Jie Ying
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
ActMiner: Applying Causality Tracking and Increment Aligning for Graph-based Cyber Threat Hunting.
CoRR, January, 2025
METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift.
CoRR, January, 2025
Dehydrator: Enhancing Provenance Graph Storage via Hierarchical Encoding and Sequence Generation.
IEEE Trans. Inf. Forensics Secur., 2025
TAGAPT: Toward Automatic Generation of APT Samples With Provenance-Level Granularity.
IEEE Trans. Inf. Forensics Secur., 2025
Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports.
IEEE Trans. Dependable Secur. Comput., 2025
Knowl. Based Syst., 2025
ThreatCog: An adaptive and lightweight mobile user authentication system with enhanced motion sensory signals.
J. Inf. Secur. Appl., 2025
Enhancing online industrial quality index prediction with a general deep temporal feature extraction and incremental ensemble modeling framework.
Eng. Appl. Artif. Intell., 2025
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection.
Comput. Secur., 2025
SeedBench: A Multi-task Benchmark for Evaluating Large Language Models in Seed Science.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
2024
TrapCog: An Anti-Noise, Transferable, and Privacy-Preserving Real-Time Mobile User Authentication System With High Accuracy.
IEEE Trans. Mob. Comput., April, 2024
IEEE Commun. Lett., April, 2024
CRUcialG: Reconstruct Integrated Attack Scenario Graphs by Cyber Threat Intelligence Reports.
CoRR, 2024
CoRR, 2024
Reinforcement Learning with Maskable Stock Representation for Portfolio Management in Customizable Stock Pools.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends.
Comput. Secur., December, 2023
Weakly supervised segmentation of uterus by scribble labeling on endometrial cancer MR images.
Comput. Biol. Medicine, December, 2023
Residual spatial graph convolution and temporal sequence attention network for sign language translation.
Multim. Tools Appl., June, 2023
J. Commun. Networks, February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
J. Aerosp. Inf. Syst., 2023
TradeMaster: A Holistic Quantitative Trading Platform Empowered by Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Human Tissue Cell Image Segmentation optimization Algorithm Based on Improved U-net Network.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023
2021
Improved human action recognition approach based on two-stream convolutional neural network model.
Vis. Comput., 2021
CoRR, 2021
Detection of deep myometrial invasion in endometrial cancer MR imaging based on multi-feature fusion and probabilistic support vector machine ensemble.
Comput. Biol. Medicine, 2021
2005
Proceedings of the 2005 International Conference on Computer Graphics, 2005
2000
A hidden Markov model-based algorithm for fault diagnosis with partial and imperfect tests.
IEEE Trans. Syst. Man Cybern. Part C, 2000