Yu Wen

Orcid: 0000-0002-0658-0742

Affiliations:
  • Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China


According to our database1, Yu Wen authored at least 35 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
FineGCP: Fine-grained dependency graph community partitioning for attack investigation.
Comput. Secur., 2025

Enhancing the Robustness of LiDAR-based Object Detection under Disappearing Attacks.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

2024
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition.
Comput. Secur., 2024

DyCom: A Dynamic Community Partitioning Technique for System Audit Logs.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy.
Proceedings of the IEEE International Performance, 2024

TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer.
Proceedings of the International Joint Conference on Neural Networks, 2024

Interpretable Risk-aware Access Control for Spark: Blocking Attack Purpose Behind Actions.
Proceedings of the 42nd IEEE International Conference on Computer Design, 2024

ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

Representation-enhanced APT Detection Using Contrastive Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Distributed Storage System for System Logs Based on Hybrid Compression Scheme.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Deepro: Provenance-based APT Campaigns Detection via GNN.
Proceedings of the IEEE International Conference on Trust, 2022

A General Backdoor Attack to Graph Neural Networks Based on Explanation Method.
Proceedings of the IEEE International Conference on Trust, 2022

DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021

FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism.
Proceedings of the Advances in Digital Forensics XVII, 2021

Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MLTracer: Malicious Logins Detection System via Graph Neural Network.
Proceedings of the 19th IEEE International Conference on Trust, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
DCMIX: Generating Mixed Workloads for the Cloud Data Center.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2018

2017
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2014
Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

2007
The design methodology of Phoenix cluster system software stack.
Proceedings of the CHINA HPC 2007, 2007

A layered design methodology of cluster system stack.
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007


  Loading...