Yongzhong He
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale.
CoRR, 2024
2022
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022
2020
IEEE Trans. Comput. Soc. Syst., 2020
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci., 2020
Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.
Frontiers Comput. Sci., 2020
2019
J. Inf. Secur. Appl., 2019
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
2017
J. Inf. Secur. Appl., 2017
Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017
2016
Int. J. High Perform. Comput. Netw., 2016
2015
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur., 2015
2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
J. Networks, 2009
Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008