Using customer-related data to enhance e-grocery home delivery S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao Industrial Management & Data Systems 117 (9), 1917-1933, 2017 | 199 | 2017 |
Riskteller: Predicting the risk of cyber incidents L Bilge, Y Han, M Dell'Amico Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 113 | 2017 |
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization Y Han, F Moutarde International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016 | 90 | 2016 |
Model Stealing Attacks Against Inductive Graph Neural Networks YZ Yun Shen, Xinlei He, Yufei Han The 43rd IEEE Symposium on Security and Privacy, https://arxiv.org/abs/2112 …, 2021 | 74* | 2021 |
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti Network and Distributed Systems Security Symposium, https://www.ndss …, 2021 | 70 | 2021 |
Explainable artificial intelligence for cybersecurity: a literature survey TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ... Annals of Telecommunications, 2022 | 61 | 2022 |
Accurate spear phishing campaign attribution and early detection YF Han, Y Shen Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016 | 59 | 2016 |
Embedded palmprint recognition system on mobile devices Y Han, T Tan, Z Sun, Y Hao Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 57 | 2007 |
Palmprint recognition under unconstrained scenes Y Han, Z Sun, F Wang, T Tan Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007 | 56 | 2007 |
Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning X Lyu, Y Han, W Wang, J Liu, B Wang, J Liu, X Zhang Proceedings of the AAAI Conference on Artificial Intelligence 37 (7), 9020-9028, 2023 | 48 | 2023 |
On the impact of socio-economic factors on power load forecasting Y Han, X Sha, E Grover-Silva, P Michiardi 2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014 | 38 | 2014 |
Learning gabor magnitude features for palmprint recognition R Chu, Z Lei, Y Han, R He, SZ Li Asian Conference on Computer Vision, 22-31, 2007 | 36 | 2007 |
Marmite: spreading malicious file reputation through download graphs G Stringhini, Y Shen, Y Han, X Zhang Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017 | 34 | 2017 |
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle Transportation Research Board 91st Annual Meeting (TRB'2012), 2012 | 34 | 2012 |
Analysis of network-level traffic states using locality preservative non-negative matrix factorization Y Han, F Moutarde 2011 14th international IEEE conference on Intelligent Transportation …, 2011 | 34 | 2011 |
Fusion of face and palmprint for personal identification based on ordinal features R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan 2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007 | 34 | 2007 |
Accurate real-time identification of malicious BGP hijacks PAV Yun Shen, Yufei Han US Patent 10,148,690, 2018 | 33 | 2018 |
Robust federated learning via collaborative machine teaching Y Han, X Zhang Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020 | 31 | 2020 |
Errors in the CICIDS2017 dataset and the significant differences in detection performances it makes M Lanvin, PF Gimenez, Y Han, F Majorczyk, L Mé, E Totel International Conference on Risks and Security of Internet and Systems, 18-33, 2022 | 30 | 2022 |
Systems and methods for detecting security events HAN Yufei, Y Shen US Patent 9,628,506, 2017 | 30 | 2017 |