Detecting lateral movement in enterprise computer networks with unsupervised graph {AI} B Bowman, C Laprade, Y Ji, HH Huang 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 79 | 2020 |
Detection of forwarding-based malicious URLs in online social networks J Cao, Q Li, Y Ji, Y He, D Guo International Journal of Parallel Programming 44, 163-180, 2016 | 78 | 2016 |
Combating the evasion mechanisms of social bots Y Ji, Y He, X Jiang, J Cao, Q Li computers & security 58, 230-249, 2016 | 64 | 2016 |
GRL: Knowledge graph completion with GAN-based reinforcement learning Q Wang, Y Ji, Y Hao, J Cao Knowledge-Based Systems 209, 106421, 2020 | 47 | 2020 |
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees Y Ji, H Liu, Y Hu, HH Huang ACM Transactions on Parallel Computing 9 (3), 1-27, 2022 | 45 | 2022 |
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network Y Ji, L Cui, HH Huang Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 41 | 2021 |
Securing malware cognitive systems against adversarial attacks Y Ji, B Bowman, HH Huang 2019 IEEE international conference on cognitive computing (ICCC), 1-9, 2019 | 28 | 2019 |
Stopping the cyberattack in the early stage: assessing the security risks of social network users B Feng, Q Li, Y Ji, D Guo, X Meng Security and Communication Networks 2019 (1), 3053418, 2019 | 28 | 2019 |
A mulitiprocess mechanism of evading behavior-based bot detection approaches Y Ji, Y He, D Zhu, Q Li, D Guo Information Security Practice and Experience: 10th International Conference …, 2014 | 27 | 2014 |
Discovering unknown advanced persistent threat using shared features mined by neural networks L Shang, D Guo, Y Ji, Q Li Computer Networks 189, 107937, 2021 | 20 | 2021 |
TLPGNN: A lightweight two-level parallelism paradigm for graph neural network computation on GPU Q Fu, Y Ji, HH Huang Proceedings of the 31st International Symposium on High-Performance Parallel …, 2022 | 18 | 2022 |
Botcatch: leveraging signature and behavior for bot detection Y Ji, Q Li, Y He, D Guo Security and Communication Networks 8 (6), 952-969, 2015 | 16 | 2015 |
Towards social botnet behavior detecting in the end host Y Ji, Y He, X Jiang, Q Li 2014 20th IEEE International Conference on Parallel and Distributed Systems …, 2014 | 15 | 2014 |
Illuminati: Towards explaining graph neural networks for cybersecurity analysis H He, Y Ji, HH Huang 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 74-89, 2022 | 14 | 2022 |
Vestige: Identifying Binary Code Provenance for Vulnerability Detection Y Ji, L Cui, HH Huang International Conference on Applied Cryptography and Network Security, 287-310, 2021 | 14 | 2021 |
Aquila: Adaptive parallel computation of graph connectivity queries Y Ji, HH Huang Proceedings of the 29th International Symposium on High-Performance Parallel …, 2020 | 11 | 2020 |
Overhead analysis and evaluation of approaches to host-based bot detection Y Ji, Q Li, Y He, D Guo International Journal of Distributed Sensor Networks 11 (5), 524627, 2015 | 11 | 2015 |
Understanding socialbot behavior on end hosts Y He, Q Li, J Cao, Y Ji, D Guo International Journal of Distributed Sensor Networks 13 (2), 1550147717694170, 2017 | 10 | 2017 |
Api2vec: Learning representations of api sequences for malware detection L Cui, J Cui, Y Ji, Z Hao, L Li, Z Ding Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 8 | 2023 |
Swarmgraph: Analyzing large-scale in-memory graphs on gpus Y Ji, H Liu, HH Huang 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 8 | 2020 |