Graph intelligence enhanced bi-channel insider threat detection W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu International Conference on Network and System Security, 86-102, 2022 | 21 | 2022 |
A graph empowered insider threat detection framework based on daily activities W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu, C Man ISA transactions 141, 84-92, 2023 | 14 | 2023 |
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction J Yin, G Chen, W Hong, H Wang, J Cao, Y Miao International Conference on Web Information Systems Engineering, 289-299, 2023 | 4 | 2023 |
Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks P Manoharan, W Hong, J Yin, Y Zhang, W Ye, J Ma International Conference on Web Information Systems Engineering, 179-188, 2023 | 1 | 2023 |
A heterogeneous graph-based semi-supervised learning framework for access control decision-making J Yin, G Chen, W Hong, J Cao, H Wang, Y Miao World Wide Web 27 (4), 35, 2024 | | 2024 |
Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results P Xu, W Hong, J Yin, K Wang, Y Zhang International Conference on Health Information Science, 175-184, 2023 | | 2023 |
A Study on Historical Behaviour Enabled Insider Threat Prediction F Xiao, W Hong, J Yin, H Wang, J Cao, Y Zhang Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint …, 2023 | | 2023 |
A Compact Vulnerability Knowledge Graph for Risk Assessment J Yin, W Hong, H Wang, J Cao, Y Miao, Y Zhang ACM Transactions on Knowledge Discovery from Data, 0 | | |