Jiao Yin

Orcid: 0000-0002-0269-2624

Affiliations:
  • La Trobe University, Melbourne, Australia
  • Chongqing University of Arts and Sciences, Chongqin, China


According to our database1, Jiao Yin authored at least 26 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Compact Vulnerability Knowledge Graph for Risk Assessment.
ACM Trans. Knowl. Discov. Data, September, 2024

A heterogeneous graph-based semi-supervised learning framework for access control decision-making.
World Wide Web (WWW), July, 2024

Trustworthy semi-supervised anomaly detection for online-to-offline logistics business in merchant identification.
CAAI Trans. Intell. Technol., 2024

2023
A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services.
Health Inf. Sci. Syst., December, 2023

Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery.
IEEE Trans. Ind. Informatics, April, 2023

A knowledge graph empowered online learning framework for access control decision-making.
World Wide Web (WWW), March, 2023

Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Blockchain-Empowered Resource Allocation and Data Security for Efficient Vehicular Edge Computing.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Multi-step reinforcement learning-based offloading for vehicle edge computing.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

Optimizing the Size of Peritumoral Region for Assessing Non-Small Cell Lung Cancer Heterogeneity Using Radiomics.
Proceedings of the Health Information Science - 12th International Conference, 2023

Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results.
Proceedings of the Health Information Science - 12th International Conference, 2023

Unveiling the Pandemic's Impact: A Dataset for Probing COVID-19's Effects on E-Learning Activities and Academic Performance.
Proceedings of the Health Information Science - 12th International Conference, 2023

A Study on Historical Behaviour Enabled Insider Threat Prediction.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

Surveying the Landscape: Compound Methods for Aspect-Based Sentiment Analysis.
Proceedings of the Databases Theory and Applications, 2023

Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning.
World Wide Web, 2022

A real-time dynamic concept adaptive learning algorithm for exploitability prediction.
Neurocomputing, 2022

Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments.
IEEE Trans. Ind. Informatics, 2021

A Minority Class Boosted Framework for Adaptive Access Control Decision-Making.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

2020
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description.
Knowl. Based Syst., 2020

Adaptive Online Learning for Vulnerability Exploitation Time Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group.
Proceedings of the Databases Theory and Applications, 2020

2019
An Integrated MCI Detection Framework Based on Spectral-temporal Analysis.
Int. J. Autom. Comput., 2019

A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019


  Loading...