关注
Jiao Yin
标题
引用次数
引用次数
年份
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
J Yin, MJ Tang, J Cao, H Wang
Knowledge-Based Systems 210, 106529, 2020
762020
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning
J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin
World Wide Web 25 (1), 401-423, 2022
662022
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery
J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab
IEEE transactions on industrial informatics 19 (4), 5593-5601, 2022
612022
A knowledge graph empowered online learning framework for access control decision-making
M You, J Yin, H Wang, J Cao, K Wang, Y Miao, E Bertino
World Wide Web 26 (2), 827-848, 2023
592023
An integrated MCI detection framework based on spectral-temporal analysis
J Yin, J Cao, S Siuly, H Wang
International Journal of Automation and Computing 16, 786-799, 2019
472019
A minority class boosted framework for adaptive access control decision-making
M You, J Yin, H Wang, J Cao, Y Miao
International Conference on Web Information Systems Engineering, 143-157, 2021
262021
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu
Network and System Security: 16th International Conference, NSS 2022 …, 2022
222022
A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services
Y Chen, S Han, G Chen, J Yin, KN Wang, J Cao
Health Information Science and Systems 11 (1), 8, 2023
212023
A real-time dynamic concept adaptive learning algorithm for exploitability prediction
J Yin, MJ Tang, J Cao, H Wang, M You
Neurocomputing 472, 252-265, 2022
212022
Adaptive online learning for vulnerability exploitation time prediction
J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin
Web Information Systems Engineering–WISE 2020: 21st International Conference …, 2020
212020
Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments
MJ Tang, J Yin, M Alazab, J Cao, Y Luo
IEEE Transactions on Industrial Informatics 17 (6), 4150-4158, 2020
182020
Data-driven hierarchical neural network modeling for high-pressure feedwater heater group
J Yin, M You, J Cao, H Wang, MJ Tang, YF Ge
Databases Theory and Applications: 31st Australasian Database Conference …, 2020
182020
A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation
YF Ge, J Cao, H Wang, J Yin, WJ Yu, ZH Zhan, J Zhang
Proceedings of the Genetic and Evolutionary Computation Conference, 771-776, 2019
182019
A graph empowered insider threat detection framework based on daily activities
W Hong, J Yin, M You, H Wang, J Cao, J Li, M Liu, C Man
ISA transactions 141, 84-92, 2023
172023
Radiomics under 2D regions, 3D regions, and peritumoral regions reveal tumor heterogeneity in non-small cell lung cancer: a multicenter study
X Zhang, G Zhang, X Qiu, J Yin, W Tan, X Yin, H Yang, L Liao, H Wang, ...
La radiologia medica 128 (9), 1079-1092, 2023
112023
A localization algorithm of weighted maximum likelihood estimation for wireless sensor network
C Tang, J Yin
Journal of Information &Computational Science 8 (16), 4293-4300, 2011
112011
An optimized algorithm of grid calibration in WSN node deployment based on the energy consumption distribution model
C Tang, Y Cheng, J Yin
Journal of Information &Computational Science 9 (4), 1035-42, 2012
102012
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management
J Yin, MJ Tang, J Cao, M You, H Wang
Emerging Trends in Cybersecurity Applications, 371-389, 2022
82022
Multi-step reinforcement learning-based offloading for vehicle edge computing
H Shaodong, C Yingqun, C Guihong, J Yin, H Wang, J Cao
2023 15th International Conference on Advanced Computational Intelligence …, 2023
72023
A Bilateral Filtering Based Ringing Elimination Approach for Motion-blurred Restoration Image
W Wang, W Wang, J Yin
Current Optics and Photonics 4 (3), 200-209, 2020
72020
系统目前无法执行此操作,请稍后再试。
文章 1–20