Name
Affiliation
Papers
YONGJUN WANG
School of Computer, National University of Defense Technology, Changsha, China
25
Collaborators
Citations 
PageRank 
57
27
9.19
Referers 
Referees 
References 
94
493
174
Search Limit
100493
Title
Citations
PageRank
Year
On The Detection Of Malicious Behaviors Against Introspection Using Hardware Architectural Events00.342020
A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering.00.342019
Mix: A Joint Learning Framework For Detecting Both Clustered And Scattered Outliers In Mixed-Type Data10.352019
Exploring a High-quality Outlying Feature Value Set for Noise-Resilient Outlier Detection in Categorical Data.20.372018
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use00.342018
Logistic Regression of Point Matches for Accurate Transformation Estimation00.342018
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection.00.342017
Inferring Phylogenetic Network Of Malware Families Based On Splits Graph00.342017
Absent extreme learning machine algorithm with application to packed executable identification.30.422016
The Similarity Analysis of Malicious Software00.342016
Using a Fine-Grained Hybrid Feature for Malware Similarity Analysis.00.342016
Three-Dimensional Reconstruction of Building Roofs from Airborne LiDAR Data Based on a Layer Connection and Smoothness Strategy.10.362016
Malware Similarity Analysis Based on Graph Similarity Flooding Algorithm.00.342015
Message Format Extraction of Cryptographic Protocol Based on Dynamic Binary Analysis.00.342014
A Network Gene-Based Framework for Detecting Advanced Persistent Threats50.472014
Reverse extraction of protocol model from network applications10.352013
A binary analysis method for protocol deviation discovery from implementations00.342013
Mining Network Behavior Specifications of Malware Based on Binary Analysis00.342013
Rule-Based Security Capabilities Matching for Web Services50.472013
iPanda: A comprehensive malware analysis tool00.342013
An Automatic Approach to Detect Anti-debugging in Malware Analysis30.392012
Remote Operation System Detection Base on Machine Learning10.372009
Spreading activation model for connectivity based clustering30.462006
Research And Implementation Of Mpls Vpn Protocol Based On Network Processor00.342006
Personalized fair reputation based resource allocation in grid20.452006