default search action
Yun Shen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Yuan Chang, Peng Ding, Yun Shen, Wei Liang, Mingchuan Yang:
NeFF: Neural Feature Fields for Few-Shot View Synthesis Addressing the Shape-Radiance Ambiguity. IEEE Signal Process. Lett. 31: 551-555 (2024) - [j21]Jie Cui, Yun Shen, Hong Zhong, Jing Zhang, Lu Liu:
A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 25(1): 104-119 (2024) - [j20]Yun Shen, Jie Cui, Hong Zhong, Jing Zhang, Irina Bolodurina, Debiao He:
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus. IEEE Trans. Intell. Transp. Syst. 25(8): 10431-10445 (2024) - [c104]Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. AsiaCCS 2024 - [c103]Jinghan Wang, Qiuhong Zheng, Yun Shen:
Research on New Media Digital Copyright Registration and Trading Based on Blockchain. BMSB 2024: 1-6 - [c102]Jinghan Wang, Qiuhong Zheng, Yun Shen:
Research on Multi-level Trustworthy Multimedia Data Broadcasting Network Based on Blockchain Oracles. BMSB 2024: 1-5 - [c101]Qiuhong Zheng, Jinghan Wang, Yun Shen:
Human Model Reconstruction with Facial Region Optimization: A Fusion Nerf Approach. BMSB 2024: 1-6 - [c100]Qiuhong Zheng, Jinghan Wang, Yun Shen:
Overview and Trend of Large-scale Model Deployment Mode. BMSB 2024: 1-6 - [c99]Qiuhong Zheng, Jinghan Wang, Yun Shen:
Driveable 3D Human Reconstruction Focusing on Facial Precision Enhancement. BMSB 2024: 1-6 - [c98]Yungeng Zhang, Yuan Chang, Yun Shen, Peng Ding, Wei Liang, Mingchuan Yang:
Unsupervised Learning of Facial Optical Flow via Occlusion-Aware Global-Local Matching. ICASSP 2024: 3635-3639 - [c97]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Composite Backdoor Attacks Against Large Language Models. NAACL-HLT (Findings) 2024: 1459-1472 - [c96]Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. SP 2024: 770-787 - [c95]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. SP 2024: 1306-1324 - [c94]Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang:
Quantifying Privacy Risks of Prompts in Visual Prompt Learning. USENIX Security Symposium 2024 - [c93]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - [i39]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - [i38]Boyang Zhang, Yicong Tan, Yun Shen, Ahmed Salem, Michael Backes, Savvas Zannettou, Yang Zhang:
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification. CoRR abs/2407.20859 (2024) - [i37]Yixin Wu, Yun Shen, Michael Backes, Yang Zhang:
Image-Perfect Imperfections: Safety, Bias, and Authenticity in the Shadow of Text-To-Image Model Evolution. CoRR abs/2408.17285 (2024) - 2023
- [j19]Yun Shen, Yuben Qu, Chao Dong, Fuhui Zhou, Qihui Wu:
Joint Training and Resource Allocation Optimization for Federated Learning in UAV Swarm. IEEE Internet Things J. 10(3): 2272-2284 (2023) - [j18]Yuqian Jing, Yuben Qu, Chao Dong, Weiqing Ren, Yun Shen, Qihui Wu, Song Guo:
Exploiting UAV for Air-Ground Integrated Federated Learning: A Joint UAV Location and Resource Optimization Approach. IEEE Trans. Green Commun. Netw. 7(3): 1420-1433 (2023) - [c92]Dan Liu, Enfang Cui, Yun Shen, Peng Ding, Zhichao Zhang:
Federated Learning Model Training Mechanism with Edge Cloud Collaboration for Services in Smart Cities. BMSB 2023: 1-5 - [c91]Dan Liu, Peng Ding, Yun Shen, Zhichao Zhang, Dongdong Li:
Deployment Strategy of Edge Computing Server for 3D Video Transmission in Digital Twin Cities. BMSB 2023: 1-6 - [c90]Dan Liu, Yun Shen, Peng Ding, Ning Liu, HengRui Zhou:
Resource Pre-caching Strategy of Digital Twin System Based on Hierarchical MEC Architecture. BMSB 2023: 1-4 - [c89]Xinyu Ning, Kaicong Tian, Yun Shen, Yitong Liu, Hongwen Yang:
