Follow
Han Yufei
Title
Cited by
Cited by
Year
Using customer-related data to enhance e-grocery home delivery
S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao
Industrial Management & Data Systems 117 (9), 1917-1933, 2017
1972017
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1142017
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization
Y Han, F Moutarde
International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016
902016
Model Stealing Attacks Against Inductive Graph Neural Networks
YZ Yun Shen, Xinlei He, Yufei Han
The 43rd IEEE Symposium on Security and Privacy, https://arxiv.org/abs/2112 …, 2021
75*2021
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti
Network and Distributed Systems Security Symposium, https://www.ndss …, 2021
742021
Explainable artificial intelligence for cybersecurity: a literature survey
TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ...
Annals of Telecommunications, 2022
682022
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
592016
Embedded palmprint recognition system on mobile devices
Y Han, T Tan, Z Sun, Y Hao
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
572007
Palmprint recognition under unconstrained scenes
Y Han, Z Sun, F Wang, T Tan
Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007
562007
Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning
X Lyu, Y Han, W Wang, J Liu, B Wang, J Liu, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (7), 9020-9028, 2023
532023
On the impact of socio-economic factors on power load forecasting
Y Han, X Sha, E Grover-Silva, P Michiardi
2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014
382014
Learning gabor magnitude features for palmprint recognition
R Chu, Z Lei, Y Han, R He, SZ Li
Asian Conference on Computer Vision, 22-31, 2007
362007
Accurate real-time identification of malicious BGP hijacks
PAV Yun Shen, Yufei Han
US Patent 10,148,690, 2018
342018
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
342017
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles
A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle
Transportation Research Board 91st Annual Meeting (TRB'2012), 2012
342012
Analysis of network-level traffic states using locality preservative non-negative matrix factorization
Y Han, F Moutarde
2011 14th international IEEE conference on Intelligent Transportation …, 2011
342011
Fusion of face and palmprint for personal identification based on ordinal features
R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan
2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007
342007
Robust federated learning via collaborative machine teaching
Y Han, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020
322020
Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes
M Lanvin, PF Gimenez, Y Han, F Majorczyk, L Mé, E Totel
International Conference on Risks and Security of Internet and Systems, 18-33, 2022
312022
Systems and methods for detecting security events
HAN Yufei, Y Shen
US Patent 9,628,506, 2017
302017
The system can't perform the operation now. Try again later.
Articles 1–20