Follow
Han Yufei
Title
Cited by
Cited by
Year
Using customer-related data to enhance e-grocery home delivery
S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao
Industrial Management & Data Systems 117 (9), 1917-1933, 2017
1912017
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1062017
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization
Y Han, F Moutarde
International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016
862016
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti
Network and Distributed Systems Security Symposium, https://www.ndss …, 2021
602021
Model Stealing Attacks Against Inductive Graph Neural Networks
YZ Yun Shen, Xinlei He, Yufei Han
The 43rd IEEE Symposium on Security and Privacy, https://arxiv.org/abs/2112 …, 2021
60*2021
Embedded palmprint recognition system on mobile devices
Y Han, T Tan, Z Sun, Y Hao
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
572007
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
562016
Palmprint recognition under unconstrained scenes
Y Han, Z Sun, F Wang, T Tan
Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007
552007
Explainable artificial intelligence for cybersecurity: a literature survey
TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ...
Annals of Telecommunications, 2022
462022
On the impact of socio-economic factors on power load forecasting
Y Han, X Sha, E Grover-Silva, P Michiardi
2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014
362014
Learning gabor magnitude features for palmprint recognition
R Chu, Z Lei, Y Han, R He, SZ Li
Asian Conference on Computer Vision, 22-31, 2007
352007
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles
A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle
Transportation Research Board 91st Annual Meeting (TRB'2012), 2012
342012
Analysis of network-level traffic states using locality preservative non-negative matrix factorization
Y Han, F Moutarde
2011 14th international IEEE conference on Intelligent Transportation …, 2011
342011
Fusion of face and palmprint for personal identification based on ordinal features
R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan
2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007
342007
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
322017
Accurate real-time identification of malicious BGP hijacks
PAV Yun Shen, Yufei Han
US Patent 10,148,690, 2018
312018
Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning
X Lyu, Y Han, W Wang, J Liu, B Wang, J Liu, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (7), 9020-9028, 2023
302023
Robust federated learning via collaborative machine teaching
Y Han, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020
302020
Systems and methods for evaluating infection risks based on profiled user behaviors
HAN Yufei, L Yumer, PA Vervier, M Dell'Amico
US Patent 10,116,680, 2018
282018
Mini-batch spectral clustering
Y Han, M Filippone
2017 International Joint Conference on Neural Networks (IJCNN), 3888-3895, 2017
272017
The system can't perform the operation now. Try again later.
Articles 1–20