Optimization of VR Video Wireless Transmission Based on Fountain Code. BMSB 2023: 1-5 - [c88]Yun Shen, Peng Ding, Zhichao Zhang:
An Adaptive Video Streaming Delivery Structure based on Mobile Edge Intelligent. BMSB 2023: 1-6 - [c87]Yun Shen, Zhichao Zhang, Peng Ding:
An Intelligent Industrial Vision Scheme for Flexible Manufacturing Based on 5G Edge Cloud Collaboration. BMSB 2023: 1-5 - [c86]Yaqi Song, Yun Shen:
Computing Offloading Based on Deep Reinforcement Learning For Virtual Reality Scene. BMSB 2023: 1-5 - [c85]Yutong Wang, Mingchuan Yang, Peng Ding, Yun Shen, XiaoHou Shi, Meiling Dai:
A Design of Edge Distributed Video Analysis System Based on Serverless Computing Service. BMSB 2023: 1-6 - [c84]Jingwei Yan, Yitong Liu, Shuqi Qin, Yun Shen, Yu Teng, Hongwen Yang:
Edge Fusion of Intelligent Industrial Park Based on MatrixOne and Pravega. BMSB 2023: 1-4 - [c83]Qiuhong Zheng, Peng Ding, Yun Shen, Jinghan Wang, Zhichao Zhang:
Research on 3D Object Reconstruction Based on Single-view RGB Image. BMSB 2023: 1-5 - [c82]Qiuhong Zheng, Peng Ding, Yun Shen, Jinghan Wang, Zhichao Zhang:
Research on 3D Driveable Digital Human Generation System. BMSB 2023: 1-5 - [c81]Qiuhong Zheng, Jinghan Wang, Yun Shen, Peng Ding, Zhichao Zhang:
Adaptive Resource Allocation Based on Scoring Mechanism and Priority for 3D rendering. BMSB 2023: 1-5 - [c80]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. ICML 2023: 23412-23428 - [c79]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. NDSS 2023 - [c78]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. USENIX Security Symposium 2023: 5289-5306 - [c77]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. USENIX Security Symposium 2023: 5683-5700 - [i36]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Backdoor Attacks Against Dataset Distillation. CoRR abs/2301.01197 (2023) - [i35]Savino Dambra, Leyla Bilge, Platon Kotzias, Yun Shen, Juan Caballero:
One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles. CoRR abs/2301.07346 (2023) - [i34]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. CoRR abs/2302.11982 (2023) - [i33]Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang:
Watermarking Diffusion Model. CoRR abs/2305.12502 (2023) - [i32]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. CoRR abs/2306.07758 (2023) - [i31]Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang:
"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models. CoRR abs/2308.03825 (2023) - [i30]Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. CoRR abs/2308.05596 (2023) - [i29]Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Robustness Over Time: Understanding Adversarial Examples' Effectiveness on Longitudinal Versions of Large Language Models. CoRR abs/2308.07847 (2023) - [i28]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. CoRR abs/2308.08505 (2023) - [i27]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Prompt Backdoors in Visual Prompt Learning. CoRR abs/2310.07632 (2023) - [i26]Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang:
Composite Backdoor Attacks Against Large Language Models. CoRR abs/2310.07676 (2023) - [i25]Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang:
Quantifying Privacy Risks of Prompts in Visual Prompt Learning. CoRR abs/2310.11970 (2023) - [i24]Yixin Wu, Ning Yu, Michael Backes, Yun Shen, Yang Zhang:
On the Proactive Generation of Unsafe Images From Text-To-Image Models Using Benign Prompts. CoRR abs/2310.16613 (2023) - [i23]Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang:
Comprehensive Assessment of Toxicity in ChatGPT. CoRR abs/2311.14685 (2023) - [i22]Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. CoRR abs/2312.11213 (2023) - 2022
