Yufei Han

Orcid: 0000-0002-9035-6718

According to our database1, Yufei Han authored at least 79 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Defending Jailbreak Prompts via In-Context Adversarial Game.
CoRR, 2024

Manipulating Predictions over Discrete Inputs in Machine Teaching.
CoRR, 2024

BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Polarization Guided HDR Reconstruction via Pixel-Wise Depolarization.
IEEE Trans. Image Process., 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

MS-UNet-v2: Adaptive Denoising Method and Training Strategy for Medical Image Segmentation with Small Training Data.
CoRR, 2023

BadVFL: Backdoor Attacks in Vertical Federated Learning.
CoRR, 2023

Humans vs. Machines in Malware Classification.
Proceedings of the 32nd USENIX Security Symposium, 2023

BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

MS-UNet: Swin Transformer U-Net with Multi-scale Nested Decoder for Medical Image Segmentation with Small Training Data.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Coordinated Reconstruction Dual-Branch Network for Low-Dose PET Reconstruction.
Proceedings of the Theoretical Computer Science - 41st National Conference, 2023

Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Towards Efficient and Domain-Agnostic Evasion Attack with High-Dimensional Categorical Inputs.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Variable Tap-Length Algorithm Based on a Mixed Error Cost Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Mixed Error Variable Step-Size Algorithm with Constrained Function.
Circuits Syst. Signal Process., 2022

Explainable artificial intelligence for cybersecurity: a literature survey.
Ann. des Télécommunications, 2022

Model Stealing Attacks Against Inductive Graph Neural Networks.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Hybrid Pre-training Based on Masked Autoencoders for Medical Image Segmentation.
Proceedings of the Theoretical Computer Science - 40th National Conference, 2022

Towards Understanding the Robustness Against Evasion Attack on Categorical Data.
Proceedings of the Tenth International Conference on Learning Representations, 2022

VC-Tune: Tuning and Exploring Distributed Vertex-Centric Graph Systems.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes.
Proceedings of the Risks and Security of Internet and Systems, 2022

Finding MNEMON: Reviving Memories of Node Embeddings.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Research on Influencing Factors of User Satisfaction of Knowledge Paid Products - from the Aspect of Heuristic-Systematic Model.
Proceedings of the 20th Wuhan International Conference on E-Business, 2021

Attack Transferability Characterization for Adversarially Robust Multi-label Classification.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

Learning to dehaze with polarization.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Do Bond Investors Care about Margin Trading and Securities lending?: - - An Empirical Study Based on Secondary Market of Medium Term Notes.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Towards Stalkerware Detection with Precise Warnings.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Characterizing the Evasion Attackability of Multi-label Classifiers.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Optimal Sensor and Relay Nodes Power Scheduling for Remote State Estimation with Energy Constraint.
Sensors, 2020

A 0.6V 44.6 ppm/ºC subthreshold CMOS voltage reference with wide temperature range and inherent leakage compensation.
Integr., 2020

Entropy-Based Pattern Learning Based on Singular Spectrum Analysis Components for Assessment of Physiological Signals.
Complex., 2020

Recurrent Attention Walk for Semi-supervised Classification.
Proceedings of the WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining, 2020

Attackability Characterization of Adversarial Evasion Attack on Discrete Data.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Screening NLOS Anchor Nodes with Ellipsoid Constraint in 3D Positioning.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Robust Multi-Output Learning with Highly Incomplete Data via Restricted Boltzmann Machines.
Proceedings of the 9th European Starting AI Researchers' Symposium 2020 co-located with 24th European Conference on Artificial Intelligence (ECAI 2020), 2020

Robust Federated Learning via Collaborative Machine Teaching.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Prototypical Networks for Multi-Label Learning.
CoRR, 2019

Robust Federated Training via Collaborative Machine Teaching using Trusted Instances.
CoRR, 2019

Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019

Identification of Emotional Valences via Memory-Informed Deep Neural Network with Entropy Features.
Proceedings of the 4th International Conference on Multimedia Systems and Signal Processing, 2019

Collaborative Graph Walk for Semi-Supervised Multi-label Node Classification.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

2018
Identification of Auditory Object-Specific Attention from Single-Trial Electroencephalogram Signals via Entropy Measures and Machine Learning.
Entropy, 2018

An improved variable tap-length algorithm with adaptive parameters.
Digit. Signal Process., 2018

Multi-label Learning with Highly Incomplete Data via Collaborative Embedding.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

2017
Using customer-related data to enhance e-grocery home delivery.
Ind. Manag. Data Syst., 2017

Variable Tap-Length NLMS Algorithm with Adaptive Parameter.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Mini-batch spectral clustering.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

RiskTeller: Predicting the Risk of Cyber Incidents.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Predicting Cyber Threats with Virtual Security Products.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Analysis of Large-Scale Traffic Dynamics in an Urban Transportation Network Using Non-Negative Tensor Factorization.
Int. J. Intell. Transp. Syst. Res., 2016

Mini-Batch Spectral Clustering.
CoRR, 2016

Accurate spear phishing campaign attribution and early detection.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2014
GMRF Estimation under Topological and Spectral Constraints.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

On the impact of socio-economic factors on power load forecasting.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2012
Statistical Traffic State Analysis in Large-scale Transportation Networks Using Locality-Preserving Non-negative Matrix Factorization
CoRR, 2012

Analysis of Large-scale Traffic Dynamics using Non-negative Tensor Factorization
CoRR, 2012

Pairwise MRF Calibration by Perturbation of the Bethe Reference Point
CoRR, 2012

2011
Analysis of network-level traffic states using locality preservative non-negative matrix factorization.
Proceedings of the 14th International IEEE Conference on Intelligent Transportation Systems, 2011

2010
Spatial and temporal analysis of traffic states on large scale networks.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

The characteristics of post-seismic surface deformation of the Wenchuan MS8.0 earthquake from InSAR.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

2009
Palmprint recognition using coarse-to-fine statistical image representation.
Proceedings of the International Conference on Image Processing, 2009

Accurate Palmprint Recognition Using Spatial Bags of Local Layered Descriptors.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

Palmprint Recognition Based on Regional Rank Correlation of Directional Features.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

2008
Combine hierarchical appearance statistics for accurate palmprint recognition.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Palmprint image synthesis: A preliminary study.
Proceedings of the International Conference on Image Processing, 2008

2007
Identity Verification by Using Handprint.
Proceedings of the Advances in Biometrics, International Conference, 2007

Embedded Palmprint Recognition System on Mobile Devices.
Proceedings of the Advances in Biometrics, International Conference, 2007

Palmprint Recognition Based on Directional Features and Graph Matching.
Proceedings of the Advances in Biometrics, International Conference, 2007

Fusion of Face and Palmprint for Personal Identification Based on Ordinal Features.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

Palmprint Recognition Under Unconstrained Scenes.
Proceedings of the Computer Vision, 2007

Learning Gabor Magnitude Features for Palmprint Recognition.
Proceedings of the Computer Vision, 2007


  Loading...