


default search action
Jiao Yin 0003
Person information
- affiliation: La Trobe University, Melbourne, Australia
- affiliation: Chongqing University of Arts and Sciences, Chongqin, China
Other persons with the same name
- Jiao Yin 0001 — Ningbo University, Ningbo, China
- Jiao Yin 0002 — Nanjing Normal University, China
- Jiao Yin 0004 — Kunming University of Science and Technology, Kunming, China
- Jiao Yin 0005 — Zhejiang Normal University, School of Computer Science and Technology, Jinhua, China
- Jiao Yin 0006 — China Medical University, Shengjing Hospital, Department of Ultrasound, Shenyang, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yong Li, Shuhang Wang, Shijie Xu
, Jiao Yin:
Trustworthy semi-supervised anomaly detection for online-to-offline logistics business in merchant identification. CAAI Trans. Intell. Technol. 9(3): 544-556 (2024) - [j11]Phavithra Manoharan, Wei Hong, Jiao Yin
, Hua Wang, Yanchun Zhang, Wenjie Ye:
Optimising Insider Threat Prediction: Exploring BiLSTM Networks and Sequential Features. Data Sci. Eng. 9(4): 393-408 (2024) - [j10]Jiao Yin
, Wei Hong
, Hua Wang
, Jinli Cao
, Yuan Miao
, Yanchun Zhang
:
A Compact Vulnerability Knowledge Graph for Risk Assessment. ACM Trans. Knowl. Discov. Data 18(8): 194:1-194:17 (2024) - [j9]Jiao Yin, Guihong Chen, Wei Hong, Jinli Cao, Hua Wang, Yuan Miao:
A heterogeneous graph-based semi-supervised learning framework for access control decision-making. World Wide Web (WWW) 27(4): 35 (2024) - [c16]Phavithra Manoharan, Jiao Yin, Hua Wang, Yanchun Zhang, Wenjie Ye:
Insider Threat Detection: A Review. NaNA 2024: 147-153 - [c15]Marwah Alharbi
, Jiao Yin
, Yuan Miao
, Jinli Cao
:
From Data to Insights: Constructing and Evaluating a Hospitality Dataset for Quadruple Aspect-Based Sentiment Analysis. WISE (1) 2024: 102-113 - 2023
- [j8]Yingqun Chen, Shaodong Han, Guihong Chen
, Jiao Yin, Kate Nana Wang, Jinli Cao:
A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services. Health Inf. Sci. Syst. 11(1): 8 (2023) - [j7]Jiao Yin
, MingJian Tang
, Jinli Cao
, Mingshan You
, Hua Wang
, Mamoun Alazab
:
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery. IEEE Trans. Ind. Informatics 19(4): 5593-5601 (2023) - [j6]Mingshan You, Jiao Yin
, Hua Wang
, Jinli Cao, Kate N. Wang, Yuan Miao
, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c14]Marwah Alharbi
, Jiao Yin
, Hua Wang
:
Surveying the Landscape: Compound Methods for Aspect-Based Sentiment Analysis. ADC 2023: 101-115 - [c13]Fan Xiao
, Wei Hong
, Jiao Yin
, Hua Wang
, Jinli Cao
, Yanchun Zhang
:
A Study on Historical Behaviour Enabled Insider Threat Prediction. APWeb/WAIM (3) 2023: 464-476 - [c12]Yanjun Liu
, Daizhong Luo
, Kate N. Wang, Jiao Yin
:
Unveiling the Pandemic's Impact: A Dataset for Probing COVID-19's Effects on E-Learning Activities and Academic Performance. HIS 2023: 149-160 - [c11]Puti Xu
, Wei Hong
, Jiao Yin
, Kate N. Wang, Yanchun Zhang
:
Analyzing the Impact of COVID-19 on Education: A Comparative Study Based on TOEFL Test Results. HIS 2023: 175-184 - [c10]Xingping Zhang
, Guijuan Zhang, Xingting Qiu, Jiao Yin
, Wenjun Tan, Xiaoxia Yin, Hong Yang, Kun Wang, Yanchun Zhang:
Optimizing the Size of Peritumoral Region for Assessing Non-Small Cell Lung Cancer Heterogeneity Using Radiomics. HIS 2023: 309-320 - [c9]Shaodong Han, Yingqun Chen, Guihong Chen, Jiao Yin, Hua Wang
, Jinli Cao:
Multi-step reinforcement learning-based offloading for vehicle edge computing. ICACI 2023: 1-8 - [c8]Phavithra Manoharan, Wei Hong, Jiao Yin, Yanchun Zhang, Wenjie Ye, Jiangang Ma:
Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks. WISE 2023: 179-188 - [c7]Maojie Wang
, Shaodong Han
, Guihong Chen
, Jiao Yin
, Jinli Cao
:
Blockchain-Empowered Resource Allocation and Data Security for Efficient Vehicular Edge Computing. WISE 2023: 205-219 - [c6]Jiao Yin
, Guihong Chen
, Wei Hong
, Hua Wang
, Jinli Cao
, Yuan Miao
:
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction. WISE 2023: 289-299 - [p1]Jiao Yin
, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang:
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. Emerging Trends in Cybersecurity Applications 2023: 371-389 - 2022
- [j5]Jiao Yin
, MingJian Tang, Jinli Cao, Hua Wang
, Mingshan You:
A real-time dynamic concept adaptive learning algorithm for exploitability prediction. Neurocomputing 472: 252-265 (2022) - [j4]Jiao Yin
, MingJian Tang, Jinli Cao, Hua Wang
, Mingshan You
, Yongzheng Lin:
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25(1): 401-423 (2022) - [c5]Wei Hong
, Jiao Yin
, Mingshan You
, Hua Wang
, Jinli Cao
, Jianxin Li
, Ming Liu
:
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. NSS 2022: 86-102 - 2021
- [j3]MingJian Tang
, Jiao Yin
, Mamoun Alazab
, Jinli Cao
, Yuxiu Luo:
Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments. IEEE Trans. Ind. Informatics 17(6): 4150-4158 (2021) - [c4]Mingshan You
, Jiao Yin
, Hua Wang
, Jinli Cao
, Yuan Miao
:
A Minority Class Boosted Framework for Adaptive Access Control Decision-Making. WISE (1) 2021: 143-157 - 2020
- [j2]Jiao Yin
, MingJian Tang, Jinli Cao, Hua Wang
:
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. Knowl. Based Syst. 210: 106529 (2020) - [c3]Jiao Yin
, Mingshan You
, Jinli Cao, Hua Wang
, MingJian Tang, Yong-Feng Ge
:
Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group. ADC 2020: 225-233 - [c2]Jiao Yin
, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You
, Yongzheng Lin:
Adaptive Online Learning for Vulnerability Exploitation Time Prediction. WISE (2) 2020: 252-266
2010 – 2019
- 2019
- [j1]Jiao Yin
, Jinli Cao, Siuly Siuly
, Hua Wang
:
An Integrated MCI Detection Framework Based on Spectral-temporal Analysis. Int. J. Autom. Comput. 16(6): 786-799 (2019) - [c1]Yong-Feng Ge
, Jinli Cao, Hua Wang
, Jiao Yin
, Wei-jie Yu, Zhi-Hui Zhan, Jun Zhang
:
A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation. GECCO 2019: 771-776
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 01:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint