Yiling He

Orcid: 0000-0002-5977-1489

According to our database1, Yiling He authored at least 23 papers between 2023 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2026
Boosting illuminant estimation in deep color constancy through brightness robustness enhancement.
Pattern Recognit., 2026

2025
Adversarial relighting attacks: physically interpretable manipulation of incident light for vision model vulnerability exploration.
Vis. Comput., October, 2025

Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing.
CoRR, September, 2025

Explainer-guided Targeted Adversarial Attacks against Binary Code Similarity Detection Models.
CoRR, June, 2025

RetouchUAA: Unconstrained Adversarial Attack via Realistic Image Retouching.
IEEE Trans. Circuits Syst. Video Technol., March, 2025

Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness.
CoRR, February, 2025

Spectral Efficiency Analysis for Cell-Free Massive MIMO Systems With Low-Resolution ADCs Under Imperfect CSI.
IEEE Internet Things J., 2025

LAMD: Context-Driven Android Malware Detection and Classification with LLMs.
Proceedings of the 2025 IEEE Security and Privacy, 2025

Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

Distilling Benign Knowledge with Fine-Grained AST Fragments for Precise Real-World Web Shell Detection.
Proceedings of the 33rd IEEE/ACM International Symposium on Quality of Service, 2025

On Benchmarking Code LLMs for Android Malware Analysis.
Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2025

Combating Concept Drift with Explanatory Detection and Adaptation for Android Malware Classification.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Few-shot fault diagnosis of turnout switch machine based on flexible semi-supervised meta-learning network.
Knowl. Based Syst., 2024

Few-shot fault diagnosis of switch machine based on data fusion and balanced regularized prototypical network.
Eng. Appl. Artif. Intell., 2024

TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs.
CoRR, 2024

Going Proactive and Explanatory Against Malware Concept Drift.
CoRR, 2024

2023
MsDroid: Identifying Malicious Snippets for Android Malware Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Few-shot fault diagnosis of turnout switch machine based on semi-supervised weighted prototypical network.
Knowl. Based Syst., 2023

RetouchUAA: Unconstrained Adversarial Attack via Image Retouching.
CoRR, 2023

Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey.
CoRR, 2023

BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack.
CoRR, 2023

DeUEDroid: Detecting Underground Economy Apps Based on UTG Similarity.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023


  Loading...