Yu Wen
Orcid: 0000-0002-0658-0742Affiliations:
- Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
According to our database1,
Yu Wen
authored at least 35 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
FineGCP: Fine-grained dependency graph community partitioning for attack investigation.
Comput. Secur., 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
2024
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition.
Comput. Secur., 2024
Proceedings of the 23rd IEEE International Conference on Trust, 2024
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy.
Proceedings of the IEEE International Performance, 2024
TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer.
Proceedings of the International Joint Conference on Neural Networks, 2024
Interpretable Risk-aware Access Control for Spark: Blocking Attack Purpose Behind Actions.
Proceedings of the 42nd IEEE International Conference on Computer Design, 2024
ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Benchmarking, Measuring, and Optimizing, 2018
2017
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
2014
J. Comput. Sci. Technol., 2014
2007
Proceedings of the CHINA HPC 2007, 2007
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007