default search action
Shuyuan Jin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Yabo Wang, Ruizhi Xiao, Jiakun Sun, Shuyuan Jin:
MC-Det: Multi-channel representation fusion for malicious domain name detection. Comput. Networks 255: 110847 (2024) - [j16]Ruizhi Xiao, Weilong Li, Jintian Lu, Shuyuan Jin:
ContexLog: Non-Parsing Log Anomaly Detection With All Information Preservation and Enhanced Contextual Representation. IEEE Trans. Netw. Serv. Manag. 21(4): 4750-4762 (2024) - [c35]Jiakun Sun, Xiaotian Zhang, Yabo Wang, Shuyuan Jin:
CoMDet: A Contrastive Multimodal Pre-Training Approach to Encrypted Malicious Traffic Detection. COMPSAC 2024: 1118-1125 - 2023
- [j15]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng:
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction. IEEE Trans. Pattern Anal. Mach. Intell. 45(1): 681-697 (2023) - [j14]Ruizhi Xiao, Hao Chen, Jintian Lu, Weilong Li, Shuyuan Jin:
AllInfoLog: Robust Diverse Anomalies Detection Based on All Log Features. IEEE Trans. Netw. Serv. Manag. 20(3): 2529-2543 (2023) - [c34]Jiakun Sun, Jintian Lu, Yabo Wang, Shuyuan Jin:
FastDet: Detecting Encrypted Malicious Traffic Faster via Early Exit. ICA3PP (1) 2023: 301-319 - 2022
- [j13]Jintian Lu, Jiakun Sun, Ruizhi Xiao, Shuyuan Jin:
DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control. Comput. Secur. 117: 102678 (2022) - [j12]Jintian Lu, Yunyi Zhang, Likun Yang, Shuyuan Jin:
Inter-cloud secure data sharing and its formal verification. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [c33]Xiaotian Zhang, Jintian Lu, Jiakun Sun, Ruizhi Xiao, Shuyuan Jin:
MEMTD: Encrypted Malware Traffic Detection Using Multimodal Deep Learning. ICWE 2022: 357-372 - [c32]Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang:
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. SP 2022: 2114-2129 - 2021
- [c31]Sui Luo, Heng Li, Shuyuan Jin:
Measuring Information Leakage of DNS Server. ICCCS 2021: 796-805 - [c30]Yuelong Wu, Jintian Lu, Yunyi Zhang, Shuyuan Jin:
Vulnerability Detection in C/C++ Source Code With Graph Representation Learning. CCWC 2021: 1519-1524 - [c29]Pengfei Shao, Shuyuan Jin:
A Dynamic Access Control Model Based on Game Theory for the Cloud. GLOBECOM 2021: 1-6 - [c28]Hao Chen, Ruizhi Xiao, Shuyuan Jin:
Unsupervised Anomaly Detection Based on System Logs. SEKE 2021: 92-97 - [c27]Yunyi Zhang, Shuyuan Jin:
Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search. WASA (3) 2021: 299-309 - [i1]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng:
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction. CoRR abs/2112.15012 (2021) - 2020
- [c26]Yunyi Zhang, Yuelong Wu, Shuyuan Jin:
Which DGA Family does A Malicious Domain Name Belong To. DSC 2020: 53-60 - [c25]Yunyi Zhang, Jintian Lu, Shuyuan Jin:
Web Attack Detection Based on User Behaviour Semantics. ICA3PP (3) 2020: 459-474 - [c24]Weilong Li, Shuyuan Jin:
A simple function embedding approach for binary similarity detection. ISPA/BDCloud/SocialCom/SustainCom 2020: 570-577 - [c23]Hao Chen, Ruizhi Xiao, Shuyuan Jin:
Real-time detection of cloud tenant malicious behavior based on CNN. ISPA/BDCloud/SocialCom/SustainCom 2020: 998-1005 - [c22]Pengfei Shao, Shuyuan Jin:
Privacy-aware OrLa Based Access Control Model in the Cloud. SEKE 2020: 216-221
2010 – 2019
- 2019
- [c21]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Qi Liu, Shijian Lu, Roger Zimmermann, Li Cheng:
Towards Natural and Accurate Future Motion Prediction of Humans and Animals. CVPR 2019: 10004-10012 - 2017
- [j11]Yingyou Wen, Zhi Li, Shuyuan Jin, Chuan Lin, Zheng Liu:
Energy-Efficient Virtual Resource Dynamic Integration Method in Cloud Computing. IEEE Access 5: 12214-12223 (2017) - 2016
- [j10]Xi Yin, Binxing Fang, Shuyuan Jin, Meikang Qiu, Athanasios V. Vasilakos, Yongjun Xu:
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G. Int. J. Commun. Syst. 29(16): 2375-2387 (2016) - [c20]Yang Yang, Feifei Wang, Fei Jiang, Shuyuan Jin, Jin Xu:
A Topic Model for Hierarchical Documents. DSC 2016: 118-126 - 2015
- [j9]Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Jinming Li, Shuyuan Jin:
Privacy theft malware multi-process collaboration analysis. Secur. Commun. Networks 8(1): 51-67 (2015) - [j8]Xiang Cui, Lihua Yin, Shuyuan Jin, Zhiyu Hao, Shuhao Li:
