Aimin Yu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition.
Cybersecur., 2022
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs.
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE Military Communications Conference, 2022
2021
Intertwined Carbon Nanotubes and Ag Nanowires Constructed by Simple Solution Blending as Sensitive and Stable Chloramphenicol Sensors.
Sensors, 2021
CoRR, 2021
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020
Peer-to-Peer Netw. Appl., 2020
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment.
Int. J. Distributed Sens. Networks, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
Secur. Commun. Networks, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
Int. J. Inf. Commun. Technol., 2018
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing.
Cybersecur., 2018
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters.
Proceedings of the 17th IEEE International Conference On Trust, 2018
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model.
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
2013
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013
2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2004
Generalized variational principle on nonlinear theory of naturally curved and twisted beams.
Appl. Math. Comput., 2004