Aimin Yu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput., 2024

2022
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
Cybersecur., 2022

AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022

LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Intertwined Carbon Nanotubes and Ag Nanowires Constructed by Simple Solution Blending as Sensitive and Stable Chloramphenicol Sensors.
Sensors, 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
CoRR, 2021

FCEP: A Fast Concolic Execution for Reaching Software Patches.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting.
Proceedings of the Security and Privacy in Communication Networks, 2021

Towards Heap-Based Memory Corruption Discovery.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Towards Open World Traffic Classification.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Framework of Darknet Forensics.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

CSNN: Password guessing method based on Chinese syllables and neural network.
Peer-to-Peer Netw. Appl., 2020

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment.
Int. J. Distributed Sens. Networks, 2020

Program Slice based Vulnerable Code Clone Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A novel network traffic classification approach via discriminative feature learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
A Novel Device Identification Method Based on Passive Measurement.
Secur. Commun. Networks, 2019

Building Trust in Container Environment.
Proceedings of the 18th IEEE International Conference On Trust, 2019

MMNR: A Network Representation Framework Based on Multi-View Motif Fusion.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Prototype-Based Malware Traffic Classification with Novelty Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Performance overhead analysis of virtualisation on ARM.
Int. J. Inf. Commun. Technol., 2018

Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018

A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters.
Proceedings of the 17th IEEE International Conference On Trust, 2018

TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018

2013
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Real-time remote attestation of IaaS cloud.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Pricing strategies for tied digital contents and devices.
Decis. Support Syst., 2011

Enhancing Flexibility of TCG's TNC through Layered Property Attestation.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A DRTM-Based Method for Trusted Network Connection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Obtaining the Integrity of Your Virtual Machine in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Real-Time Remote Attestation with Privacy Protection.
Proceedings of the Trust, 2010

2009
TBDRM: A TPM-Based Secure DRM Architecture.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2004
Generalized variational principle on nonlinear theory of naturally curved and twisted beams.
Appl. Math. Comput., 2004


  Loading...