Seguir
Yuede Ji
Título
Citado por
Citado por
Año
Detection of forwarding-based malicious URLs in online social networks
J Cao, Q Li, Y Ji, Y He, D Guo
International Journal of Parallel Programming 44, 163-180, 2016
782016
Detecting lateral movement in enterprise computer networks with unsupervised graph {AI}
B Bowman, C Laprade, Y Ji, HH Huang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
742020
Combating the evasion mechanisms of social bots
Y Ji, Y He, X Jiang, J Cao, Q Li
computers & security 58, 230-249, 2016
602016
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees
Y Ji, H Liu, Y Hu, HH Huang
ACM Transactions on Parallel Computing 9 (3), 1-27, 2022
452022
GRL: Knowledge graph completion with GAN-based reinforcement learning
Q Wang, Y Ji, Y Hao, J Cao
Knowledge-Based Systems 209, 106421, 2020
452020
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network
Y Ji, L Cui, HH Huang
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
362021
Securing malware cognitive systems against adversarial attacks
Y Ji, B Bowman, HH Huang
2019 IEEE international conference on cognitive computing (ICCC), 1-9, 2019
282019
Stopping the cyberattack in the early stage: assessing the security risks of social network users
B Feng, Q Li, Y Ji, D Guo, X Meng
Security and Communication Networks 2019, 2019
272019
A mulitiprocess mechanism of evading behavior-based bot detection approaches
Y Ji, Y He, D Zhu, Q Li, D Guo
Information Security Practice and Experience: 10th International Conference …, 2014
262014
Discovering unknown advanced persistent threat using shared features mined by neural networks
L Shang, D Guo, Y Ji, Q Li
Computer Networks 189, 107937, 2021
222021
Tlpgnn: A lightweight two-level parallelism paradigm for graph neural network computation on gpu
Q Fu, Y Ji, HH Huang
Proceedings of the 31st International Symposium on High-Performance Parallel …, 2022
172022
Botcatch: leveraging signature and behavior for bot detection
Y Ji, Q Li, Y He, D Guo
Security and Communication Networks 8 (6), 952-969, 2015
162015
Towards social botnet behavior detecting in the end host
Y Ji, Y He, X Jiang, Q Li
2014 20th IEEE International Conference on Parallel and Distributed Systems …, 2014
152014
Illuminati: Towards explaining graph neural networks for cybersecurity analysis
H He, Y Ji, HH Huang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 74-89, 2022
132022
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Y Ji, L Cui, HH Huang
International Conference on Applied Cryptography and Network Security, 287-310, 2021
122021
Aquila: Adaptive parallel computation of graph connectivity queries
Y Ji, HH Huang
Proceedings of the 29th International Symposium on High-Performance Parallel …, 2020
112020
Understanding socialbot behavior on end hosts
Y He, Q Li, J Cao, Y Ji, D Guo
International Journal of Distributed Sensor Networks 13 (2), 1550147717694170, 2017
102017
Overhead analysis and evaluation of approaches to host-based bot detection
Y Ji, Q Li, Y He, D Guo
International Journal of Distributed Sensor Networks 11 (5), 524627, 2015
92015
Swarmgraph: Analyzing large-scale in-memory graphs on gpus
Y Ji, H Liu, HH Huang
2020 IEEE 22nd International Conference on High Performance Computing and …, 2020
82020
API2Vec: Learning Representations of API Sequences for Malware Detection
L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
52023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20