Fangfang Yuan

According to our database1, Fangfang Yuan authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Consensus reaching with minimum adjustment and consistency management in group decision making with intuitionistic multiplicative preference relations.
Expert Syst. Appl., December, 2023

Robust Malicious Domain Detection Against Adversarial Attacks on Heterogeneous Graph.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular Expressions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

EDDVPL: A Web Attribute Extraction Method with Prompt Learning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Contrastive Self-distillation BERT with Kernel Alignment-Based Inference.
Proceedings of the Computational Science - ICCS 2023, 2023

Self-supervised Deep Heterogeneous Graph Neural Networks with Contrastive Learning.
Proceedings of the Computational Science - ICCS 2023, 2023

Mulan: A Multi-Level Alignment Model for Video Question Answering.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

MetaBERT: Collaborative Meta-Learning for Accelerating BERT Inference.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Curvature-Driven Knowledge Graph Embedding for Link Prediction.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Malicious Domain Detection with Heterogeneous Graph Propagation Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

EPGraph: An Efficient Graph Computing Model in Persistent Memory System.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

DOM2R-Graph: A Web Attribute Extraction Architecture with Relation-Aware Heterogeneous Graph Transformer.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Heterogeneous Graph Attention Network for Malicious Domain Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Malicious Domain Detection on Imbalanced Data with Deep Reinforcement Learning.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

2020
Data Augmentation for Insider Threat Detection with GAN.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

2019
Attention-Based LSTM for Insider Threat Detection.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Insider Threat Detection with Deep Neural Network.
Proceedings of the Computational Science - ICCS 2018, 2018

2017
Extended VIKOR method for multiple criteria decision-making with linguistic hesitant fuzzy information.
Comput. Ind. Eng., 2017

2015
A Utility Function Based Resource Allocation Method for LEO Satellite Constellation System.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

2013
Research of Intrusion Detection System on Android.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Hijacking Activity Technology Analysis and Research in Android System.
Proceedings of the Trustworthy Computing and Services, 2013

2012
Assessing the impact of processor design decisions on simulation based verification complexity using formal modeling with experiments at instruction set architecture level.
PhD thesis, 2012

Research on Redundant Channel Model Based on Spatial Correlation in IOT.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
Managing Complexity through Abstraction: A Refinement-Based Approach to Formalize Instruction Set Architectures.
Proceedings of the Formal Methods and Software Engineering, 2011


  Loading...