iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.org/pid/174/1008.bib
@article{DBLP:journals/tdsc/HeWZWZLY24, author = {Yongzhong He and Yiming Wang and Sencun Zhu and Wei Wang and Yunjia Zhang and Qiang Li and Aimin Yu}, title = {Automatically Identifying {CVE} Affected Versions With Patches and Developer Logs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {905--919}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264567}, doi = {10.1109/TDSC.2023.3264567}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2406-12947, author = {Yongle Chen and Feng Ma and Ying Zhang and YongZhong He and Haining Wang and Qiang Li}, title = {AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale}, journal = {CoRR}, volume = {abs/2406.12947}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.12947}, doi = {10.48550/ARXIV.2406.12947}, eprinttype = {arXiv}, eprint = {2406.12947}, timestamp = {Mon, 15 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-12947.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jdiq/WangGWHW22, author = {Bin Wang and Pengfei Guo and Xing Wang and Yongzhong He and Wei Wang}, title = {Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on {COVID-19}}, journal = {{ACM} J. Data Inf. Qual.}, volume = {14}, number = {2}, pages = {10:1--10:24}, year = {2022}, url = {https://doi.org/10.1145/3460002}, doi = {10.1145/3460002}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdiq/WangGWHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acsac/WangYLMHX0Y22, author = {Xiaolei Wang and Lin Yang and Dongyang Li and Linru Ma and Yongzhong He and Junchao Xiao and Jiyuan Liu and Yuexiang Yang}, title = {{MADDC:} Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin, TX, USA, December 5-9, 2022}, pages = {769--784}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3564625.3567972}, doi = {10.1145/3564625.3567972}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangYLMHX0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/fcsc/HeAW20, author = {Yongzhong He and Endalew Elsabeth Alem and Wei Wang}, title = {Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {3}, pages = {143802}, year = {2020}, url = {https://doi.org/10.1007/s11704-019-7342-y}, doi = {10.1007/S11704-019-7342-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/HeAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/WangSHLL20, author = {Wei Wang and Yaoyao Shang and Yongzhong He and Yidong Li and Jiqiang Liu}, title = {BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors}, journal = {Inf. Sci.}, volume = {511}, pages = {284--296}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.09.024}, doi = {10.1016/J.INS.2019.09.024}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangSHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/isci/HeWXLXW20, author = {Yongzhong He and Chao Wang and Guangquan Xu and Wenjuan Lian and Hequn Xian and Wei Wang}, title = {Privacy-preserving categorization of mobile applications based on large-scale usage data}, journal = {Inf. Sci.}, volume = {514}, pages = {557--570}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.11.007}, doi = {10.1016/J.INS.2019.11.007}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HeWXLXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tcss/WeiXWHHW20, author = {Xiangyu Wei and Guangquan Xu and Hao Wang and Yongzhong He and Zhen Han and Wei Wang}, title = {Sensing Users' Emotional Intelligence in Social Networks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {7}, number = {1}, pages = {103--112}, year = {2020}, url = {https://doi.org/10.1109/TCSS.2019.2944687}, doi = {10.1109/TCSS.2019.2944687}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/WeiXWHHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/imwut/WangCYHZ19, author = {Xiaolei Wang and Andrea Continella and Yuexiang Yang and Yongzhong He and Sencun Zhu}, title = {LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {3}, number = {1}, pages = {28:1--28:25}, year = {2019}, url = {https://doi.org/10.1145/3314415}, doi = {10.1145/3314415}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imwut/WangCYHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/istr/HeYHW19, author = {Yongzhong He and Xuejun Yang and Binghui Hu and Wei Wang}, title = {Dynamic privacy leakage analysis of Android third-party libraries}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {259--270}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.014}, doi = {10.1016/J.JISA.2019.03.014}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HeYHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icdis/HeHG19, author = {Yongzhong He and Liping Hu and Rui Gao}, title = {Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level Filtering}, booktitle = {2nd International Conference on Data Intelligence and Security, {ICDIS} 2019, South Padre Island, TX, USA, June 28-30, 2019}, pages = {195--200}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDIS.2019.00036}, doi = {10.1109/ICDIS.2019.00036}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icdis/HeHG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isi/LiuH19, author = {Jiale Liu and Yongzhong He}, title = {Membership Detection for Real-world Groups Hidden in Social Network}, booktitle = {2019 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019}, pages = {152--154}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISI.2019.8823555}, doi = {10.1109/ISI.2019.8823555}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiuH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/www/LiuLWHZ18, author = {Xing Liu and Jiqiang Liu and Wei Wang and Yongzhong He and Xiangliang Zhang}, title = {Discovering and understanding android sensor usage behaviors with data flow analysis}, journal = {World Wide Web}, volume = {21}, number = {1}, pages = {105--126}, year = {2018}, url = {https://doi.org/10.1007/s11280-017-0446-0}, doi = {10.1007/S11280-017-0446-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiuLWHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icdis/HeHH18, author = {Yongzhong He and Binghui Hu and Zhen Han}, title = {Dynamic Privacy Leakage Analysis of Android Third-Party Libraries}, booktitle = {1st International Conference on Data Intelligence and Security, {ICDIS} 2018, South Padre Island, TX, USA, April 8-10, 2018}, pages = {275--280}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDIS.2018.00051}, doi = {10.1109/ICDIS.2018.00051}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icdis/HeHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/fgcs/WangWHLHZ17, author = {Xing Wang and Wei Wang and Yongzhong He and Jiqiang Liu and Zhen Han and Xiangliang Zhang}, title = {Characterizing Android apps' behavior for effective detection of malapps at large scale}, journal = {Future Gener. Comput. Syst.}, volume = {75}, pages = {30--45}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.04.041}, doi = {10.1016/J.FUTURE.2017.04.041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangWHLHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/istr/HuangZGH17, author = {Chu Huang and Sencun Zhu and Quanlong Guan and Yongzhong He}, title = {A software assignment algorithm for minimizing worm damage in networked systems}, journal = {J. Inf. Secur. Appl.}, volume = {35}, pages = {55--67}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.05.004}, doi = {10.1016/J.JISA.2017.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HuangZGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijhpcn/GaoHHW16, author = {Qian Gao and Zhen Han and Yong{-}Zhong He and Daoshun Wang}, title = {Two image encryption methods with hiding effect based on moir{\'{e}} pattern}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {9}, number = {5/6}, pages = {382--393}, year = {2016}, url = {https://doi.org/10.1504/IJHPCN.2016.10001325}, doi = {10.1504/IJHPCN.2016.10001325}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/GaoHHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iet-ifs/0012HLG15, author = {Wei Wang and Yongzhong He and Jiqiang Liu and Sylvain Gombault}, title = {Constructing important features from massive network traffic for lightweight intrusion detection}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {374--379}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0353}, doi = {10.1049/IET-IFS.2014.0353}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/0012HLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jsw/HeHFQ10, author = {Yong{-}Zhong He and Zhen Han and Huirong Fu and Guangzhi Qu}, title = {The Formal Model of {DBMS} Enforcing Multiple Security Polices}, journal = {J. Softw.}, volume = {5}, number = {5}, pages = {514--521}, year = {2010}, url = {https://doi.org/10.4304/jsw.5.5.514-521}, doi = {10.4304/JSW.5.5.514-521}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HeHFQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iih-msp/HeHC10, author = {Yong{-}Zhong He and Zhan Han and Ying Cai}, editor = {Isao Echizen and Jeng{-}Shyang Pan and Dieter W. Fellner and Alexander Nouak and Arjan Kuijper and Lakhmi C. Jain}, title = {A Fine Grained {RBAC} Model Supporting Flexible Administrative Separation of Duty}, booktitle = {Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings}, pages = {192--195}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/IIHMSP.2010.55}, doi = {10.1109/IIHMSP.2010.55}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/HeHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/jnw/HeH09, author = {Yong{-}Zhong He and Zhen Han}, title = {User Authentication with Provable Security against Online Dictionary Attacks}, journal = {J. Networks}, volume = {4}, number = {3}, pages = {200--207}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.3.200-207}, doi = {10.4304/JNW.4.3.200-207}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/HeH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/csreaSAM/HeHF09, author = {Yong{-}Zhong He and Zhen Han and Huirong Fu}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Usage Control in Conditional Access System with malicious Set-top Box}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {201--205}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/HeHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/iih-msp/HeHD08, author = {Yong{-}Zhong He and Zhan Han and Ye Du}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Configuring {RBAC} to Simulate Bell Model}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {946--949}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.218}, doi = {10.1109/IIH-MSP.2008.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/HeHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isecs/HeHD08, author = {Yong{-}Zhong He and Zhen Han and Ye Du}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Context Active {RBAC} and its Applications}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {1041--1044}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.195}, doi = {10.1109/ISECS.2008.195}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/HeHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }