@article{DBLP:journals/tdsc/HeWZWZLY24,
author = {Yongzhong He and
Yiming Wang and
Sencun Zhu and
Wei Wang and
Yunjia Zhang and
Qiang Li and
Aimin Yu},
title = {Automatically Identifying {CVE} Affected Versions With Patches and
Developer Logs},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {21},
number = {2},
pages = {905--919},
year = {2024},
url = {https://doi.org/10.1109/TDSC.2023.3264567},
doi = {10.1109/TDSC.2023.3264567},
timestamp = {Thu, 06 Jun 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-12947,
author = {Yongle Chen and
Feng Ma and
Ying Zhang and
YongZhong He and
Haining Wang and
Qiang Li},
title = {AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware
at Large-Scale},
journal = {CoRR},
volume = {abs/2406.12947},
year = {2024},
url = {https://doi.org/10.48550/arXiv.2406.12947},
doi = {10.48550/ARXIV.2406.12947},
eprinttype = {arXiv},
eprint = {2406.12947},
timestamp = {Mon, 15 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2406-12947.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/WangGWHW22,
author = {Bin Wang and
Pengfei Guo and
Xing Wang and
Yongzhong He and
Wei Wang},
title = {Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax
Analysis and Its Application on {COVID-19}},
journal = {{ACM} J. Data Inf. Qual.},
volume = {14},
number = {2},
pages = {10:1--10:24},
year = {2022},
url = {https://doi.org/10.1145/3460002},
doi = {10.1145/3460002},
timestamp = {Sat, 20 Apr 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jdiq/WangGWHW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangYLMHX0Y22,
author = {Xiaolei Wang and
Lin Yang and
Dongyang Li and
Linru Ma and
Yongzhong He and
Junchao Xiao and
Jiyuan Liu and
Yuexiang Yang},
title = {{MADDC:} Multi-Scale Anomaly Detection, Diagnosis and Correction for
Discrete Event Logs},
booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2022, Austin,
TX, USA, December 5-9, 2022},
pages = {769--784},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3564625.3567972},
doi = {10.1145/3564625.3567972},
timestamp = {Sun, 25 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acsac/WangYLMHX0Y22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HeAW20,
author = {Yongzhong He and
Endalew Elsabeth Alem and
Wei Wang},
title = {Hybritus: a password strength checker by ensemble learning from the
query feedbacks of websites},
journal = {Frontiers Comput. Sci.},
volume = {14},
number = {3},
pages = {143802},
year = {2020},
url = {https://doi.org/10.1007/s11704-019-7342-y},
doi = {10.1007/S11704-019-7342-Y},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fcsc/HeAW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangSHLL20,
author = {Wei Wang and
Yaoyao Shang and
Yongzhong He and
Yidong Li and
Jiqiang Liu},
title = {BotMark: Automated botnet detection with hybrid analysis of flow-based
and graph-based traffic behaviors},
journal = {Inf. Sci.},
volume = {511},
pages = {284--296},
year = {2020},
url = {https://doi.org/10.1016/j.ins.2019.09.024},
doi = {10.1016/J.INS.2019.09.024},
timestamp = {Wed, 27 Nov 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/isci/WangSHLL20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HeWXLXW20,
author = {Yongzhong He and
Chao Wang and
Guangquan Xu and
Wenjuan Lian and
Hequn Xian and
Wei Wang},
title = {Privacy-preserving categorization of mobile applications based on
large-scale usage data},
journal = {Inf. Sci.},
volume = {514},
pages = {557--570},
year = {2020},
url = {https://doi.org/10.1016/j.ins.2019.11.007},
doi = {10.1016/J.INS.2019.11.007},
timestamp = {Sun, 12 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/isci/HeWXLXW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WeiXWHHW20,
author = {Xiangyu Wei and
Guangquan Xu and
Hao Wang and
Yongzhong He and
Zhen Han and
Wei Wang},
title = {Sensing Users' Emotional Intelligence in Social Networks},
journal = {{IEEE} Trans. Comput. Soc. Syst.},
volume = {7},
number = {1},
pages = {103--112},
year = {2020},
url = {https://doi.org/10.1109/TCSS.2019.2944687},
doi = {10.1109/TCSS.2019.2944687},
timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tcss/WeiXWHHW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WangCYHZ19,
author = {Xiaolei Wang and
