Yunhe Cui

Orcid: 0000-0002-0880-675X

According to our database1, Yunhe Cui authored at least 38 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Security Enhanced Computation Offloading for Collaborative Inference at Semantic-Communication-Empowered Edge.
IEEE Trans. Mob. Comput., September, 2025

Robust Image Watermarking Based on Hybrid Transform and Position-Adaptive Selection.
Circuits Syst. Signal Process., April, 2025

A multi-level additive distortion method for security improvement in palette image steganography.
J. Vis. Commun. Image Represent., 2025

CPSketch: A 'couple' sketch-based heavy flow detection method.
J. Netw. Comput. Appl., 2025

Towards saturation attack detection in SDN: a multi-edge representation learning-based method.
J. King Saud Univ. Comput. Inf. Sci., 2025

End-to-end robust and transparent image watermarking method for screen-shooting scenarios.
J. Electronic Imaging, 2025

A Clustering-Based Color Reordering Method for Reversible Data Hiding in Palette Images.
IET Image Process., 2025

2024
Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024

SNDMI: Spyware network traffic detection method based on inducement operations.
Comput. Secur., 2024

Mapping the landscape and roadmap of geospatial artificial intelligence (GeoAI) in quantitative human geography: An extensive systematic review.
Int. J. Appl. Earth Obs. Geoinformation, 2024

NFAERCOM: A Near-Far Area Experience Replay-based Computation Offloading Method.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

MT-EPTNet: Multi-task Acoustic Scene Classification with Efficient Parameter Tuning.
Proceedings of the Neural Information Processing - 31st International Conference, 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023

MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023

VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022

Human mobility and COVID-19 transmission: a systematic review and future directions.
Ann. GIS, 2022

VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021

Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN.
J. Inf. Secur. Appl., 2021

Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges.
Int. J. Digit. Earth, 2021

Image-based malware classification using section distribution information.
Comput. Secur., 2021

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021

METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability.
Telecommun. Syst., 2020

LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

2017
A hybrid EDA for load balancing in multicast with network coding.
Appl. Soft Comput., 2017

SD-HDC: Software-Defined Hybrid Optical/Electrical Data Center Architecture.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks.
J. Netw. Comput. Appl., 2016

2012
An Improved Distance Estimation Algorithm Based on Generalized CRT.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012


  Loading...