关注
Wei Hong
Wei Hong
在 live.vu.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Graph intelligence enhanced bi-channel insider threat detection
W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu
International Conference on Network and System Security, 86-102, 2022
212022
A graph empowered insider threat detection framework based on daily activities
W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu, C Man
ISA transactions 141, 84-92, 2023
142023
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction
J Yin, G Chen, W Hong, H Wang, J Cao, Y Miao
International Conference on Web Information Systems Engineering, 289-299, 2023
42023
Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks
P Manoharan, W Hong, J Yin, Y Zhang, W Ye, J Ma
International Conference on Web Information Systems Engineering, 179-188, 2023
12023
A heterogeneous graph-based semi-supervised learning framework for access control decision-making
J Yin, G Chen, W Hong, J Cao, H Wang, Y Miao
World Wide Web 27 (4), 35, 2024
2024
Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results
P Xu, W Hong, J Yin, K Wang, Y Zhang
International Conference on Health Information Science, 175-184, 2023
2023
A Study on Historical Behaviour Enabled Insider Threat Prediction
F Xiao, W Hong, J Yin, H Wang, J Cao, Y Zhang
Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint …, 2023
2023
A Compact Vulnerability Knowledge Graph for Risk Assessment
J Yin, W Hong, H Wang, J Cao, Y Miao, Y Zhang
ACM Transactions on Knowledge Discovery from Data, 0
系统目前无法执行此操作,请稍后再试。
文章 1–8