Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Giorgio Felzani
Claudia Calabrese
Agrell, Erik
Maria Concetta Palumbo
Pouyan Ebrahimbabaie
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
YONGJUN WANG
Author Info
Open Visualization
Name
Affiliation
Papers
YONGJUN WANG
School of Computer, National University of Defense Technology, Changsha, China
25
Collaborators
Citations
PageRank
57
27
9.19
Referers
Referees
References
94
493
174
Search Limit
100
493
Publications (25 rows)
Collaborators (57 rows)
Referers (94 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
On The Detection Of Malicious Behaviors Against Introspection Using Hardware Architectural Events
0
0.34
2020
A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering.
0
0.34
2019
Mix: A Joint Learning Framework For Detecting Both Clustered And Scattered Outliers In Mixed-Type Data
1
0.35
2019
Exploring a High-quality Outlying Feature Value Set for Noise-Resilient Outlier Detection in Categorical Data.
2
0.37
2018
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use
0
0.34
2018
Logistic Regression of Point Matches for Accurate Transformation Estimation
0
0.34
2018
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection.
0
0.34
2017
Inferring Phylogenetic Network Of Malware Families Based On Splits Graph
0
0.34
2017
Absent extreme learning machine algorithm with application to packed executable identification.
3
0.42
2016
The Similarity Analysis of Malicious Software
0
0.34
2016
Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis.
0
0.34
2016
Three-Dimensional Reconstruction of Building Roofs from Airborne LiDAR Data Based on a Layer Connection and Smoothness Strategy.
1
0.36
2016
Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm.
0
0.34
2015
Message Format Extraction of Cryptographic Protocol Based on Dynamic Binary Analysis.
0
0.34
2014
A Network Gene-Based Framework for Detecting Advanced Persistent Threats
5
0.47
2014
Reverse extraction of protocol model from network applications
1
0.35
2013
A binary analysis method for protocol deviation discovery from implementations
0
0.34
2013
Mining Network Behavior Specifications of Malware Based on Binary Analysis
0
0.34
2013
Rule-Based Security Capabilities Matching for Web Services
5
0.47
2013
iPanda: A comprehensive malware analysis tool
0
0.34
2013
An Automatic Approach to Detect Anti-debugging in Malware Analysis
3
0.39
2012
Remote Operation System Detection Base on Machine Learning
1
0.37
2009
Spreading activation model for connectivity based clustering
3
0.46
2006
Research And Implementation Of Mpls Vpn Protocol Based On Network Processor
0
0.34
2006
Personalized fair reputation based resource allocation in grid
2
0.45
2006
1