default search action
Aimin Yu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang, Yunjia Zhang, Qiang Li, Aimin Yu:
Automatically Identifying CVE Affected Versions With Patches and Developer Logs. IEEE Trans. Dependable Secur. Comput. 21(2): 905-919 (2024) - [j11]Huan Zhang, Lixin Zhao, Aimin Yu, Lijun Cai, Dan Meng:
Ranker: Early Ransomware Detection Through Kernel-Level Behavioral Analysis. IEEE Trans. Inf. Forensics Secur. 19: 6113-6127 (2024) - [c33]Lifang Xiao, Aimin Yu, Hanyu Wang, Lixin Zhao, Dan Meng:
MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats. CSCWD 2024: 407-412 - [c32]Chentong Zhao, Jinpeng Xiang, Lixin Zhao, Aimin Yu, Lijun Cai, Jiangang Ma:
EntityParser: A Log Analytics Parser for Identifying Entities from System Logs. CSCWD 2024: 2040-2045 - [c31]Tao Leng, Lixin Zhao, Yuedong Pan, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:
Early Detection of Fileless Attacks Based on Multi-Feature Fusion of Complex Attack Vectors. ISCC 2024: 1-7 - [c30]Hanyu Wang, Aimin Yu, Lifang Xiao, Jin Li, Xu Cao:
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation. SACMAT 2024 - 2023
- [c29]Tao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dang Meng:
MemInspect: Memory Forensics for investigating Fileless Attacks. TrustCom 2023: 946-955 - 2022
- [j10]Ruipeng Yang, Aimin Yu, Lijun Cai, Dan Meng:
Subspace clustering via graph auto-encoder network for unknown encrypted traffic recognition. Cybersecur. 5(1): 29 (2022) - [c28]Huan Zhang, Lijun Cai, Lixin Zhao, Aimin Yu, Jiangang Ma, Dan Meng:
LogMiner: A System Audit Log Reduction Strategy Based on Behavior Pattern Mining. MILCOM 2022: 292-297 - [c27]Yuedong Pan, Lijun Cai, Tao Leng, Lixin Zhao, Jiangang Ma, Aimin Yu, Dan Meng:
AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs. SecureComm 2022: 510-528 - 2021
- [j9]Yangguang Zhu, Xiufen Li, Yuting Xu, Lidong Wu, Aimin Yu, Guosong Lai, Qiuping Wei, Hai Chi, Nan Jiang, Li Fu, Chen Ye, Cheng-Te Lin:
Intertwined Carbon Nanotubes and Ag Nanowires Constructed by Simple Solution Blending as Sensitive and Stable Chloramphenicol Sensors. Sensors 21(4): 1220 (2021) - [c26]Tao Leng, Aimin Yu:
A Framework of Darknet Forensics. AISS 2021: 31:1-31:6 - [c25]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability. HPCC/DSS/SmartCity/DependSys 2021: 1075-1083 - [c24]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance. ICA3PP (3) 2021: 196-213 - [c23]Zhu Liu, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
Towards Open World Traffic Classification. ICICS (1) 2021: 331-347 - [c22]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. MSN 2021: 502-511 - [c21]Renzheng Wei, Lijun Cai, Lixin Zhao, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. SecureComm (1) 2021: 3-24 - [c20]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
FCEP: A Fast Concolic Execution for Reaching Software Patches. SEKE 2021: 510-515 - [i1]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
DeepHunter: A Graph Neural Network Based Approach for Robust Cyber Threat Hunting. CoRR abs/2104.09806 (2021) - 2020
- [j8]Yuan Gao, Hequn Xian, Aimin Yu:
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment. Int. J. Distributed Sens. Networks 16(3) (2020) - [j7]Yi Zhang, Hequn Xian, Aimin Yu:
CSNN: Password guessing method based on Chinese syllables and neural network. Peer-to-Peer Netw. Appl. 13(6): 2237-2250 (2020) - [j6]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c19]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
A novel network traffic classification approach via discriminative feature learning. SAC 2020: 1026-1033 - [c18]Xiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng:
Program Slice based Vulnerable Code Clone Detection. TrustCom 2020: 293-300
2010 – 2019
- 2019
- [j5]Wei Sun, Hao Zhang, Li-jun Cai, Ai-min Yu, Jinqiao Shi, Jian-Guo Jiang:
A Novel Device Identification Method Based on Passive Measurement. Secur. Commun. Networks 2019: 6045251:1-6045251:11 (2019) - [c17]Lixin Zhao, Lijun Cai, Aimin Yu, Zhen Xu, Dan Meng:
Prototype-Based Malware Traffic Classification with Novelty Detection. ICICS 2019: 3-17 - [c16]Meng Li, Lijun Cai, Aimin Yu, Haibo Yu, Dan Meng:
HeteroUI: A Framework Based on Heterogeneous Information Network Embedding for User Identification in Enterprise Networks. ICICS 2019: 165-180 - [c15]Suya Zhao, Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
CTLMD: Continuous-Temporal Lateral Movement Detection Using Graph Embedding. ICICS 2019: 181-196 - [c14]Renzheng Wei, Lijun Cai, Aimin Yu, Dan Meng:
AGE: Authentication Graph Embedding for Detecting Anomalous Login Activities. ICICS 2019: 341-356 - [c13]Jiarong Wang, Lijun Cai, Aimin Yu, Dan Meng:
Embedding Learning with Heterogeneous Event Sequence for Insider Threat Detection. ICTAI 2019: 947-954 - [c12]Jingjing Xu, Aimin Yu, Lijun Cai, Dan Meng:
MMNR: A Network Representation Framework Based on Multi-View Motif Fusion. ISPA/BDCloud/SocialCom/SustainCom 2019: 792-801 - [c11]Yunlong Guo, Aimin Yu, Xiaoli Gong, Lixin Zhao, Lijun Cai, Dan Meng:
Building Trust in Container Environment. TrustCom/BigDataSE 2019: 1-9 - 2018
- [j4]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Peng Liu:
Security-first architecture: deploying physically isolated active security processors for safeguarding the future of computing. Cybersecur. 1(1): 2 (2018) - [j3]Xiaoli Gong, Zhaoyang Shao, Qi Du, Aimin Yu, Jin Zhang:
Performance overhead analysis of virtualisation on ARM. Int. J. Inf. Commun. Technol. 12(1/2): 143-161 (2018) - [c10]Guang Yang, Lijun Cai, Aimin Yu, Jiangang Ma, Dan Meng, Yu Wu:
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model. BigDataService 2018: 9-16 - [c9]Jiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng:
TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records. TrustCom/BigDataSE 2018: 360-371 - [c8]Guang Yang, Lijun Cai, Aimin Yu, Dan Meng:
A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm Filters. TrustCom/BigDataSE 2018: 763-773 - 2013
- [c7]Qihui Zhou, Dan Wang, Yan Zhang, Bo Qin, Aimin Yu, Baohua Zhao:
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain. TrustCom/ISPA/IUCC 2013: 156-162 - 2012
- [c6]Zhen Xu, Aimin Yu, Wensi Yang:
Real-time remote attestation of IaaS cloud. CCIS 2012: 292-297 - 2011
- [j2]Aimin Yu, Yong Hu, Ming Fan:
Pricing strategies for tied digital contents and devices. Decis. Support Syst. 51(3): 405-412 (2011) - [c5]Aimin Yu, Yu Qin, Dan Wang:
Obtaining the Integrity of Your Virtual Machine in the Cloud. CloudCom 2011: 213-222 - [c4]Wei Feng, Yu Qin, Aimin Yu, Dengguo Feng:
A DRTM-Based Method for Trusted Network Connection. TrustCom 2011: 425-435 - [c3]Aimin Yu, Shijun Zhao:
Enhancing Flexibility of TCG's TNC through Layered Property Attestation. TrustCom 2011: 751-756 - 2010
- [c2]Aimin Yu, Dengguo Feng:
Real-Time Remote Attestation with Privacy Protection. TrustBus 2010: 81-92
2000 – 2009
- 2009
- [c1]Aimin Yu, Dengguo Feng, Ren Liu:
TBDRM: A TPM-Based Secure DRM Architecture. CSE (2) 2009: 671-677 - 2004
- [j1]Shougao Tang, Aimin Yu:
Generalized variational principle on nonlinear theory of naturally curved and twisted beams. Appl. Math. Comput. 153(1): 275-288 (2004)
Coauthor Index
aka: Li-jun Cai
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint