default search action
Yuede Ji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Qiang Fu, Yuede Ji, Thomas B. Rolinger, H. Howie Huang:
TLPGNN: A Lightweight Two-level Parallelism Paradigm for Graph Neural Network Computation on Single and Multiple GPUs. ACM Trans. Parallel Comput. 11(2): 7 (2024) - [j10]Lei Cui, Junnan Yin, Jiancong Cui, Yuede Ji, Peng Liu, Zhiyu Hao, Xiaochun Yun:
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. IEEE Trans. Software Eng. 50(8): 2142-2162 (2024) - [c21]Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Cinzia Squicciarini, Ram Dantu, Juanjuan Zhao, Cheng-Zhong Xu:
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing. EDBT 2024: 373-385 - [c20]Trent Reichenbach, Chenglong Fu, Xiaojiang Du, Jia Di, Yuede Ji:
TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing. ICC 2024: 4084-4089 - [c19]Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue:
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection. USENIX Security Symposium 2024 - [i5]Chenfei Nie, Qiang Li, Yuxin Yang, Yuede Ji, Binghui Wang:
Efficient Byzantine-Robust and Provably Privacy-Preserving Federated Learning. CoRR abs/2407.19703 (2024) - [i4]Chu Qiao, Cong Wang, Zhenkai Zhang, Yuede Ji, Xing Gao:
Caching Aided Multi-Tenant Serverless Computing. CoRR abs/2408.00957 (2024) - 2023
- [c18]Lei Cui, Jiancong Cui, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding:
API2Vec: Learning Representations of API Sequences for Malware Detection. ISSTA 2023: 261-273 - [c17]Wang Feng, Shiyang Chen, Hang Liu, Yuede Ji:
PeeK: A Prune-Centric Approach for K Shortest Path Computation. SC 2023: 18:1-18:14 - [c16]Shiyang Chen, Da Zheng, Caiwen Ding, Chengying Huan, Yuede Ji, Hang Liu:
TANGO: re-thinking quantization for graph neural network training on GPUs. SC 2023: 38:1-38:14 - [i3]Haoyu He, Yuede Ji, H. Howie Huang:
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. CoRR abs/2303.14836 (2023) - [i2]Shiyang Chen, Da Zheng, Caiwen Ding, Chengying Huan, Yuede Ji, Hang Liu:
Tango: rethinking quantization for graph neural network training on GPUs. CoRR abs/2308.00890 (2023) - 2022
- [j9]Yuede Ji, Hang Liu, Yang Hu, H. Howie Huang:
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. ACM Trans. Parallel Comput. 9(3): 13:1-13:27 (2022) - [c15]Haoyu He, Yuede Ji, H. Howie Huang:
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. EuroS&P 2022: 74-89 - [c14]Qiang Fu, Yuede Ji, H. Howie Huang:
TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on GPU. HPDC 2022: 122-134 - [c13]Yuede Ji, H. Howie Huang:
NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks. ICC 2022: 2694-2699 - [i1]Chenxu Jiang, Chenglong Fu, Zhenyu Zhao, Xiaojiang Du, Yuede Ji:
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals. CoRR abs/2201.07954 (2022) - 2021
- [j8]Longkang Shang, Dong Guo, Yuede Ji, Qiang Li:
Discovering unknown advanced persistent threat using shared features mined by neural networks. Comput. Networks 189: 107937 (2021) - [c12]Yuede Ji, Lei Cui, H. Howie Huang:
Vestige: Identifying Binary Code Provenance for Vulnerability Detection. ACNS (2) 2021: 287-310 - [c11]Yuede Ji, Lei Cui, H. Howie Huang:
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. AsiaCCS 2021: 702-715 - [c10]Yuede Ji, Mohamed Elsabagh, Ryan Johnson, Angelos Stavrou:
DEFInit: An Analysis of Exposed Android Init Routines. USENIX Security Symposium 2021: 3685-3702 - 2020
- [j7]Qi Wang, Yuede Ji, Yongsheng Hao, Jie Cao:
GRL: Knowledge graph completion with GAN-based reinforcement learning. Knowl. Based Syst. 209: 106421 (2020) - [c9]Yuede Ji, Hang Liu, H. Howie Huang:
SWARMGRAPH: Analyzing Large-Scale In-Memory Graphs on GPUs. HPCC/DSS/SmartCity 2020: 52-59 - [c8]Yuede Ji, H. Howie Huang:
Aquila: Adaptive Parallel Computation of Graph Connectivity Queries. HPDC 2020: 149-160 - [c7]Benjamin Bowman, Craig Laprade, Yuede Ji, H. Howie Huang:
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI. RAID 2020: 257-268
2010 – 2019
- 2019
- [j6]Bo Feng, Qiang Li, Yuede Ji, Dong Guo, Xiangyu Meng:
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users. Secur. Commun. Networks 2019: 3053418:1-3053418:14 (2019) - [c6]Yuede Ji, Benjamin Bowman, H. Howie Huang:
Securing Malware Cognitive Systems against Adversarial Attacks. ICCC 2019: 1-9 - 2018
- [c5]Yuede Ji, Hang Liu, H. Howie Huang:
iSpan: parallel identification of strongly connected components with spanning trees. SC 2018: 58:1-58:12 - 2017
- [j5]Yukun He, Qiang Li, Jian Cao, Yuede Ji, Dong Guo:
Understanding socialbot behavior on end hosts. Int. J. Distributed Sens. Networks 13(2) (2017) - 2016
- [j4]Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li:
Combating the evasion mechanisms of social bots. Comput. Secur. 58: 230-249 (2016) - [j3]Jian Cao, Qiang Li, Yuede Ji, Yukun He, Dong Guo:
Detection of Forwarding-Based Malicious URLs in Online Social Networks. Int. J. Parallel Program. 44(1): 163-180 (2016) - 2015
- [j2]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection. Int. J. Distributed Sens. Networks 11: 524627:1-524627:17 (2015) - [j1]Yuede Ji, Qiang Li, Yukun He, Dong Guo:
BotCatch: leveraging signature and behavior for bot detection. Secur. Commun. Networks 8(6): 952-969 (2015) - 2014
- [c4]Yuede Ji, Yukun He, Xinyang Jiang, Qiang Li:
Towards social botnet behavior detecting in the end host. ICPADS 2014: 320-327 - [c3]Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, Dong Guo:
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. ISPEC 2014: 75-89 - 2013
- [c2]Yuede Ji, Yukun He, Qiang Li, Dong Guo:
BotCatch: A Behavior and Signature Correlated Bot Detection Approach. HPCC/EUC 2013: 1634-1639 - [c1]Yukun He, Qiang Li, Yuede Ji, Dong Guo:
BotInfer: A Bot Inference Approach by Correlating Host and Network Information. NPC 2013: 356-367
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint