Full Publication List
2022
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. [PDF]
Yuede Ji, Hang Liu, Yang Hu, and H. Howie Huang,
[ACM TOPC], ACM Transactions on Parallel ComputingIlluminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. [PDF]
Haoyu He, Yuede Ji, and H. Howie Huang
[EuroS&P’22], IEEE European Symposium on Security and Privacy, 2022
Acceptance rate: 42/141 = 29.8%NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks. [PDF]
Yuede Ji and H. Howie Huang
[IEEE ICC’22], IEEE International Conference on Communications, 2022
2021
DEFInit: An Analysis of Exposed Android Init Routines. [PDF][PPT]
Yuede Ji, Mohamed Elsabagh, Ryan Johnson, and Angelos Stavrou
[USENIX Security’21], the 30th USENIX Security Symposium
Acceptance rate: 248/1319 = 18.8%BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. [PDF][PPT]
Yuede Ji, Lei Cui, and H. Howie Huang
[AsiaCCS’21], The ACM Asia Conference on Computer and Communications Security
Acceptance rate : 70/370 = 19%Vestige: Identifying Binary Code Provenance for Vulnerability Detection. [PDF][PPT]
Yuede Ji, Lei Cui, and H. Howie Huang
[ACNS’21], The 19th International Conference on Applied Cryptography and Network Security
Acceptance rate: 37/186 = 20%Discovering Unknown Advanced Persistent Threat Using Shared Features Mined by Neural Networks.
Longkang Shang, Dong Guo, Yuede Ji, and Qiang Li.
[Computer Networks], 2021.
2020 and Earlier
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI. [PDF]
Benjamin Bowman, Craig Laprade, Yuede Ji, and H. Howie Huang
[RAID’20], The 23rd International Symposium on Research in Attacks, Intrusions and Defenses
Acceptance rate: 31/121 = 25.6%Aquila: Adaptive Parallel Computation of Graph Connectivity Queries. [PDF][PPT][Video][Code]
Yuede Ji and H. Howie Huang
[HPDC’20], The 29th International Symposium on High-Performance Parallel and Distributed Computing
Acceptance rate: 16/71 = 22%SwarmGraph: Analyzing Large-Scale In-Memory Graphs on GPUs. [PDF]
Yuede Ji, Hang Liu, and H. Howie Huang.
[HPCC’20], IEEE International Conference on High Performance Computing and Communications (HPCC), 2020.GRL: Knowledge Graph Completion with GAN-based Reinforcement Learning.
Qi Wang, Yuede Ji, Yongsheng Hao, and Jie Cao.
[KBS], Knowledge-Based Systems, 2020.Securing Malware Cognitive Systems against Adversarial Attacks. [PDF][PPT]
Yuede Ji, Benjamin Bowman, and H. Howie Huang,
[ICCC’19], 2019 IEEE International Conference on Cognitive Computing,
Invited to the panel discussion at The AAAI-19 Workshop on Artificial Intelligence for Cyber SecurityStopping the Cyber Attack in the Early Stage: Assessing the Security Risks of Social Network Users. [PDF]
Bo Feng, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng.
[SCN], Security and Communication Networks, 2019.Understanding and Detecting Social Botnet.
Yuede Ji, and Qiang Li
Botnets: Architectures, Countermeasures, and Challenges, 2019.iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. [PDF][PPT][Code]
Yuede Ji, Hang Liu, and H. Howie Huang,
[SC’18], Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis
Acceptance rate (first round): 55/288 = 19%Understanding socialbot behavior on end hosts. [PDF]
Yukun He, Qiang Li, Jian Cao, Yuede Ji, and Dong Guo,
[IJDSN], International Journal of Distributed Sensor Networks, 2017.Detection of Forwarding-based Malicious URLs in Online Social Networks. [PDF]
Jian Cao, Qiang Li, Yuede Ji, Yukun He, and Dong Guo.
[NPC’14], IFIP International Conference on Network and Parallel Computing,
Invited to journal publication, International Journal of Parallel Programming, 44(1), 163-180, 2016.
Best Paper AwardCombating the evasion mechanisms of social bots. [PDF]
Yuede Ji, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li
[Computers & Security], Volume 58, Pages 230-249, 2016.BotCatch: leveraging signature and behavior for bot detection. [PDF]
Yuede Ji, Qiang Li, Yukun He, and Dong Guo.
[SCN], Security and Communication Networks, 8(6): 952-969, 2015.Overhead Analysis and Evaluation of Approaches to Host-based Bot Detection. [PDF]
Yuede Ji, Qiang Li, Yukun He, and Dong Guo.
[IJDSN], International Journal of Distributed Sensor Networks, 2015.Towards Social Botnet Behavior Detecting in the End Host. [PDF] [PPT]
Yuede Ji, Yukun He, Xinyang Jiang, and Qiang Li.
[ICPADS’14], 20th IEEE International Conference on Parallel and Distributed System, 2014A Multiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. [PDF] [PPT]
Yuede Ji, Yukun He, Dewei Zhu, Qiang Li, and Dong Guo.
[ISPEC’14], Information Security Practice and Experience, 2014BotCatch: A Behavior and Signature Correlated Bot Detection Approach. [PDF] [PPT]
Yuede Ji, Yukun He, Qiang Li, and Dong Guo.
[HPCC’13], IEEE International Conference on High Performance Computing and Communications, 2013.BotInfer: A Bot Inference Approach by Correlating Host and Network Information. [PDF]
Yukun He, Qiang Li, Yuede Ji, and Dong Guo.
[NPC’13], IFIP International Conference on Network and Parallel Computing, 2013Slides for DP [PPTX]