Yongjun Wang

Orcid: 0000-0001-9883-2099

According to our database1, Yongjun Wang authored at least 149 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Calibrated One-Class Classification for Unsupervised Time Series Anomaly Detection.
IEEE Trans. Knowl. Data Eng., November, 2024

An Energy Matching Vessel Segmentation Framework in 3-D Medical Images.
IEEE Trans. Medical Imaging, April, 2024

Vegetation Classification and Evaluation of Yancheng Coastal Wetlands Based on Random Forest Algorithm from Sentinel-2 Images.
Remote. Sens., April, 2024

Simultaneous Automatic Picking and Manual Picking Refinement for First-Break.
IEEE Trans. Geosci. Remote. Sens., 2024

Relationships between brain structure-function coupling in normal aging and cognition: A cross-ethnicity population-based study.
NeuroImage, 2024

Enhancing large language model capabilities for rumor detection with Knowledge-Powered Prompting.
Eng. Appl. Artif. Intell., 2024

NeRF-Guided Unsupervised Learning of RGB-D Registration.
CoRR, 2024

Fuzzing JavaScript engines with a syntax-aware neural program model.
Comput. Secur., 2024

CT perfusion parameter estimation in stroke using neural network with transformer and physical model priors.
Comput. Biol. Medicine, 2024

A clinically actionable and explainable real-time risk assessment framework for stroke-associated pneumonia.
Artif. Intell. Medicine, 2024

ExpMD: an Explainable Framework for Traffic Identification Based on Multi-Domain Features.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

Learning Dual-arm Object Rearrangement for Cartesian Robots.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

2023
Deep Isolation Forest for Anomaly Detection.
IEEE Trans. Knowl. Data Eng., December, 2023

More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate.
J. Inf. Secur. Appl., December, 2023

Rumor detection on social networks focusing on endogenous psychological motivation.
Neurocomputing, October, 2023

RoSAS: Deep semi-supervised anomaly detection with contamination-resilient continuous supervision.
Inf. Process. Manag., September, 2023

Segmentation of individual trees in urban MLS point clouds using a deep learning framework based on cylindrical convolution network.
Int. J. Appl. Earth Obs. Geoinformation, September, 2023

DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic.
Comput. J., May, 2023

The nonalcoholic fatty liver risk in prediction of unfavorable outcome after stroke: A nationwide registry analysis.
Comput. Biol. Medicine, May, 2023

Quaternion Wavelet Transform and a Feedforward Neural Network-Aided Intelligent Distributed Optical Fiber Sensing System.
Sensors, April, 2023

A Deep Learning System to Predict Recurrence and Disability Outcomes in Patients with Transient Ischemic Attack or Ischemic Stroke.
Adv. Intell. Syst., April, 2023

RailSeg: Learning Local-Global Feature Aggregation With Contextual Information for Railway Point Cloud Semantic Segmentation.
IEEE Trans. Geosci. Remote. Sens., 2023

Extracting 3-D Structural Lines of Building From ALS Point Clouds Using Graph Neural Network Embedded With Corner Information.
IEEE Trans. Geosci. Remote. Sens., 2023

A graph-based pivotal semantic mining framework for rumor detection.
Eng. Appl. Artif. Intell., 2023

EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Smoothing Point Adjustment-Based Evaluation of Time Series Anomaly Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022

Local and Global Structure for Urban ALS Point Cloud Semantic Segmentation With Ground-Aware Attention.
IEEE Trans. Geosci. Remote. Sens., 2022

Defending against Return-Oriented Programming attacks based on return instruction using static analysis and binary patch techniques.
Sci. Comput. Program., 2022

Asymmetric subversion attacks on signature and identification schemes.
Pers. Ubiquitous Comput., 2022

Few-shot Website Fingerprinting attack with Meta-Bias Learning.
Pattern Recognit., 2022

Distributed Optical Fiber Sensing System for Large Infrastructure Temperature Monitoring.
IEEE Internet Things J., 2022

Seismic fault detection using convolutional neural networks with focal loss.
Comput. Geosci., 2022

End-to-End Multi-Tab Website Fingerprinting Attack: A Detection Perspective.
CoRR, 2022

An Android Malware Detection and Classification Approach Based on Contrastive Lerning.
Comput. Secur., 2022

TForm-RF: An Efficient Data Augmentation for Website Fingerprinting Attack.
Proceedings of the IEEE International Performance, 2022

A Two-Stage Out-Of-Box Method for Detecting Side-Channel Attacks in Cloud Computing.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

NNSMT: Deep Neural Networks for SMT Solvers Fuzzing.
Proceedings of the ICCAI '22: 8th International Conference on Computing and Artificial Intelligence, Tianjin, China, March 18, 2022

Optimal Load Scheduling Based on Mobile Edge Computing Technology in 5G Dense Networking.
Proceedings of the 3rd Asia Conference on Computers and Communications, 2022

Research on Test Task Management Scheduling of Integrated Test Platform Based on Improved Genetic Algorithm.
Proceedings of the 3rd Asia Conference on Computers and Communications, 2022

2021
Few-Shot Website Fingerprinting Attack with Data Augmentation.
Secur. Commun. Networks, 2021

Innovation and Entrepreneurship Practice Education Mode of Animation Digital Media Major Based on Intelligent Information Collection.
Mob. Inf. Syst., 2021

DRAM Failure Prediction in AIOps: EmpiricalEvaluation, Challenges and Opportunities.
CoRR, 2021

Few-Shot Website Fingerprinting Attack.
CoRR, 2021

Few-shot website fingerprinting attack.
Comput. Networks, 2021

Quality evaluation of induced pluripotent stem cell colonies by fusing multi-source features.
Comput. Methods Programs Biomed., 2021

Hierarchical semantic segmentation of urban scene point clouds via group proposal and graph attention network.
Int. J. Appl. Earth Obs. Geoinformation, 2021

Beyond Outlier Detection: Outlier Interpretation by Attention-Guided Triplet Deviation Network.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Implanting Domain Knowledge into Feature Selection for Effective Outlier Detection in Network Traffic Data.
Proceedings of the 2021 IEEE SmartWorld, 2021

A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Entropy and Autoencoder-Based Outlier Detection in Mixed-Type Network Traffic Data.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Surrogate Supervision-based Deep Weakly-supervised Anomaly Detection.
Proceedings of the 2021 International Conference on Data Mining, 2021

Integrating Argument-Level Attention with Multi-Level Scores to Predict What Happen Next.
Proceedings of the International Joint Conference on Neural Networks, 2021

Effective Anomaly Detection Based on Reinforcement Learning in Network Traffic Data.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

JFD: Automatic Java Fuzz Driver Generation.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

Parallel Hospital: ACP-Based Hospital Smart Operating System.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021

Script event prediction based on pre-trained model with tail event enhancement.
Proceedings of the CSAI 2021: 5th International Conference on Computer Science and Artificial Intelligence, Beijing, China, December 4, 2021

Question answering system of discipline inspection laws and regulations based on knowledge graph.
Proceedings of the ACAI 2021: 4th International Conference on Algorithms, Computing and Artificial Intelligence, Sanya, China, December 22, 2021

2020
Semantic-Based Building Extraction from LiDAR Point Clouds Using Contexts and Optimization in Complex Environment.
Sensors, 2020

Drift Reduction of a 4-DOF Measurement System Caused by Unstable Air Refractive Index.
Sensors, 2020

Salt Priming Protects Photosynthetic Electron Transport against Low-Temperature-Induced Damage in Wheat.
Sensors, 2020

Hierarchical Instance Recognition of Individual Roadside Trees in Environmentally Complex Urban Areas from UAV Laser Scanning Point Clouds.
ISPRS Int. J. Geo Inf., 2020

On the Detection of Malicious Behaviors against Introspection Using Hardware Architectural Events.
IEICE Trans. Inf. Syst., 2020

Primary Categorizing and Masking Cerebral Small Vessel Disease Based on "Deep Learning System".
Frontiers Neuroinformatics, 2020

ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis.
Comput. Secur., 2020

Convolutional Neural Network Based Weakly Supervised Learning for Aircraft Detection From Remote Sensing Image.
IEEE Access, 2020

Breast Cancer Image Classification via Multi-Network Features and Dual-Network Orthogonal Low-Rank Learning.
IEEE Access, 2020

AT-ROP: Using static analysis and binary patch technology to defend against ROP attacks based on return instruction.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Deep Learning Algorithm for Judicial Judgment Prediction Based on BERT.
Proceedings of the 5th International Conference on Computing, Communication and Security, 2020

Tree2tree Structural Language Modeling for Compiler Fuzzing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Malware Family Classification using LSTM with Attention.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
Tenant-Oriented Monitoring for Customized Security Services in the Cloud.
Symmetry, 2019

A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering.
Sensors, 2019

Reduction of cerebral blood flow in community-based adults with subclinical cerebrovascular atherosclerosis: A 3.0T magnetic resonance imaging study.
NeuroImage, 2019

点线特征融合的误匹配剔除算法 (Mismatch Elimination Algorithm Based on Point Line Feature Fusion).
计算机科学, 2019

Experimental Study of Atmospheric Turbulence Detection Using an Orbital Angular Momentum Beam Via a Convolutional Neural Network.
IEEE Access, 2019

MIX: A Joint Learning Framework for Detecting Both Clustered and Scattered Outliers in Mixed-Type Data.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Breast Cancer Image Classification via Multi-level Dual-network Features and Sparse Multi-Relation Regularized Learning.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Embedding-Based Complex Feature Value Coupling Learning for Detecting Outliers in Non-IID Categorical Data.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
JDriver: Automatic Driver Class Generation for AFL-Based Java Fuzzing Tools.
Symmetry, 2018

Variation in longitudinal trajectories of cortical sulci in normal elderly.
NeuroImage, 2018

悖论的生成机制和解释 (Generation Mechanism and Interpretations of Paradoxes).
计算机科学, 2018

Attentional Payload Anomaly Detector for Web Applications.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Combine Value Clustering and Weighted Value Coupling Learning for Outlier Detection in Categorical Data.
Proceedings of the Database and Expert Systems Applications, 2018

Exploring a High-quality Outlying Feature Value Set for Noise-Resilient Outlier Detection in Categorical Data.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

Asymmetric Subversion Attacks on Signature Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Logistic Regression of Point Matches for Accurate Transformation Estimation.
Proceedings of the 2018 International Conference on 3D Vision, 2018

2017
Inferring Phylogenetic Network of Malware Families Based on Splits Graph.
IEICE Trans. Inf. Syst., 2017

Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Fracture porosity calculation based on imaging logging with images processing for gas-bearing shale.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2016
Server-Aided Public Key Encryption With Keyword Search.
IEEE Trans. Inf. Forensics Secur., 2016

Three-Dimensional Reconstruction of Building Roofs from Airborne LiDAR Data Based on a Layer Connection and Smoothness Strategy.
Remote. Sens., 2016

Absent extreme learning machine algorithm with application to packed executable identification.
Neural Comput. Appl., 2016

基于主题模型的网络异常行为分类学习方法研究 (Research on Studying Method of Network Anomalous Behaviors Classification Based on Topic Model).
计算机科学, 2016

Region-based saliency estimation for 3D shape analysis and understanding.
Neurocomputing, 2016

GSLAC: A General Scalable and Low-Overhead Alert Correlation Method.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Dynamic attitude estimator for attitude and heading reference systems based on vector observations.
Proceedings of the IEEE International Conference on Information and Automation, 2016

A Survey of Game Theoretic Methods for Cyber Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

The Similarity Analysis of Malicious Software.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Inferring Phylogenetic Networks of Malware Families from API Sequences.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
基于HSV和纹理特征的相容near度量方法 (Tolerance Nearness Measure Based on HSV and Texture Feature).
计算机科学, 2015

Linearly Supporting Feature Extraction For Automated Estimation Of Stellar Atmospheric Parameters.
CoRR, 2015

Information diffusion network inferring and pathway tracking.
Sci. China Inf. Sci., 2015

Characterization of the pore size distribution with SEM images processing for the tight rock.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Generalized complementary filter for attitude estimation based on vector observations and cross products.
Proceedings of the IEEE International Conference on Information and Automation, 2015

Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2015

Calibration of tri-axial magnetometer in magnetic compass using vector observations.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
Generation of the Probabilistic Template of Default Mode Network Derived from Resting-State fMRI.
IEEE Trans. Biomed. Eng., 2014

Message Format Extraction of Cryptographic Protocol Based on Dynamic Binary Analysis.
J. Res. Pract. Inf. Technol., 2014

A Network Gene-Based Framework for Detecting Advanced Persistent Threats.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Mobile Security Apps: Loyal Gaurds or Hypocritical Thieves?
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Rule-Based Security Capabilities Matching for Web Services.
Wirel. Pers. Commun., 2013

Network Threat Behavior Detection and Trend Analysis Based on the TDLC Model.
Smart Comput. Rev., 2013

Reverse extraction of protocol model from network applications.
Int. J. Internet Protoc. Technol., 2013

A Study of LDoS Flows Variations Based on Similarity Measurement.
Proceedings of the Internet and Distributed Computing Systems, 2013

iPanda: A comprehensive malware analysis tool.
Proceedings of the International Conference on Information Networking 2013, 2013

A binary analysis method for protocol deviation discovery from implementations.
Proceedings of the International Conference on Information Networking 2013, 2013

Mining Network Behavior Specifications of Malware Based on Binary Analysis.
Proceedings of the Frontiers in Internet Technologies, 2013

2012
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy.
Proceedings of the SECRYPT 2012, 2012

Collaborative detection of DDoS attacks based on chord protocol.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

An Automatic Approach to Detect Anti-debugging in Malware Analysis.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Networks Intrusion Behavior Prediction Based on Threat Model.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
A new perspective of network vulnerability analysis using Network Security Gradient.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Two algorithms for Network Security Gradient marking.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Improving particle swarm optimization performance with local search for high-dimensional function optimization.
Optim. Methods Softw., 2010

Three dimensional Boolean operation based on L-Rep model.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A Scalable, Bidirectional-Based Search Strategy to Generate Attack Graphs.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Graphical Calculus for Quantum Key Distribution (Extended Abstract).
Proceedings of the 6th International Workshop on Quantum Physics and Logic, 2009

Remote Operation System Detection Base on Machine Learning.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Research on Trust Evaluation Model Based on TPM.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
A new constructing auxiliary function method for global optimization.
Math. Comput. Model., 2008

Considerations and recent advances in QSAR models for cytochrome P450-mediated drug metabolism prediction.
J. Comput. Aided Mol. Des., 2008

SOA-Based Service Recovery Framework.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2007
A dynamic clustering based differential evolution algorithm for global optimization.
Eur. J. Oper. Res., 2007

Global optimization by an improved differential evolutionary algorithm.
Appl. Math. Comput., 2007

Using genetic algorithms to predict financial performance --Evidence from China.
Proceedings of the IEEE International Conference on Systems, 2007

A Memetic Differential Evolutionary Algorithm for High Dimensional Functions' Optimization.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
Research and Implementation of MPLS VPN Protocol Based on Network Processor.
Proceedings of the WEBIST 2006, 2006

Personalized Fair Reputation Based Resource Allocation in Grid.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

Spreading Activation Model for Connectivity Based Clustering.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

A Novel Modeling Method of Network Processor Architecture Based on SystemC.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
An Effective and Efficient Two Stage Algorithm for Global Optimization.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

2000
Design and Implementation of a Distributed Virtual Environment Development Platform.
Int. J. Virtual Real., 2000

1999
The Visual Query Language for an Object-Oriented Knowledge-Based System.
Proceedings of the 1999 International Symposium on Database Applications in Non-Traditional Environments (DANTE '99), 1999


  Loading...