Follow
Yuede Ji
Title
Cited by
Cited by
Year
Detecting lateral movement in enterprise computer networks with unsupervised graph {AI}
B Bowman, C Laprade, Y Ji, HH Huang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
992020
Detection of forwarding-based malicious URLs in online social networks
J Cao, Q Li, Y Ji, Y He, D Guo
International Journal of Parallel Programming 44, 163-180, 2016
782016
Combating the evasion mechanisms of social bots
Y Ji, Y He, X Jiang, J Cao, Q Li
computers & security 58, 230-249, 2016
662016
GRL: Knowledge graph completion with GAN-based reinforcement learning
Q Wang, Y Ji, Y Hao, J Cao
Knowledge-Based Systems 209, 106421, 2020
532020
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees
Y Ji, H Liu, Y Hu, HH Huang
ACM Transactions on Parallel Computing 9 (3), 1-27, 2022
502022
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network
Y Ji, L Cui, HH Huang
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
442021
Securing malware cognitive systems against adversarial attacks
Y Ji, B Bowman, HH Huang
2019 IEEE international conference on cognitive computing (ICCC), 1-9, 2019
332019
A mulitiprocess mechanism of evading behavior-based bot detection approaches
Y Ji, Y He, D Zhu, Q Li, D Guo
Information Security Practice and Experience: 10th International Conference …, 2014
312014
Stopping the cyberattack in the early stage: assessing the security risks of social network users
B Feng, Q Li, Y Ji, D Guo, X Meng
Security and Communication Networks 2019 (1), 3053418, 2019
292019
TLPGNN: A lightweight two-level parallelism paradigm for graph neural network computation on GPU
Q Fu, Y Ji, HH Huang
Proceedings of the 31st International Symposium on High-Performance Parallel …, 2022
232022
Discovering unknown advanced persistent threat using shared features mined by neural networks
L Shang, D Guo, Y Ji, Q Li
Computer Networks 189, 107937, 2021
232021
Illuminati: Towards explaining graph neural networks for cybersecurity analysis
H He, Y Ji, HH Huang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 74-89, 2022
192022
Api2vec: Learning representations of api sequences for malware detection
L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
172023
Botcatch: leveraging signature and behavior for bot detection
Y Ji, Q Li, Y He, D Guo
Security and Communication Networks 8 (6), 952-969, 2015
172015
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Y Ji, L Cui, HH Huang
International Conference on Applied Cryptography and Network Security, 287-310, 2021
162021
Towards social botnet behavior detecting in the end host
Y Ji, Y He, X Jiang, Q Li
2014 20th IEEE International Conference on Parallel and Distributed Systems …, 2014
162014
Code is not natural language: Unlock the power of semantics-oriented graph representation for binary code similarity detection
H He, X Lin, Z Weng, R Zhao, S Gan, L Chen, Y Ji, J Wang, Z Xue
33rd USENIX Security Symposium (USENIX Security 24), PHILADELPHIA, PA, 2024
112024
Aquila: Adaptive parallel computation of graph connectivity queries
Y Ji, HH Huang
Proceedings of the 29th International Symposium on High-Performance Parallel …, 2020
112020
Overhead analysis and evaluation of approaches to host-based bot detection
Y Ji, Q Li, Y He, D Guo
International Journal of Distributed Sensor Networks 11 (5), 524627, 2015
112015
Understanding socialbot behavior on end hosts
Y He, Q Li, J Cao, Y Ji, D Guo
International Journal of Distributed Sensor Networks 13 (2), 1550147717694170, 2017
102017
The system can't perform the operation now. Try again later.
Articles 1–20