- [j17]Miaojun Bai, Yan Zheng, Yun Shen:
Gradient boosting survival tree with applications in credit scoring. J. Oper. Res. Soc. 73(1): 39-55 (2022) - [c76]Peng Ding, Dan Liu, Yun Shen, Duan Huibin, Qiuhong Zheng:
Edge-to-Cloud Intelligent Vehicle-Infrastructure Based on 5G Time-Sensitive Network Integration. BMSB 2022: 1-5 - [c75]Lu Guo, Yun Shen, Peng Ding:
An Algorithm of Emotion Recognition And Valence of Drivers on Multimodal Data. BMSB 2022: 1-5 - [c74]Yun Shen, Peng Ding, Yuying Xue, Yaqi Song:
A QoE-driven Adaptive Transmission Scheme for Streaming Media Service. BMSB 2022: 1-5 - [c73]Yaqi Song, Yun Shen, Peng Ding:
Multimedia Analytics Based On Air-assisted Vehicle Network In Smart City. BMSB 2022: 1-5 - [c72]Yutong Wang, Peng Ding, Yun Shen, XiaoHou Shi, HengRui Zhou:
Fine-grained object tracking system infrastructure based on cloud-edge collaboration. BMSB 2022: 1-5 - [c71]Qiuhong Zheng, Peng Ding, Yun Shen, Dan Liu:
5G and F5G Converged Network Architecture for Fusion System of Video and 3D Model in Intelligent Park. BMSB 2022: 1-5 - [c70]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CCS 2022: 1427-1441 - [c69]Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
CERBERUS: Exploring Federated Prediction of Security Events. CCS 2022: 2337-2351 - [c68]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c67]Hongyan Bao, Yufei Han, Yujun Zhou, Yun Shen, Xiangliang Zhang:
Towards Understanding the Robustness Against Evasion Attack on Categorical Data. ICLR 2022 - [c66]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. NeurIPS 2022 - [c65]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. SP 2022: 1175-1192 - [c64]Dan Liu, Lai Wei, Qiuhong Zheng, Peng Ding, Yun Shen:
Design and Implementation of Distributed Rendering System. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2366-2371 - [c63]Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned. USENIX Security Symposium 2022: 1167-1184 - [c62]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. USENIX Security Symposium 2022: 4543-4560 - [i21]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i20]Hai Huang, Zhikun Zhang, Yun Shen, Michael Backes, Qi Li, Yang Zhang:
On the Privacy Risks of Cell-Based NAS Architectures. CoRR abs/2209.01688 (2022) - [i19]Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
Cerberus: Exploring Federated Prediction of Security Events. CoRR abs/2209.03050 (2022) - [i18]Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang:
Backdoor Attacks in the Supply Chain of Masked Image Modeling. CoRR abs/2210.01632 (2022) - [i17]Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang:
Amplifying Membership Exposure via Data Poisoning. CoRR abs/2211.00463 (2022) - 2021
- [j16]Chao Dong, Yun Shen, Yuben Qu, Kun Wang, Jianchao Zheng, Qihui Wu, Fan Wu:
UAVs as an Intelligent Service: Boosting Edge Intelligence for Air-Ground Integrated Networks. IEEE Netw. 35(4): 167-175 (2021) - [c61]Yun Shen, Gianluca Stringhini:
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices. EuroS&P 2021: 562-577 - [c60]Yuqian Jing, Yuben Qu, Chao Dong, Yun Shen, Zhenhua Wei, Shangguang Wang:
Joint UAV Location and Resource Allocation for Air-Ground Integrated Federated Learning. GLOBECOM 2021: 1-6 - [c59]Dennis Milechin, Ahmed Aly, Josh Bevan, Charlie Jahnke, Yun Shen, Brian Gregor:
Pragmatic Benchmarking for Research Computing. HPEC 2021: 1-6 - [c58]Boyi Wan, Yun Shen:
Stock Trend Prediction of Communication Industry Based on LSTM Neural Network Algorithm and Research of Industry Development Strategy: - A Case Study of Zhongxing Telecommunication Equipment Corporation. ICCMB 2021: 102-106 - [c57]Yaqi Song, Yun Shen, Peng Ding, Xuezhi Zhang, Yuying Xue:
