Yueying He
According to our database1,
Yueying He
authored at least 22 papers
between 2015 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features.
Expert Syst. Appl., 2021
2020
Detecting bi-level false data injection attack based on time series analysis method in smart grid.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Visual-textual sentiment classification with bi-directional multi-level attention networks.
Knowl. Based Syst., 2019
基于双语主题模型和双语词向量的跨语言知识链接 (Cross-language Knowledge Linking Based on Bilingual Topic Model and Bilingual Embedding).
计算机科学, 2019
Sentiment analysis of social images via hierarchical deep fusion of content and links.
Appl. Soft Comput., 2019
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019
2018
Knowl. Based Syst., 2018
Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, 2018
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018
Proceedings of the Cyber Security - 15th International Annual Conference, 2018
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018
2017
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017
2016
Coranking the Future Influence of Multiobjects in Bibliographic Network Through Mutual Reinforcement.
ACM Trans. Intell. Syst. Technol., 2016
A spiral process of formalization and verification: A case study on verification of the scheduling mechanism of OSEK/VDX.
J. Inf. Secur. Appl., 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2016
2015
Characterization of Android Applications with Root Exploit by Using Static Feature Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015