Andrea Continella and
Yuexiang Yang and
Yongzhong He and
Sencun Zhu},
title = {LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile
Applications},
journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
volume = {3},
number = {1},
pages = {28:1--28:25},
year = {2019},
url = {https://doi.org/10.1145/3314415},
doi = {10.1145/3314415},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/imwut/WangCYHZ19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HeYHW19,
author = {Yongzhong He and
Xuejun Yang and
Binghui Hu and
Wei Wang},
title = {Dynamic privacy leakage analysis of Android third-party libraries},
journal = {J. Inf. Secur. Appl.},
volume = {46},
pages = {259--270},
year = {2019},
url = {https://doi.org/10.1016/j.jisa.2019.03.014},
doi = {10.1016/J.JISA.2019.03.014},
timestamp = {Wed, 04 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/istr/HeYHW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/HeHG19,
author = {Yongzhong He and
Liping Hu and
Rui Gao},
title = {Detection of Tor Traffic Hiding Under Obfs4 Protocol Based on Two-Level
Filtering},
booktitle = {2nd International Conference on Data Intelligence and Security, {ICDIS}
2019, South Padre Island, TX, USA, June 28-30, 2019},
pages = {195--200},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ICDIS.2019.00036},
doi = {10.1109/ICDIS.2019.00036},
timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
biburl = {https://dblp.org/rec/conf/icdis/HeHG19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiuH19,
author = {Jiale Liu and
Yongzhong He},
title = {Membership Detection for Real-world Groups Hidden in Social Network},
booktitle = {2019 {IEEE} International Conference on Intelligence and Security
Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019},
pages = {152--154},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/ISI.2019.8823555},
doi = {10.1109/ISI.2019.8823555},
timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
biburl = {https://dblp.org/rec/conf/isi/LiuH19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiuLWHZ18,
author = {Xing Liu and
Jiqiang Liu and
Wei Wang and
Yongzhong He and
Xiangliang Zhang},
title = {Discovering and understanding android sensor usage behaviors with
data flow analysis},
journal = {World Wide Web},
volume = {21},
number = {1},
pages = {105--126},
year = {2018},
url = {https://doi.org/10.1007/s11280-017-0446-0},
doi = {10.1007/S11280-017-0446-0},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/www/LiuLWHZ18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/HeHH18,
author = {Yongzhong He and
Binghui Hu and
Zhen Han},
title = {Dynamic Privacy Leakage Analysis of Android Third-Party Libraries},
booktitle = {1st International Conference on Data Intelligence and Security, {ICDIS}
2018, South Padre Island, TX, USA, April 8-10, 2018},
pages = {275--280},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/ICDIS.2018.00051},
doi = {10.1109/ICDIS.2018.00051},
timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
biburl = {https://dblp.org/rec/conf/icdis/HeHH18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangWHLHZ17,
author = {Xing Wang and
Wei Wang and
Yongzhong He and
Jiqiang Liu and
Zhen Han and
Xiangliang Zhang},
title = {Characterizing Android apps' behavior for effective detection of malapps
at large scale},
journal = {Future Gener. Comput. Syst.},
volume = {75},
pages = {30--45},
year = {2017},
url = {https://doi.org/10.1016/j.future.2017.04.041},
doi = {10.1016/J.FUTURE.2017.04.041},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fgcs/WangWHLHZ17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HuangZGH17,
author = {Chu Huang and
Sencun Zhu and
Quanlong Guan and
Yongzhong He},
title = {A software assignment algorithm for minimizing worm damage in networked
systems},
journal = {J. Inf. Secur. Appl.},
volume = {35},
pages = {55--67},
year = {2017},
url = {https://doi.org/10.1016/j.jisa.2017.05.004},
doi = {10.1016/J.JISA.2017.05.004},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/HuangZGH17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/GaoHHW16,
author = {Qian Gao and
Zhen Han and
Yong{-}Zhong He and
Daoshun Wang},
title = {Two image encryption methods with hiding effect based on moir{\'{e}}