Industrial Vision Optimization Distributed Strategy based on Edge Intelligence Collaboration. IWCMC 2021: 1291-1296 - [c56]Peng Ding, Dan Liu, Yun Shen, XiaoHou Shi, HengRui Zhou, HaoLong Kan:
Industrial Intelligent Edge Computing System based on 5G. IWCMC 2021: 1494-1498 - [c55]Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:
Understanding Worldwide Private Information Collection on Android. NDSS 2021 - [c54]Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. RAID 2021: 340-353 - [c53]Octavian Ciprian Bordeanu, Gianluca Stringhini, Yun Shen, Toby Davies:
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage. SecureComm (2) 2021: 164-184 - [i16]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021) - [i15]Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:
Understanding Worldwide Private Information Collection on Android. CoRR abs/2102.12869 (2021) - [i14]Yun Shen, Gianluca Stringhini:
ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices. CoRR abs/2103.05476 (2021) - [i13]Colin C. Ife, Yun Shen, Gianluca Stringhini, Steven J. Murdoch:
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown. CoRR abs/2104.01631 (2021) - [i12]Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini:
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned. CoRR abs/2108.04754 (2021) - [i11]Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang:
Inference Attacks Against Graph Neural Networks. CoRR abs/2110.02631 (2021) - [i10]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2112.08331 (2021) - 2020
- [j15]Katja Luck, Dae-Kyum Kim, Luke Lambourne, Kerstin Spirohn, Bridget E. Begg, Wenting Bian, Ruth Brignall, Tiziana Cafarelli, Francisco J. Campos-Laborie, Benoît Charloteaux, Dong-Sic Choi, Atina G. Coté, Meaghan Daley, Steven Deimling, Alice Desbuleux, Amélie Dricot, Marinella Gebbia, Madeleine F. Hardy, Nishka Kishore, Jennifer J. Knapp, István A. Kovács, Irma Lemmens, Miles W. Mee, Joseph C. Mellor, Carl Pollis, Carles Pons, Aaron D. Richardson, Sadie Schlabach, Bridget Teeking, Anupama Yadav, Mariana Babor, Dawit Balcha, Omer Basha, Christian Bowman-Colin, Suet-Feung Chin, Soon-gang Choi, Claudia Colabella, Georges Coppin, Cassandra D'Amata, David De Ridder, Steffi De Rouck, Miquel Duran-Frigola, Hanane Ennajdaoui, Florian Goebels, Liana Goehring, Anjali Gopal, Ghazal Haddad, Elodie Hatchi, Mohamed Helmy, Yves Jacob, Yoseph Kassa, Serena Landini, Roujia Li, Natascha van Lieshout, Andrew MacWilliams, Dylan Markey, Joseph N. Paulson, Sudharshan Rangarajan, John Rasla, Ashyad Rayhan, Thomas Rolland, Adriana San-Miguel, Yun Shen, Dayag Sheykhkarimli, Gloria M. Sheynkman, Eyal Simonovsky, Murat Tasan, Alexander Tejeda, Vincent Tropepe, Jean-Claude Twizere, Yang Wang, Robert J. Weatheritt, Jochen Weile, Yu Xia, Xinping Yang, Esti Yeger Lotem, Quan Zhong, Patrick Aloy, Gary D. Bader, Javier De Las Rivas, Suzanne Gaudet, Tong Hao, Janusz Rak, Jan Tavernier, David E. Hill, Marc Vidal, Frederick P. Roth, Michael A. Calderwood:
A reference map of the human binary protein interactome. Nat. 580(7803): 402-408 (2020) - [c52]Emanuele Cozzi, Pierre-Antoine Vervier, Matteo Dell'Amico, Yun Shen, Leyla Bilge, Davide Balzarotti:
The Tangled Genealogy of IoT Malware. ACSAC 2020: 1-16 - [c51]Yutong Wang, Yufei Han, Hongyan Bao, Yun Shen, Fenglong Ma, Jin Li, Xiangliang Zhang:
Attackability Characterization of Adversarial Evasion Attack on Discrete Data. KDD 2020: 1415-1425 - [i9]Chao Dong, Yun Shen, Yuben Qu, Qihui Wu, Fan Wu, Guihai Chen:
