Han Yufei
Cited by
Cited by
Using customer-related data to enhance e-grocery home delivery
S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao
Industrial Management & Data Systems 117 (9), 1917-1933, 2017
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization
Y Han, F Moutarde
International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti
Network and Distributed Systems Security Symposium, https://www.ndss …, 2021
Model Stealing Attacks Against Inductive Graph Neural Networks
YZ Yun Shen, Xinlei He, Yufei Han
The 43rd IEEE Symposium on Security and Privacy, …, 2021
Embedded palmprint recognition system on mobile devices
Y Han, T Tan, Z Sun, Y Hao
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
Palmprint recognition under unconstrained scenes
Y Han, Z Sun, F Wang, T Tan
Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007
Explainable artificial intelligence for cybersecurity: a literature survey
TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ...
Annals of Telecommunications, 2022
On the impact of socio-economic factors on power load forecasting
Y Han, X Sha, E Grover-Silva, P Michiardi
2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014
Learning gabor magnitude features for palmprint recognition
R Chu, Z Lei, Y Han, R He, SZ Li
Asian Conference on Computer Vision, 22-31, 2007
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles
A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle
Transportation Research Board 91st Annual Meeting (TRB'2012), 2012
Analysis of network-level traffic states using locality preservative non-negative matrix factorization
Y Han, F Moutarde
2011 14th international IEEE conference on Intelligent Transportation …, 2011
Fusion of face and palmprint for personal identification based on ordinal features
R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan
2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
Accurate real-time identification of malicious BGP hijacks
PAV Yun Shen, Yufei Han
US Patent 10,148,690, 2018
Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning
X Lyu, Y Han, W Wang, J Liu, B Wang, J Liu, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (7), 9020-9028, 2023
Robust federated learning via collaborative machine teaching
Y Han, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020
Systems and methods for evaluating infection risks based on profiled user behaviors
HAN Yufei, L Yumer, PA Vervier, M Dell'Amico
US Patent 10,116,680, 2018
Mini-batch spectral clustering
Y Han, M Filippone
2017 International Joint Conference on Neural Networks (IJCNN), 3888-3895, 2017
The system can't perform the operation now. Try again later.
Articles 1–20