Botnet spoofing: fighting botnet with itself. Secur. Commun. Networks 8(1): 80-89 (2015) - [c19]Xiaobing Guo, Shuyuan Jin, Yaxing Zhang:
XSS Vulnerability Detection Using Optimized Attack Vector Repertory. CyberC 2015: 29-36 - [c18]Fei Jiang, Yang Yang, Shuyuan Jin, Jin Xu:
Fast Search to Detect Communities by Truncated Inverse Page Rank in Social Networks. IEEE MS 2015: 239-246 - 2014
- [j7]Yaxing Zhang, Shuyuan Jin:
Predicting Network Security Situation Based on a Combination Model of Multiple Neural Networks. Int. J. Softw. Informatics 8(2): 167-176 (2014) - [c17]Yang Yang, Shuyuan Jin, Yang Zuo, Jin Xu:
Online Social Network Model Based on Local Preferential Attachment. APWeb Workshophs 2014: 35-46 - [c16]Fei Jiang, Shuyuan Jin, Yanlei Wu, Jin Xu:
A uniform framework for community detection via influence maximization in social networks. ASONAM 2014: 27-32 - [c15]Yunxue Yang, Shuyuan Jin, Xiaowei He:
Software Vulnerability Severity Evaluation Based on Economic Losses. ISCTCS 2014: 144-151 - [c14]Xiaowei He, Shuyuan Jin, Yunxue Yang, Huiqiang Chi:
DDoS Detection Based on Second-Order Features and Machine Learning. ISCTCS 2014: 197-205 - 2012
- [j6]Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen:
Optimal mining on security labels for decentralized information flow control. Comput. Secur. 31(8): 912-924 (2012) - [j5]Yuqing Song, Shuyuan Jin:
Matching sequences of salient contour points characterized by Voronoi region features. Vis. Comput. 28(5): 475-491 (2012) - [c13]Yong Wang, Xiao-chun Yun, Yongzheng Zhang, Shuyuan Jin, Yanchen Qiao:
Research of Network Vulnerability Analysis Based on Attack Capability Transfer. CIT 2012: 38-44 - [c12]Yi Pang, Shuyuan Jin, Shicong Li, Jilei Li, Hao Ren:
OpenVPN Traffic Identification Using Traffic Fingerprints and Statistical Characteristics. ISCTCS 2012: 443-449 - [c11]Yaxing Zhang, Shuyuan Jin, Xiang Cui, Xi Yin, Yi Pang:
Network Security Situation Prediction Based on BP and RBF Neural Network. ISCTCS 2012: 659-665 - [c10]Lejun Fan, Yuanzhuo Wang, Xueqi Cheng, Shuyuan Jin:
Privacy Theft Malware Detection with Privacy Petri Net. PDCAT 2012: 195-200 - [c9]Jinghua Yan, Xiao-chun Yun, Zhi-Gang Wu, Hao Luo, Shuzhuang Zhang, Shuyuan Jin, Zhibin Zhang:
Online Traffic Classification Based on Co-training Method. PDCAT 2012: 391-397 - [c8]Shuyuan Jin, Zhi Yang, Xiang Cui:
Automatic Covert Channel Detection in Asbestos System (Poster Abstract). RAID 2012: 380-381 - 2011
- [j4]Yuqing Song, Shuyuan Jin, Jie Shen:
A unique property of single-link distance and its application in data clustering. Data Knowl. Eng. 70(11): 984-1003 (2011) - [c7]Zhi Yang, Lihua Yin, Miyi Duan, Shuyuan Jin:
Poster: towards formal verification of DIFC policies. CCS 2011: 873-876 - [c6]Rongrong Xi, Xiao-chun Yun, Shuyuan Jin, Yongzheng Zhang:
Network Threat Assessment Based on Alert Verification. PDCAT 2011: 30-34 - [c5]Rongrong Xi, Shuyuan Jin, Xiao-chun Yun, Yongzheng Zhang:
CNSSA: A Comprehensive Network Security Situation Awareness System. TrustCom 2011: 482-487
2000 – 2009
- 2009
- [c4]Shuyuan Jin, Yong Wang, Xiang Cui, Xiao-chun Yun:
A review of classification methods for network vulnerability. SMC 2009: 1171-1175 - 2007
- [j3]Shuyuan Jin, Daniel S. Yeung, Xizhao Wang:
Internet Anomaly Detection Based on Statistical Covariance Matrix. Int. J. Pattern Recognit. Artif. Intell. 21(3): 591-606 (2007) - [j2]Shuyuan Jin, Daniel S. Yeung, Xizhao Wang:
Network intrusion detection in covariance feature space. Pattern Recognit. 40(8): 2185-2197 (2007) - [j1]Daniel S. Yeung, Shuyuan Jin, Xizhao Wang:
Covariance-Matrix Modeling and Detecting Various Flooding Attacks. IEEE Trans. Syst. Man Cybern. Part A 37(2): 157-169 (2007) - 2005
- [c3]Shuyuan Jin, Daniel S. Yeung, Xizhao Wang, Eric C. C. Tsang:
A Covariance Matrix Based Approach to Internet Anomaly Detection. ICMLC 2005: 691-700 - [c2]Shuyuan Jin, Daniel S. Yeung, Xizhao Wang, Eric C. C. Tsang:
A feature space analysis for anomaly detection. SMC 2005: 3599-3603 - 2004
- [c1]Shuyuan Jin, Daniel S. Yeung:
A covariance analysis model for DDoS attack detection. ICC 2004: 1882-1886
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint