Yunhe Cui

Orcid: 0000-0002-0880-675X

According to our database1, Yunhe Cui authored at least 27 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024

2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023

MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023

VERY-RL: An Adaptive Image Steganography Algorithm Based on Reinforcement Learning.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022

Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022

Human mobility and COVID-19 transmission: a systematic review and future directions.
Ann. GIS, 2022

VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021

Towards DDoS detection mechanisms in Software-Defined Networking.
J. Netw. Comput. Appl., 2021

ADVICE: Towards adaptive scheduling for data collection and DDoS detection in SDN.
J. Inf. Secur. Appl., 2021

Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges.
Int. J. Digit. Earth, 2021

Image-based malware classification using section distribution information.
Comput. Secur., 2021

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021

METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability.
Telecommun. Syst., 2020

LNAD: Towards Lightweight Network Anomaly Detection in Software-Defined Networking.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018

2017
A hybrid EDA for load balancing in multicast with network coding.
Appl. Soft Comput., 2017

SD-HDC: Software-Defined Hybrid Optical/Electrical Data Center Architecture.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks.
J. Netw. Comput. Appl., 2016

2012
An Improved Distance Estimation Algorithm Based on Generalized CRT.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012


  Loading...