Yunhe Cui
Orcid: 0000-0002-0880-675X
According to our database1,
Yunhe Cui
authored at least 29 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024
Comput. Secur., 2024
Mapping the landscape and roadmap of geospatial artificial intelligence (GeoAI) in quantitative human geography: An extensive systematic review.
Int. J. Appl. Earth Obs. Geoinformation, 2024
2023
USAGE : Uncertain flow graph and spatio-temporal graph convolutional network-based saturation attack detection method.
J. Netw. Comput. Appl., October, 2023
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence.
Comput. Networks, April, 2023
MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023
Towards Feature Selection for Detecting LDDoS in SD-IoT of Smart Grids: A Multi-correlation Information EA-based Method.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023
2022
KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT.
IEEE Internet Things J., 2022
Defending saturation attacks on SDN controller: A confusable instance analysis-based algorithm.
Comput. Networks, 2022
Ann. GIS, 2022
VICTOR: An Adaptive Framing-based Speech Content Authentication and Recovery Algorithm.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
The Named Entity Recognition of Chinese Cybersecurity Using an Active Learning Strategy.
Wirel. Commun. Mob. Comput., 2021
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.
Secur. Commun. Networks, 2021
J. Netw. Comput. Appl., 2021
J. Inf. Secur. Appl., 2021
Human mobility data in the COVID-19 pandemic: characteristics, applications, and challenges.
Int. J. Digit. Earth, 2021
Comput. Secur., 2021
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
REPAIR: fragile watermarking for encrypted speech authentication with recovery ability.
Telecommun. Syst., 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
A Fragile Watermarking Algorithm for Speech Authentication by Modifying Least Significant Digits.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
MIND: Message Classification Based Controller Scheduling Method for Resisting DDoS Attack in Software-Defined Networking.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020
2018
Speech authentication and content recovery scheme for security communication and storage.
Telecommun. Syst., 2018
2017
Appl. Soft Comput., 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
J. Netw. Comput. Appl., 2016
2012
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012