science Foundation of China (NSFC)
    Jan. 2023 - Dec. 2025, PI (国家自然科学基金青年项目)
  • Research on Malicious Traffic Detection and Network Attack Traceability Based on Data Augmentation
    supported by the China Postdoctoral Science Foundation (Special Grade)
    Jul. 2023 - Dec. 2024, PI (中国博士后基金特别资助(站中)项目)

Contact Me

Office: Computing Center of Jiangsu University & Room 418, School of Computer Science and Communication Engineering, Jiangsu University, Zhenjiang, China.

Email: caisaih@ujs.edu.cn