UAVs as a Service: Boosting Edge Intelligence for Air-Ground Integrated Networks. CoRR abs/2003.10737 (2020) - [i8]Yuben Qu, Chao Dong, Jianchao Zheng, Qihui Wu, Yun Shen, Fan Wu, Alagan Anpalagan:
Empowering the Edge Intelligence by Air-Ground Integrated Federated Learning in 6G Networks. CoRR abs/2007.13054 (2020)
2010 – 2019
- 2019
- [j14]Haocai Huang, Yong Guo, Zhikun Wang, Yun Shen, Yan Wei:
Water Temperature Observation by Coastal Acoustic Tomography in Artificial Upwelling Area. Sensors 19(12): 2655 (2019) - [c50]Yun Shen, Pierre-Antoine Vervier:
IoT Security and Privacy Labels. APF 2019: 136-147 - [c49]Colin C. Ife, Yun Shen, Steven J. Murdoch, Gianluca Stringhini:
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web. AsiaCCS 2019: 168-180 - [c48]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. IJCNN 2019: 1-8 - [c47]Yun Shen, Gianluca Stringhini:
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. USENIX Security Symposium 2019: 905-921 - [i7]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. CoRR abs/1905.02796 (2019) - [i6]Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini:
Tiresias: Predicting Security Events Through Deep Learning. CoRR abs/1905.10328 (2019) - [i5]Yun Shen, Gianluca Stringhini:
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. CoRR abs/1905.12590 (2019) - [i4]Miaojun Bai, Yan Zheng, Yun Shen:
Gradient Boosting Survival Tree with Applications in Credit Scoring. CoRR abs/1908.03385 (2019) - 2018
- [c46]Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini:
Tiresias: Predicting Security Events Through Deep Learning. CCS 2018: 592-605 - [c45]Yufei Han, Guolei Sun, Yun Shen, Xiangliang Zhang:
Multi-label Learning with Highly Incomplete Data via Collaborative Embedding. KDD 2018: 1494-1503 - [c44]Pierre-Antoine Vervier, Yun Shen:
Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape. RAID 2018: 556-576 - 2017
- [j13]Kongyang Chen, Yue Mi, Yun Shen, Yan Hong, Ai Chen, Mingming Lu:
SparseLoc: Indoor Localization Using Sparse Representation. IEEE Access 5: 20171-20182 (2017) - [c43]Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang:
Marmite: Spreading Malicious File Reputation Through Download Graphs. ACSAC 2017: 91-102 - [c42]Jie Song, Yun Shen, Yongcheng Jing, Mingli Song:
Towards Deeper Insights into Deep Learning from Imbalanced Data. CCCV (1) 2017: 674-684 - [c41]Xiaoyu Tang, Yun Shen, Siliang Li, Qinmin Yang, Youxian Sun:
Mixed Installation to Optimize the Position and Type Selection of Turbines for Wind Farms. ICONIP (6) 2017: 307-315 - [c40]Danilo Martino, Yun Shen, Marco Paracchini, Marco Marcon, Emanuele Plebani, Danilo Pietro Pau:
Accurate cyber-physical system simulation for distributed visual search applications. RTSI 2017: 1-5 - 2016
- [c39]Ibrahim M. Alabdulmohsin, Yufei Han, Yun Shen, Xiangliang Zhang:
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph. CIKM 2016: 2395-2400 - [c38]Yufei Han, Yun Shen:
Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection. IJCAI 2016: 1548-1554 - [c37]Yun Shen, Nathan S. Evans, Azzedine Benameur:
Insights into rooted and non-rooted Android mobile devices with behavior analytics. SAC 2016: 580-587 - [c36]Yufei Han, Yun Shen:
Accurate spear phishing campaign attribution and early detection. SAC 2016: 2079-2086 - [i3]Yufei Han, Yun Shen, Maurizio Filippone:
Mini-Batch Spectral Clustering. CoRR abs/1607.02024 (2016) - 2015
- [j12]Yun Shen, Yitong Liu, Hongwen Yang, Dacheng Yang:
Quality of Experience Study on Dynamic Adaptive Streaming Based on HTTP. IEICE Trans. Commun. 98-B(1): 62-70 (2015) - [c35]Yun Shen, Honghui Dong, Limin Jia, Yong Qin, Fei Su, Mingchao Wu, Kai Liu, Pan Li, Zhao Tian:
A Method of Traffic Travel Status Segmentation Based on Position Trajectories. ITSC 2015: 2877-2882 - [c34]Nathan S. Evans, Azzedine Benameur, Yun Shen:
All your Root Checks are Belong to Us: The Sad State of Root Detection. MobiWac 2015: 81-88 - [c33]Tianyao Sun, Hanli Wang, Yun Shen, Jun Wu:
Accelerating Support Vector Machine Learning with GPU-Based MapReduce. SMC 2015: 876-881 - 2014
- [j11]Yun Shen, Yitong Liu, Jing Liu, Hongwen Yang, Dacheng Yang:
A Novel Structure of HTTP Adaptive Streaming Based on Unequal Error Protection Rateless Code. IEICE Trans. Inf. Syst. 97-D(11): 2903-2911 (2014) - [j10]Yitong Liu, Hao Liu, Yuchen Li, Yun Shen, Jianwei Wu, Dacheng Yang:
A Software Platform Design for Objective Video QoE Assessment. J. Softw. 9(11): 2955-2965 (2014) - [j9]Xin Fu, Yun Shen:
Study of collective user behaviour in Twitter: a fuzzy approach. Neural Comput. Appl. 25(7-8): 1603-1614 (2014) - [j8]Yun Shen, Michael J. Tobia, Tobias Sommer, Klaus Obermayer:
Risk-Sensitive Reinforcement Learning. Neural Comput. 26(7): 1298-1328 (2014) - [c32]Yun Shen, Olivier Thonnard:
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications. IEEE BigData 2014: 627-635 - [c31]Jing Liu, Yun Shen, Yitong Liu, Nanxi Li, Dacheng Yang:
An intelligent video streaming delivery of SVC based on rateless UEP convolutional code. CCIS 2014: 685-690 - [c30]Yun Shen, Wilhelm Stannat, Klaus Obermayer:
A unified framework for risk-sensitive Markov control processes. CDC 2014: 1073-1078 - [c29]Yun Shen, Ruihong Huang, Chang Yan, Klaus Obermayer:
Risk-averse reinforcement learning for algorithmic trading. CIFEr 2014: 391-398 - [c28]Qi Lin, Yitong Liu, Yun Shen, Hui Shen, Lin Sang, Dacheng Yang:
Bandwidth estimation of rate adaption algorithm in DASH. GLOBECOM Workshops 2014: 243-247 - [c27]Yun Shen, Yitong Liu, Qianhong Liu, Dacheng Yang:
A method of QoE evaluation for adaptive streaming based on bitrate distribution. ICC Workshops 2014: 551-556 - [c26]Yun Shen, Ting Feng, Wanbin Tang, Yuxiang Lan:
Maximum achievable arrival rate of secondary users under GoS constraints in cognitive radio networks. IWCMC 2014: 363-368 - 2013
- [j7]Wendelin Böhmer, Steffen Grünewälder, Yun Shen, Marek Musial, Klaus Obermayer:
Construction of approximation spaces for reinforcement learning. J. Mach. Learn. Res. 14(1): 2067-2118 (2013) - [j6]Yun Shen, Wilhelm Stannat, Klaus Obermayer:
Risk-Sensitive Markov Control Processes. SIAM J. Control. Optim. 51(5): 3652-3672 (2013) - [c25]Yitong Liu, Yun Shen, Yinian Mao, Jing Liu, Qi Lin, Dacheng Yang:
A study on Quality of Experience for adaptive streaming service. ICC Workshops 2013: 682-686 - [c24]Yitong Liu, Yun Shen, Qianhong Liu, Ran Shi, Hongwen Yang, Dacheng Yang, Lin Sang:
Performance Evaluation and Accuracy Upgrading of PESQ in Chinese Environment. VTC Spring 2013: 1-5 - [i2]Yun Shen, Michael J. Tobia, Tobias Sommer, Klaus Obermayer:
Risk-sensitive Reinforcement Learning. CoRR abs/1311.2097 (2013) - 2012
- [j5]Miranda Mowbray, Siani Pearson, Yun Shen:
Enhancing privacy in cloud computing via policy-based obfuscation. J. Supercomput. 61(2): 267-291 (2012) - [c23]Hanli Wang, Yun Shen, Lei Wang, Kuangtian Zhufeng, Wei Wang, Cheng Cheng:
Large-scale multimedia data mining using MapReduce framework. CloudCom 2012: 287-292 - [c22]Yun Shen, Yitong Liu, Nan Qiao, Lin Sang, Dacheng Yang:
QoE-based evaluation model on video streaming service quality. GLOBECOM Workshops 2012: 1314-1318 - 2011
- [j4]Yun Shen, Ling Feng:
Evaluation of XPath queries with preducates: an Eulerian cycle theory based sequencing approach. Comput. Syst. Sci. Eng. 26(4) (2011) - [i1]Yun Shen, Steffen Grünewälder, Klaus Obermayer:
