Yongzhong He

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput., 2024

AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024

2022
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci., 2020

Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.
Frontiers Comput. Sci., 2020

2019
Dynamic privacy leakage analysis of Android third-party libraries.
J. Inf. Secur. Appl., 2019

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Membership Detection for Real-world Groups Hidden in Social Network.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019

Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

2017
A software assignment algorithm for minimizing worm damage in networked systems.
J. Inf. Secur. Appl., 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017

2016
Two image encryption methods with hiding effect based on moiré pattern.
Int. J. High Perform. Comput. Netw., 2016

2015
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur., 2015

2010
The Formal Model of DBMS Enforcing Multiple Security Polices.
J. Softw., 2010

A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
User Authentication with Provable Security against Online Dictionary Attacks.
J. Networks, 2009

Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Context Active RBAC and its Applications.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Configuring RBAC to Simulate Bell Model.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...