Yanhao Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification.
IEEE/ACM Trans. Netw., June, 2024

FAUC-S: Deep AUC maximization by focusing on hard samples.
Neurocomputing, February, 2024

STMAP: A novel semantic text matching model augmented with embedding perturbations.
Inf. Process. Manag., January, 2024

SaTC: Shared-Keyword Aware Taint Checking for Detecting Bugs in Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2024

A Semantics-Based Approach on Binary Function Similarity Detection.
IEEE Internet Things J., 2024

FedMCP: Parameter-Efficient Federated Learning with Model-Contrastive Personalization.
CoRR, 2024

Topic-aware Most Influential Community Search in Social Networks.
CoRR, 2024

Dynamic vessel schedule recovery strategy of liner shipping with uncertainties: An event-triggered model predictive control solution.
Comput. Ind. Eng., 2024

Vulnerability-oriented Testing for RESTful APIs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Predecessor-aware Directed Greybox Fuzzing.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

AirTaint: Making Dynamic Taint Analysis Faster and Easier.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

AFGen: Whole-Function Fuzzing for Applications and Libraries.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Collaborative Graph Neural Networks with Contrastive Learning for Sequential Recommendation.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
FAFuse: A Four-Axis Fusion framework of CNN and Transformer for medical image segmentation.
Comput. Biol. Medicine, November, 2023

FGFR3 mutation characterization identifies prognostic and immune-related gene signatures in bladder cancer.
Comput. Biol. Medicine, August, 2023

Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem.
IEEE Trans. Software Eng., July, 2023

GeeSolver: A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SAWD: Structural-Aware Webshell Detection System with Control Flow Graph.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Understanding the Effects of Structured Note-taking Systems for Video-based Learners in Individual and Social Learning Contexts.
Proc. ACM Hum. Comput. Interact., 2022

SEAF: A Scalable, Efficient, and Application-independent Framework for container security detection.
J. Inf. Secur. Appl., 2022

PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

HTFuzz: Heap Operation Sequence Sensitive Fuzzing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Large-scale Security Measurements on the Android Firmware Ecosystem.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

StoryBuddy: A Human-AI Collaborative Chatbot for Parent-Child Interactive Storytelling with Flexible Parental Involvement.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Blindfolded Attackers Still Threatening: Strict Black-Box Adversarial Attacks on Graphs.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Efficient Deployment of Electric Vehicle Charging Infrastructure: Simultaneous Optimization of Charging Station Placement and Charging Pile Assignment.
IEEE Trans. Intell. Transp. Syst., 2021

Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

NoteCoStruct: Powering Online Learners with Socially Scaffolded Note Taking and Sharing.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Query-free Black-box Adversarial Attacks on Graphs.
CoRR, 2020

Multi-Model Method Decentralized Adaptive Control for a Class of Discrete-Time Multi-Agent Systems.
IEEE Access, 2020

Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
A Predictive Data Feature Exploration-Based Air Quality Prediction Approach.
IEEE Access, 2019

Fuzzing Program Logic Deeply Hidden in Binary Program Stages.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2016
Efficient Fingerprinting-Based Android Device Identification With Zero-Permission Identifiers.
IEEE Access, 2016

2012
Performance evaluation and analysis of SEU Cloud Computing Platform - Using general benchmarks and real world AMS application.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012


  Loading...