A Unified Framework for Risk-sensitive Markov Decision Processes with Finite State and Action Spaces. CoRR abs/1110.6317 (2011) - 2010
- [j3]Trevor Martin, Yun Shen, Andrei Majidian:
Discovery of time-varying relations using fuzzy formal concept analysis and associations. Int. J. Intell. Syst. 25(12): 1217-1248 (2010) - [c21]Nurfadhlina Mohd Sharef, Yun Shen:
Text fragment extraction using incremental evolving fuzzy grammar fragments learner. FUZZ-IEEE 2010: 1-8 - [c20]Yun Shen, Trevor Martin:
Intelligent user search behaviour knowledge discovery. FUZZ-IEEE 2010: 1-8 - [c19]Trevor P. Martin, Yun Shen, Andrei Majidian:
Soft Concept Hierarchies to Summarise Data Streams and Highlight Anomalous Changes. IPMU (2) 2010: 44-54 - [c18]Siani Pearson, Yun Shen:
Context-Aware Privacy Design Pattern Selection. TrustBus 2010: 69-80
2000 – 2009
- 2009
- [c17]Yun Shen, Trevor P. Martin, Pete Bramhall:
Intelligent Security Data Analysis. CIS (1) 2009: 74-78 - [c16]Trevor Martin, Yun Shen:
mTRACK - Monitoring time-varying relations in approximately categorised knowledge. CISDA 2009: 1-8 - [c15]Siani Pearson, Yun Shen, Miranda Mowbray:
A Privacy Manager for Cloud Computing. CloudCom 2009: 90-106 - [c14]Sadie Creese, Paul Hopkins, Siani Pearson, Yun Shen:
Data Protection-Aware Design for Cloud Services. CloudCom 2009: 119-130 - [c13]Nurfadhlina Mohd Sharef, Trevor Martin, Yun Shen:
Minimal Combination for Incremental Grammar Fragment Learning. IFSA/EUSFLAT Conf. 2009: 909-914 - [c12]Trevor Martin, Yun Shen:
Data Integration, Approximate Categorisation and Fuzzy Associations. IFSA/EUSFLAT Conf. 2009: 986-991 - [c11]Nurfadhlina Mohd Sharef, Trevor Martin, Yun Shen:
Order Independent Incremental Evolving Fuzzy Grammar Fragment Learner. ISDA 2009: 1221-1226 - [p1]Trevor Martin, Yun Shen:
Fuzzy Association Rules to Summarise Multiple Taxonomies in Large Databases. Scalable Fuzzy Algorithms for Data Management and Analysis 2009: 273-301 - 2008
- [j2]Trevor P. Martin, Yun Shen, Ben Azvine:
Incremental Evolution of Fuzzy Grammar Fragments to Enhance Instance Matching and Text Mining. IEEE Trans. Fuzzy Syst. 16(6): 1425-1438 (2008) - [c10]Yun Shen, Trevor P. Martin:
Granular Association Analysis. BLISS 2008: 142-147 - [c9]Trevor P. Martin, Yun Shen, Ben Azvine:
Automated semantic tagging using fuzzy grammar fragments. FUZZ-IEEE 2008: 2224-2229 - [c8]Trevor P. Martin, Yun Shen, Ben Azvine:
Granular Association Rules for Multiple Taxonomies: A Mass Assignment Approach. URSW (LNCS Vol.) 2008: 224-243 - 2007
- [c7]Trevor Martin, Ben Azvine, Yun Shen:
Computational Intelligence Support for Smart Queries and Adaptive Data. CISDA 2007: 77-84 - [c6]Trevor P. Martin, Yun Shen, Ben Azvine:
Finding Soft Relations in Granular Information Hierarchies. GrC 2007: 324-329 - [c5]Trevor Martin, Yun Shen, Ben Azvine:
A Mass Assignment Approach to Granular Association Rules for Multiple Taxonomies. URSW 2007 - 2005
- [b1]Yun Shen:
Accelerating data retrieval steps in XML documents. University of Hull, Kingston upon Hull, UK, 2005 - [c4]Bing Wang, Ling Feng, Yun Shen:
Efficient XPath Evaluation. ADBIS 2005: 223-237 - [c3]Trevor P. Martin, Yun Shen:
Improving Access to Multimedia Using Multi-source Hierarchical Meta-data. Adaptive Multimedia Retrieval 2005: 266-278 - 2004
- [c2]Yun Shen, Ling Feng, Tao Shen, Bing Wang:
A Self-adaptive Scope Allocation Scheme for Labeling Dynamic XML Documents. DEXA 2004: 811-821 - 2003
- [c1]Yun Shen, Bing Wang:
Clustering Schemaless XML Documents. OTM 2003: 767-784 - 2000
- [j1]Hui Hu, Tin-Su Pan, Yun Shen:
Multi-slice helical CT: scan and image temporal resolution. IEEE Trans. Medical Imaging 19(5): 384-390 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint