Shuyuan Jin

Orcid: 0000-0003-2087-2853

According to our database1, Shuyuan Jin authored at least 52 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ContexLog: Non-Parsing Log Anomaly Detection With All Information Preservation and Enhanced Contextual Representation.
IEEE Trans. Netw. Serv. Manag., August, 2024

MC-Det: Multi-channel representation fusion for malicious domain name detection.
Comput. Networks, 2024

CoMDet: A Contrastive Multimodal Pre-Training Approach to Encrypted Malicious Traffic Detection.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

2023
AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features.
IEEE Trans. Netw. Serv. Manag., September, 2023

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

FastDet: Detecting Encrypted Malicious Traffic Faster via Early Exit.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Inter-cloud secure data sharing and its formal verification.
Trans. Emerg. Telecommun. Technol., 2022

DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control.
Comput. Secur., 2022

FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

MEMTD: Encrypted Malware Traffic Detection Using Multimodal Deep Learning.
Proceedings of the Web Engineering - 22nd International Conference, 2022

2021
Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Unsupervised Anomaly Detection Based on System Logs.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

A Dynamic Access Control Model Based on Game Theory for the Cloud.
Proceedings of the IEEE Global Communications Conference, 2021

Vulnerability Detection in C/C++ Source Code With Graph Representation Learning.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Measuring Information Leakage of DNS Server.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Privacy-aware OrLa Based Access Control Model in the Cloud.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

A simple function embedding approach for binary similarity detection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Real-time detection of cloud tenant malicious behavior based on CNN.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Web Attack Detection Based on User Behaviour Semantics.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Which DGA Family does A Malicious Domain Name Belong To.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Towards Natural and Accurate Future Motion Prediction of Humans and Animals.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2017
Energy-Efficient Virtual Resource Dynamic Integration Method in Cloud Computing.
IEEE Access, 2017

2016
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.
Int. J. Commun. Syst., 2016

A Topic Model for Hierarchical Documents.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Privacy theft malware multi-process collaboration analysis.
Secur. Commun. Networks, 2015

Botnet spoofing: fighting botnet with itself.
Secur. Commun. Networks, 2015

Fast Search to Detect Communities by Truncated Inverse Page Rank in Social Networks.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

XSS Vulnerability Detection Using Optimized Attack Vector Repertory.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
Predicting Network Security Situation Based on a Combination Model of Multiple Neural Networks.
Int. J. Softw. Informatics, 2014

Software Vulnerability Severity Evaluation Based on Economic Losses.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

DDoS Detection Based on Second-Order Features and Machine Learning.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

A uniform framework for community detection via influence maximization in social networks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

Online Social Network Model Based on Local Preferential Attachment.
Proceedings of the Web Technologies and Applications, 2014

2012
Matching sequences of salient contour points characterized by Voronoi region features.
Vis. Comput., 2012

Optimal mining on security labels for decentralized information flow control.
Comput. Secur., 2012

Automatic Covert Channel Detection in Asbestos System (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Online Traffic Classification Based on Co-training Method.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Privacy Theft Malware Detection with Privacy Petri Net.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Network Security Situation Prediction Based on BP and RBF Neural Network.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research of Network Vulnerability Analysis Based on Attack Capability Transfer.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A unique property of single-link distance and its application in data clustering.
Data Knowl. Eng., 2011

CNSSA: A Comprehensive Network Security Situation Awareness System.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Network Threat Assessment Based on Alert Verification.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Poster: towards formal verification of DIFC policies.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
A review of classification methods for network vulnerability.
Proceedings of the IEEE International Conference on Systems, 2009

2007
Covariance-Matrix Modeling and Detecting Various Flooding Attacks.
IEEE Trans. Syst. Man Cybern. Part A, 2007

Network intrusion detection in covariance feature space.
Pattern Recognit., 2007

Internet Anomaly Detection Based on Statistical Covariance Matrix.
Int. J. Pattern Recognit. Artif. Intell., 2007

2005
A feature space analysis for anomaly detection.
Proceedings of the IEEE International Conference on Systems, 2005

A Covariance Matrix Based Approach to Internet Anomaly Detection.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

2004
A covariance analysis model for DDoS attack detection.
Proceedings of IEEE International Conference on Communications, 2004


  Loading...