default search action
Min Yu 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation: University of Chinese Academy of Science, School of Cyber Security, Beijing, China
Other persons with the same name
- Min Yu — disambiguation page
- Min Yu 0002 — Imperial College London, Department of Electrical and Electronic Engineering and the Department of Mechanical Engineering, UK
- Min Yu 0003 — Wuhan University of Science and Technology, School of Science, China
- Min Yu 0004 — Guangdong Academy of Medical Sciences, Department of General Surgery, Guangdong Provincial People's Hospital, China
- Min Yu 0005 — National Sun Yat-sen University, Department of Photonics, Kaohsiung, Taiwan
- Min Yu 0006 — Zhejiang University, Institute of VLSI Design, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Ran Liu, Ming Liu, Min Yu, He Zhang, Jianguo Jiang, Gang Li, Weiqing Huang:
SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. ACL (Findings) 2024: 9632-9651 - 2023
- [c36]Yuanyuan Wang, Gengwang Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang:
A Dynamic Malicious Document Detection Method Based on Multi-Memory Features. IFIP Int. Conf. Digital Forensics 2023: 203-218 - 2022
- [e1]Shiva Raj Pokhrel, Min Yu, Gang Li:
Applications and Techniques in Information Security - 12th International Conference, ATIS 2021, Virtual Event, December 16-17, 2021, Revised Selected Papers. Communications in Computer and Information Science 1554, Springer 2022, ISBN 978-981-19-1165-1 [contents] - 2021
- [j3]Jianguo Jiang, Baole Wei, Min Yu, Gang Li, Boquan Li, Chao Liu, Min Li, Weiqing Huang:
An end-to-end text spotter with text relation networks. Cybersecur. 4(1): 7 (2021) - [j2]Jianguo Jiang, Boquan Li, Baole Wei, Gang Li, Chao Liu, Weiqing Huang, Meimei Li, Min Yu:
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation. J. Comput. Secur. 29(4): 403-421 (2021) - [c35]Jianguo Jiang, Boquan Li, Shuai Yu, Chao Liu, Shaohua An, Mingqi Liu, Min Yu:
A Residual Fingerprint-Based Defense Against Adversarial Deepfakes. HPCC/DSS/SmartCity/DependSys 2021: 797-804 - [c34]Jianguo Jiang, Nan Song, Min Yu, Kam-Pui Chow, Gang Li, Chao Liu, Weiqing Huang:
Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning. IFIP Int. Conf. Digital Forensics 2021: 135-155 - [c33]Degang Sun, Yunting Guo, Min Yu, Gang Li, Chao Liu, Jianguo Jiang, Weiqing Huang:
FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching. IJCNN 2021: 1-8 - [c32]Weiqing Huang, Chenggang Jia, Min Yu, Gang Li, Chao Liu, Jianguo Jiang:
UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection. ISCC 2021: 1-7 - [c31]Chao Liu, Shuai Yu, Min Yu, Baole Wei, Boquan Li, Gang Li, Weiqing Huang:
Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. ISCC 2021: 1-7 - [c30]Chao Liu, Xintong Wei, Min Yu, Gang Li, Xiangmei Ma, Jianguo Jiang, Weiqing Huang:
Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels. KSEM 2021: 162-173 - [c29]Jianguo Jiang, Qiang Liu, Min Yu, Gang Li, Mingqi Liu, Chao Liu, Weiqing Huang:
Landscape-Enhanced Graph Attention Network for Rumor Detection. KSEM 2021: 188-199 - [c28]Jianguo Jiang, Chenghao Wang, Min Yu, Chenggang Jia, Gang Li, Chao Liu, Weiqing Huang:
NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary. WASA (2) 2021: 147-159 - 2020
- [c27]Jianguo Jiang, Yue Lu, Min Yu, Yantao Jia, Jiafeng Guo, Chao Liu, Weiqing Huang:
CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection. ECAI 2020: 1834-1841 - [c26]Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv, Bin Lv, Weiqing Huang:
Similarity of Binaries Across Optimization Levels and Obfuscation. ESORICS (1) 2020: 295-315 - [c25]Jianguo Jiang, Zhaoce Liu, Min Yu, Gang Li, Song Li, Chao Liu, Weiqing Huang:
HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph. HPCC/DSS/SmartCity 2020: 328-335 - [c24]Weiqing Huang, Chenggang Jia, Min Yu, Kam-Pui Chow, Jiuming Chen, Chao Liu, Jianguo Jiang:
Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors. IFIP Int. Conf. Digital Forensics 2020: 57-72 - [c23]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Shaohua An, Weiqing Huang:
CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection. ISCC 2020: 1-7 - [c22]Chao Liu, Xiangmei Ma, Min Yu, Xinghua Wu, Mingqi Liu, Jianguo Jiang, Weiqing Huang:
A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition. KSEM (1) 2020: 174-185 - [c21]Meimei Li, Chen Lang, Min Yu, Yue Lu, Chao Liu, Jianguo Jiang, Weiqing Huang:
SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection. KSEM (2) 2020: 288-299 - [c20]Yue Lu, Jianguo Jiang, Min Yu, Chao Liu, Chaochao Liu, Weiqing Huang, Zhiqiang Lv:
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis. KSEM (2) 2020: 450-461
2010 – 2019
- 2019
- [j1]Min Yu, Jianguo Jiang, Gang Li, Chenzhe Lou, Yunzheng Liu, Chao Liu, Weiqing Huang:
Malicious documents detection for business process management based on multi-layer abstract model. Future Gener. Comput. Syst. 99: 517-526 (2019) - [c19]Baole Wei, Min Yu, Kai Chen, Jianguo Jiang:
Deep-BIF: Blind Image Forensics Based on Deep Learning. DSC 2019: 1-6 - [c18]Min Yu, Jianguo Jiang, Gang Li, Jingyuan Li, Chenzhe Lou, Chao Liu, Weiqing Huang, Yuanzhuo Wang:
A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction. HPCC/SmartCity/DSS 2019: 2317-2323 - [c17]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Weiqing Huang, Lejun Fan, Jianfeng Xia:
Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection. ICANN (3) 2019: 711-723 - [c16]Jianguo Jiang, Song Li, Min Yu, Gang Li, Chao Liu, Kai Chen, Hui Liu, Weiqing Huang:
Android Malware Family Classification Based on Sensitive Opcode Sequence. ISCC 2019: 1-7 - [c15]Chao Liu, Xinghua Wu, Min Yu, Gang Li, Jianguo Jiang, Weiqing Huang, Xiang Lu:
A Two-Stage Model Based on BERT for Short Fake News Detection. KSEM (2) 2019: 172-183 - [c14]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. MILCOM 2019: 1-6 - [c13]Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. MILCOM 2019: 109-114 - 2018
- [c12]Chao Liu, Jianan Li, Min Yu, Gang Li, Bo Luo, Kai Chen, Jianguo Jiang, Weiqing Huang:
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls. IPCCC 2018: 1-7 - [c11]Weiqing Huang, Jianfeng Xia, Min Yu, Chao Liu:
MPP: A Join-dividing Method for Multi-table Privacy Preservation. ISCC 2018: 310-315 - [c10]Chao Liu, Bin Xia, Min Yu, Yunzheng Liu:
PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection. ISCC 2018: 825-831 - [c9]Jianguo Jiang, Yue Lu, Min Yu, Gang Li, Chao Liu, Weiqing Huang, Fangtao Zhang:
Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis. KSEM (2) 2018: 221-231 - [c8]Jianguo Jiang, Song Li, Min Yu, Kai Chen, Chao Liu, Weiqing Huang, Gang Li:
MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment. MASS 2018: 64-72 - [c7]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Kunying Liu, Chao Liu, Min Yu, Prasant Mohapatra:
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails. MILCOM 2018: 1-6 - [c6]Jianguo Jiang, Boquan Li, Min Yu, Chao Liu, Jianguo Sun, Weiqing Huang, Zhiqiang Lv:
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks. PCM (2) 2018: 815-825 - [c5]Chao Liu, Jianan Li, Min Yu, Bo Luo, Song Li, Kai Chen, Weiqing Huang, Bin Lv:
FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection. SecureComm (1) 2018: 281-293 - [c4]Jianguo Jiang, Qian Yu, Min Yu, Gang Li, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang:
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS. TrustCom/BigDataSE 2018: 1565-1569 - 2017
- [c3]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu:
A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph. ICDF2C 2017: 130-143 - [c2]Jianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Chao Liu, Kunying Liu, Min Yu, Yongjian Wang:
A Deep Learning Based Online Malicious URL and DNS Detection Scheme. SecureComm 2017: 438-448 - [c1]Min Li, Yunzheng Liu, Min Yu, Gang Li, Yongjian Wang, Chao Liu:
FEPDF: A Robust Feature Extractor for Malicious PDF Detection. TrustCom/BigDataSE/ICESS 2017: 218-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint