Login / Signup
Yuede Ji
ORCID
Publication Activity (10 Years)
Years Active: 2013-2024
Publications (10 Years): 31
Top Topics
Strongly Connected Components
Graph Connectivity
Malware Detection
Neural Network
Top Venues
CoRR
SC
Secur. Commun. Networks
USENIX Security Symposium
</>
Publications
</>
Haojie He
,
Xingwei Lin
,
Ziang Weng
,
Ruijie Zhao
,
Shuitao Gan
,
Libo Chen
,
Yuede Ji
,
Jiashui Wang
,
Zhi Xue
Code is not Natural Language: Unlock the Power of Semantics-Oriented Graph Representation for Binary Code Similarity Detection.
USENIX Security Symposium
(2024)
Qiang Fu
,
Yuede Ji
,
Thomas B. Rolinger
,
H. Howie Huang
TLPGNN: A Lightweight Two-level Parallelism Paradigm for Graph Neural Network Computation on Single and Multiple GPUs.
ACM Trans. Parallel Comput.
11 (2) (2024)
Lei Cui
,
Junnan Yin
,
Jiancong Cui
,
Yuede Ji
,
Peng Liu
,
Zhiyu Hao
,
Xiaochun Yun
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng.
50 (8) (2024)
Chenxi Qiu
,
Sourabh Yadav
,
Yuede Ji
,
Anna Cinzia Squicciarini
,
Ram Dantu
,
Juanjuan Zhao
,
Cheng-Zhong Xu
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
EDBT
(2024)
Chenfei Nie
,
Qiang Li
,
Yuxin Yang
,
Yuede Ji
,
Binghui Wang
Efficient Byzantine-Robust and Provably Privacy-Preserving Federated Learning.
CoRR
(2024)
Lei Cui
,
Jiancong Cui
,
Yuede Ji
,
Zhiyu Hao
,
Lun Li
,
Zhenquan Ding
API2Vec: Learning Representations of API Sequences for Malware Detection.
ISSTA
(2023)
Haoyu He
,
Yuede Ji
,
H. Howie Huang
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis.
CoRR
(2023)
Shiyang Chen
,
Da Zheng
,
Caiwen Ding
,
Chengying Huan
,
Yuede Ji
,
Hang Liu
TANGO: re-thinking quantization for graph neural network training on GPUs.
SC
(2023)
Shiyang Chen
,
Da Zheng
,
Caiwen Ding
,
Chengying Huan
,
Yuede Ji
,
Hang Liu
Tango: rethinking quantization for graph neural network training on GPUs.
CoRR
(2023)
Wang Feng
,
Shiyang Chen
,
Hang Liu
,
Yuede Ji
PeeK: A Prune-Centric Approach for K Shortest Path Computation.
SC
(2023)
Chenxu Jiang
,
Chenglong Fu
,
Zhenyu Zhao
,
Xiaojiang Du
,
Yuede Ji
Effective Anomaly Detection in Smart Home by Integrating Event Time Intervals.
CoRR
(2022)
Yuede Ji
,
H. Howie Huang
NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks.
ICC
(2022)
Haoyu He
,
Yuede Ji
,
H. Howie Huang
Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis.
EuroS&P
(2022)
Yuede Ji
,
Hang Liu
,
Yang Hu
,
H. Howie Huang
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees.
ACM Trans. Parallel Comput.
9 (3) (2022)
Qiang Fu
,
Yuede Ji
,
H. Howie Huang
TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on GPU.
HPDC
(2022)
Yuede Ji
,
Lei Cui
,
H. Howie Huang
Vestige: Identifying Binary Code Provenance for Vulnerability Detection.
ACNS (2)
(2021)
Yuede Ji
,
Mohamed Elsabagh
,
Ryan Johnson
,
Angelos Stavrou
DEFInit: An Analysis of Exposed Android Init Routines.
USENIX Security Symposium
(2021)
Longkang Shang
,
Dong Guo
,
Yuede Ji
,
Qiang Li
Discovering unknown advanced persistent threat using shared features mined by neural networks.
Comput. Networks
189 (2021)
Yuede Ji
,
Lei Cui
,
H. Howie Huang
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network.
AsiaCCS
(2021)
Qi Wang
,
Yuede Ji
,
Yongsheng Hao
,
Jie Cao
GRL: Knowledge graph completion with GAN-based reinforcement learning.
Knowl. Based Syst.
209 (2020)
Benjamin Bowman
,
Craig Laprade
,
Yuede Ji
,
H. Howie Huang
Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised Graph AI.
RAID
(2020)
Yuede Ji
,
H. Howie Huang
Aquila: Adaptive Parallel Computation of Graph Connectivity Queries.
HPDC
(2020)
Yuede Ji
,
Hang Liu
,
H. Howie Huang
SWARMGRAPH: Analyzing Large-Scale In-Memory Graphs on GPUs.
HPCC/DSS/SmartCity
(2020)
Bo Feng
,
Qiang Li
,
Yuede Ji
,
Dong Guo
,
Xiangyu Meng
Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users.
Secur. Commun. Networks
2019 (2019)
Yuede Ji
,
Benjamin Bowman
,
H. Howie Huang
Securing Malware Cognitive Systems against Adversarial Attacks.
ICCC
(2019)
Yuede Ji
,
Hang Liu
,
H. Howie Huang
iSpan: parallel identification of strongly connected components with spanning trees.
SC
(2018)
Yukun He
,
Qiang Li
,
Jian Cao
,
Yuede Ji
,
Dong Guo
Understanding socialbot behavior on end hosts.
Int. J. Distributed Sens. Networks
13 (2) (2017)
Yuede Ji
,
Yukun He
,
Xinyang Jiang
,
Jian Cao
,
Qiang Li
Combating the evasion mechanisms of social bots.
Comput. Secur.
58 (2016)
Jian Cao
,
Qiang Li
,
Yuede Ji
,
Yukun He
,
Dong Guo
Detection of Forwarding-Based Malicious URLs in Online Social Networks.
Int. J. Parallel Program.
44 (1) (2016)
Yuede Ji
,
Qiang Li
,
Yukun He
,
Dong Guo
Overhead Analysis and Evaluation of Approaches to Host-Based Bot Detection.
Int. J. Distributed Sens. Networks
11 (2015)
Yuede Ji
,
Qiang Li
,
Yukun He
,
Dong Guo
BotCatch: leveraging signature and behavior for bot detection.
Secur. Commun. Networks
8 (6) (2015)
Yuede Ji
,
Yukun He
,
Xinyang Jiang
,
Qiang Li
Towards social botnet behavior detecting in the end host.
ICPADS
(2014)
Yuede Ji
,
Yukun He
,
Dewei Zhu
,
Qiang Li
,
Dong Guo
A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches.
ISPEC
(2014)
Yuede Ji
,
Yukun He
,
Qiang Li
,
Dong Guo
BotCatch: A Behavior and Signature Correlated Bot Detection Approach.
HPCC/EUC
(2013)
Yukun He
,
Qiang Li
,
Yuede Ji
,
Dong Guo
BotInfer: A Bot Inference Approach by Correlating Host and Network Information.
NPC
(2013)