pattern},
journal = {Int. J. High Perform. Comput. Netw.},
volume = {9},
number = {5/6},
pages = {382--393},
year = {2016},
url = {https://doi.org/10.1504/IJHPCN.2016.10001325},
doi = {10.1504/IJHPCN.2016.10001325},
timestamp = {Sun, 22 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijhpcn/GaoHHW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/0012HLG15,
author = {Wei Wang and
Yongzhong He and
Jiqiang Liu and
Sylvain Gombault},
title = {Constructing important features from massive network traffic for lightweight
intrusion detection},
journal = {{IET} Inf. Secur.},
volume = {9},
number = {6},
pages = {374--379},
year = {2015},
url = {https://doi.org/10.1049/iet-ifs.2014.0353},
doi = {10.1049/IET-IFS.2014.0353},
timestamp = {Thu, 27 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iet-ifs/0012HLG15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/HeHFQ10,
author = {Yong{-}Zhong He and
Zhen Han and
Huirong Fu and
Guangzhi Qu},
title = {The Formal Model of {DBMS} Enforcing Multiple Security Polices},
journal = {J. Softw.},
volume = {5},
number = {5},
pages = {514--521},
year = {2010},
url = {https://doi.org/10.4304/jsw.5.5.514-521},
doi = {10.4304/JSW.5.5.514-521},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jsw/HeHFQ10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HeHC10,
author = {Yong{-}Zhong He and
Zhan Han and
Ying Cai},
editor = {Isao Echizen and
Jeng{-}Shyang Pan and
Dieter W. Fellner and
Alexander Nouak and
Arjan Kuijper and
Lakhmi C. Jain},
title = {A Fine Grained {RBAC} Model Supporting Flexible Administrative Separation
of Duty},
booktitle = {Sixth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
15-17 October, 2010, Proceedings},
pages = {192--195},
publisher = {{IEEE} Computer Society},
year = {2010},
url = {https://doi.org/10.1109/IIHMSP.2010.55},
doi = {10.1109/IIHMSP.2010.55},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iih-msp/HeHC10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/HeH09,
author = {Yong{-}Zhong He and
Zhen Han},
title = {User Authentication with Provable Security against Online Dictionary
Attacks},
journal = {J. Networks},
volume = {4},
number = {3},
pages = {200--207},
year = {2009},
url = {https://doi.org/10.4304/jnw.4.3.200-207},
doi = {10.4304/JNW.4.3.200-207},
timestamp = {Tue, 15 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jnw/HeH09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/HeHF09,
author = {Yong{-}Zhong He and
Zhen Han and
Huirong Fu},
editor = {Hamid R. Arabnia and
Kevin Daimi},
title = {Usage Control in Conditional Access System with malicious Set-top
Box},
booktitle = {Proceedings of the 2009 International Conference on Security {\&}
Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
Volumes},
pages = {201--205},
publisher = {{CSREA} Press},
year = {2009},
timestamp = {Wed, 04 Nov 2009 14:56:55 +0100},
biburl = {https://dblp.org/rec/conf/csreaSAM/HeHF09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/HeHD08,
author = {Yong{-}Zhong He and
Zhan Han and
Ye Du},
editor = {Jeng{-}Shyang Pan and
Xiamu Niu and
Hsiang{-}Cheh Huang and
Lakhmi C. Jain},
title = {Configuring {RBAC} to Simulate Bell Model},
booktitle = {4th International Conference on Intelligent Information Hiding and
Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
August 2008, Proceedings},
pages = {946--949},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/IIH-MSP.2008.218},
doi = {10.1109/IIH-MSP.2008.218},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/iih-msp/HeHD08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isecs/HeHD08,
author = {Yong{-}Zhong He and
Zhen Han and
Ye Du},
editor = {Fei Yu and
Qi Luo and
Yongjun Chen and
Zhigang Chen},
title = {Context Active {RBAC} and its Applications},
booktitle = {Proceedings of The International Symposium on Electronic Commerce
and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China},
pages = {1041--1044},
publisher = {{IEEE} Computer Society},
year = {2008},
url = {https://doi.org/10.1109/ISECS.2008.195},
doi = {10.1109/ISECS.2008.195},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/isecs/HeHD08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}