Yongzhong He

Orcid: 0000-0003-0045-4128

According to our database1, Yongzhong He authored at least 16 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput., 2024

2022
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci., 2020

Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.
Frontiers Comput. Sci., 2020

2019
Dynamic privacy leakage analysis of Android third-party libraries.
J. Inf. Secur. Appl., 2019

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Membership Detection for Real-world Groups Hidden in Social Network.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
A software assignment algorithm for minimizing worm damage in networked systems.
J. Inf. Secur. Appl., 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017

2015
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur., 2015


  Loading...