Publications
The students advised by me are underlined.
2024
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
Haojie He, Xingwei Lin, Ziang Weng, Ruijie Zhao, Shuitao Gan, Libo Chen, Yuede Ji, Jiashui Wang, Zhi Xue
[USENIX Security '24], The 33rd USENIX Security SymposiumCloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments.
Dalton A. Brucker-Hahn, Wang Feng, Shanchao Li, Matthew Petillo, Alexandru G. Bardas, Drew Davidson, Yuede Ji
[ACSAC '24], The 40th Annual Computer Security Applications Conference (ACSAC)API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification. [PDF][Code]
Lei Cui, Junan Yin, Jiancong Cui, Yuede Ji, Peng Liu, Zhiyu Hao, Xiaochun Yun
[TSE], IEEE Transactions on Software EngineeringTLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on Single and Multiple GPUs. [PDF][Code]
Qiang Fu, Yuede Ji, Thomas B. Rolinger, and H. Howie Huang,
[ACM TOPC], ACM Transactions on Parallel ComputingTrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing
Trent Reichenbach, Chenglong Fu, Xiaojiang Du, Jia Di, and Yuede Ji
[IEEE ICC '24], IEEE International Conference on Communications, 2024Fine-Grained Geo-Obfuscation to Protect Workers’ Location Privacy in Time-Sensitive Spatial Crowdsourcing. [PDF]
Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Squicciarini, Ramanamurthy Dantu, Juanjuan Zhao, and Chengzhong Xu
[EDBT '24], The 27th International Conference on Extending Database Technology (EDBT)
2023
PeeK: A Prune-Centric Approach for K Shortest Path Computation.[PDF][Code]
Wang Feng, Shiyang Chen, Hang Liu, and Yuede Ji
[SC '23], International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)Tango: Re-Thinking Quantization for Graph Neural Network Training on GPUs.[PDF]
Shiyang Chen, Da Zheng, Caiwen Ding, Chengying Huan, Yuede Ji, and Hang Liu
[SC '23], International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)API2vec: Learning Representations of API Sequences for Malware Detection. [PDF][Code]
Lei Cui*, Jiancong Cui*, Yuede Ji, Zhiyu Hao, Lun Li, Zhenquan Ding (* equal contributions).
[ISSTA '23], ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)Understanding Nationwide Power Outage and Restoration for Future Prediction. [PDF][Code]
Yasmeen Haleem, Isabelle Wagenvoord, Qianjun Wei, Ting Xiao, Tong Shu, and Yuede Ji
[SMCDC '23] 7th Annual Smoky Mountains Computational Sciences Data Challenge (SMCDC)
Best Poster AwardExploring Power and Thermal Dynamics in the Summit Supercomputer: A Data Visualization Study.[PDF][Code]
Joseph Caldwell, Wang Feng, Mimi Byun, Mark Albert, Tong Shu, and Yuede Ji
[SMCDC '23] 7th Annual Smoky Mountains Computational Sciences Data Challenge (SMCDC)
2022
Efficient Sparse Deep Neural Network Computation on GPU with TVM (Poster)
Lillian Wang, Avik Malladi, and Yuede Ji
[SC '22], International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on GPU. [PDF][Code]
Qiang Fu, Yuede Ji, and H. Howie Huang,
[HPDC '22], ACM International Symposium on High-Performance Parallel and Distributed Computing
Acceptance rate: 21/108 = 19%iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. [PDF]
Yuede Ji, Hang Liu, Yang Hu, and H. Howie Huang,
[ACM TOPC], ACM Transactions on Parallel ComputingIlluminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. [PDF][Code]
Haoyu He, Yuede Ji, and H. Howie Huang
[EuroS&P '22], IEEE European Symposium on Security and Privacy, 2022
Acceptance rate: 42/141 = 29.8%NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks. [PDF]
Yuede Ji and H. Howie Huang
[IEEE ICC '22], IEEE International Conference on Communications, 2022
2021
DEFInit: An Analysis of Exposed Android Init Routines. [PDF][PPT]
Yuede Ji, Mohamed Elsabagh, Ryan Johnson, and Angelos Stavrou
[USENIX Security '21], the 30th USENIX Security Symposium
Acceptance rate: 248/1319 = 18.8%BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. [PDF][PPT]
Yuede Ji, Lei Cui, and H. Howie Huang
[AsiaCCS '21], The ACM Asia Conference on Computer and Communications Security
Acceptance rate : 70/370 = 19%Vestige: Identifying Binary Code Provenance for Vulnerability Detection. [PDF][PPT]
Yuede Ji, Lei Cui, and H. Howie Huang
[ACNS '21], The 19th International Conference on Applied Cryptography and Network Security
Acceptance rate: 37/186 = 20%Discovering Unknown Advanced Persistent Threat Using Shared Features Mined by Neural Networks.
Longkang Shang, Dong Guo, Yuede Ji, and Qiang Li.
[Computer Networks], 2021.
2020 and Earlier
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI. [PDF]
Benjamin Bowman, Craig Laprade, Yuede Ji, and H. Howie Huang
[RAID '20], The 23rd International Symposium on Research in Attacks, Intrusions and Defenses
Acceptance rate: 31/121 = 25.6%Aquila: Adaptive Parallel Computation of Graph Connectivity Queries. [PDF][PPT][Video][Code]
Yuede Ji and H. Howie Huang
[HPDC '20], The 29th International Symposium on High-Performance Parallel and Distributed Computing
Acceptance rate: 16/71 = 22%SwarmGraph: Analyzing Large-Scale In-Memory Graphs on GPUs. [PDF]
Yuede Ji, Hang Liu, and H. Howie Huang.
[HPCC '20], IEEE International Conference on High Performance Computing and Communications (HPCC), 2020.GRL: Knowledge Graph Completion with GAN-based Reinforcement Learning.
Qi Wang, Yuede Ji, Yongsheng Hao, and Jie Cao.
[KBS], Knowledge-Based Systems, 2020.Securing Malware Cognitive Systems against Adversarial Attacks. [PDF][PPT]
Yuede Ji, Benjamin Bowman, and H. Howie Huang,
[ICCC '19], 2019 IEEE International Conference on Cognitive Computing,
Invited to the panel discussion at The AAAI-19 Workshop on Artificial Intelligence for Cyber SecurityStopping the Cyber Attack in the Early Stage: Assessing the Security Risks of Social Network Users. [PDF]
Bo Feng, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng.
[SCN], Security and Communication Networks, 2019.Understanding and Detecting Social Botnet.
Yuede Ji, and Qiang Li
Botnets: Architectures, Countermeasures, and Challenges, 2019.iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. [PDF][PPT][Code]
Yuede Ji, Hang Liu, and H. Howie Huang,
[SC '18], Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis
Acceptance rate (first round): 55/288 = 19%Understanding socialbot behavior on end hosts. [PDF]
Yukun He, Qiang Li, Jian Cao, Yuede Ji, and Dong Guo,
[IJDSN], International Journal of Distributed Sensor Networks, 2017.Detection of Forwarding-based Malicious URLs in Online Social Networks. [PDF]
Jian Cao, Qiang Li, Yuede Ji, Yukun He, and Dong Guo.
[NPC '14], IFIP International Conference on Network and Parallel Computing,
Invited to journal publication, International Journal of Parallel Programming, 44(1), 163-180, 2016.
Best Paper AwardCombating the evasion mechanisms of social bots. [PDF]
Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li
[Computers & Security], Volume 58, Pages 230-249, 2016.BotCatch: leveraging signature and behavior for bot detection. [PDF]
Yuede Ji, Qiang Li, Yukun He, and Dong Guo.
[SCN], Security and Communication Networks, 8(6): 952-969, 2015.Overhead Analysis and Evaluation of Approaches to Host-based Bot Detection. [PDF]
Yuede Ji, Qiang Li, Yukun He, and Dong Guo.
[IJDSN], International Journal of Distributed Sensor Networks, 2015.Towards Social Botnet Behavior Detecting in the End Host. [PDF] [PPT]
Yuede Ji, Yukun He, Xinyang Jiang, and Qiang Li.
[ICPADS '14], 20th IEEE International Conference on Parallel and Distributed System, 2014A Multiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. [PDF] [PPT]
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, and Dong Guo.
[ISPEC '14], Information Security Practice and Experience, 2014BotCatch: A Behavior and Signature Correlated Bot Detection Approach. [PDF] [PPT]
Yuede Ji, Yukun He, Qiang Li, and Dong Guo.
[HPCC '13], IEEE International Conference on High Performance Computing and Communications, 2013.BotInfer: A Bot Inference Approach by Correlating Host and Network Information. [PDF]
Yukun He, Qiang Li, Yuede Ji, and Dong Guo.
[NPC '13], IFIP International Conference on Network and Parallel Computing, 2013