Yufei Han

Orcid: 0000-0002-9035-6718

Affiliations:
  • INRIA, Rennes, France


According to our database1, Yufei Han authored at least 50 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing.
CoRR, July, 2025

Dissecting Logical Reasoning in LLMs: A Fine-Grained Evaluation and Supervision Study.
CoRR, June, 2025

Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection.
CoRR, March, 2025

VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2025

CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

RobustPFL: Robust Personalized Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

2024
Defending Jailbreak Prompts via In-Context Adversarial Game.
CoRR, 2024

Manipulating Predictions over Discrete Inputs in Machine Teaching.
CoRR, 2024

BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts.
Comput. Secur., 2024

Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

BadVFL: Backdoor Attacks in Vertical Federated Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Cross-Context Backdoor Attacks against Graph Prompt Learning.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Attack-free Evaluating and Enhancing Adversarial Robustness on Categorical Data.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024

Defending Jailbreak Prompts via In-Context Adversarial Game.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Humans vs. Machines in Malware Classification.
Proceedings of the 32nd USENIX Security Symposium, 2023

BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Towards Efficient and Domain-Agnostic Evasion Attack with High-Dimensional Categorical Inputs.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Explainable artificial intelligence for cybersecurity: a literature survey.
Ann. des Télécommunications, 2022

Model Stealing Attacks Against Inductive Graph Neural Networks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Towards Understanding the Robustness Against Evasion Attack on Categorical Data.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022

Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Attack Transferability Characterization for Adversarially Robust Multi-label Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Towards Stalkerware Detection with Precise Warnings.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Characterizing the Evasion Attackability of Multi-label Classifiers.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Recurrent Attention Walk for Semi-supervised Classification.
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020

Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Robust Federated Learning via Collaborative Machine Teaching.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Prototypical Networks for Multi-Label Learning.
CoRR, 2019

Robust Federated Training via Collaborative Machine Teaching using Trusted Instances.
CoRR, 2019

Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019

Collaborative Graph Walk for Semi-Supervised Multi-label Node Classification.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

2018
Multi-label Learning with Highly Incomplete Data via Collaborative Embedding.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

2017
RiskTeller: Predicting the Risk of Cyber Incidents.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Predicting Cyber Threats with Virtual Security Products.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Mini-Batch Spectral Clustering.
CoRR, 2016

Accurate spear phishing campaign attribution and early detection.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016


  Loading...