Yuede Ji

Orcid: 0000-0002-2419-6592

According to our database1, Yuede Ji authored at least 30 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Tango: rethinking quantization for graph neural network training on GPUs.
CoRR, 2023

PeeK: A Prune-Centric Approach for K Shortest Path Computation.
Proceedings of the International Conference for High Performance Computing, 2023

TANGO: re-thinking quantization for graph neural network training on GPUs.
Proceedings of the International Conference for High Performance Computing, 2023

API2Vec: Learning Representations of API Sequences for Malware Detection.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

2022
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees.
ACM Trans. Parallel Comput., 2022

Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
CoRR, 2022

NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks.
Proceedings of the IEEE International Conference on Communications, 2022

TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on GPU.
Proceedings of the HPDC '22: The 31st International Symposium on High-Performance Parallel and Distributed Computing, Minneapolis, MN, USA, 27 June 2022, 2022

Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Discovering unknown advanced persistent threat using shared features mined by neural networks.
Comput. Networks, 2021

DEFInit: An Analysis of Exposed Android Init Routines.
Proceedings of the 30th USENIX Security Symposium, 2021

BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Vestige: Identifying Binary Code Provenance for Vulnerability Detection.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
GRL: Knowledge graph completion with GAN-based reinforcement learning.
Knowl. Based Syst., 2020

Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Aquila: Adaptive Parallel Computation of Graph Connectivity Queries.
Proceedings of the HPDC '20: The 29th International Symposium on High-Performance Parallel and Distributed Computing, 2020

SWARMGRAPH: Analyzing Large-Scale In-Memory Graphs on GPUs.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.
Secur. Commun. Networks, 2019

Securing Malware Cognitive Systems against Adversarial Attacks.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

2018
iSpan: parallel identification of strongly connected components with spanning trees.
Proceedings of the International Conference for High Performance Computing, 2018

2017
Understanding socialbot behavior on end hosts.
Int. J. Distributed Sens. Networks, 2017

2016
Detection of Forwarding-Based Malicious URLs in Online Social Networks.
Int. J. Parallel Program., 2016

Combating the evasion mechanisms of social bots.
Comput. Secur., 2016

2015
BotCatch: leveraging signature and behavior for bot detection.
Secur. Commun. Networks, 2015

Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection.
Int. J. Distributed Sens. Networks, 2015

2014
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches.
Proceedings of the Information Security Practice and Experience, 2014

Towards social botnet behavior detecting in the end host.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
BotInfer: A Bot Inference Approach by Correlating Host and Network Information.
Proceedings of the Network and Parallel Computing - 10th IFIP International Conference, 2013

BotCatch: A Behavior and Signature Correlated Bot Detection Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013


  Loading...