Follow
Han Yufei
Title
Cited by
Cited by
Year
Using customer-related data to enhance e-grocery home delivery
S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao
Industrial Management & Data Systems 117 (9), 1917-1933, 2017
1812017
Riskteller: Predicting the risk of cyber incidents
L Bilge, Y Han, M Dell'Amico
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
962017
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization
Y Han, F Moutarde
International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016
832016
Embedded palmprint recognition system on mobile devices
Y Han, T Tan, Z Sun, Y Hao
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
582007
Palmprint recognition under unconstrained scenes
Y Han, Z Sun, F Wang, T Tan
Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007
542007
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
512016
Model Stealing Attacks Against Inductive Graph Neural Networks
YZ Yun Shen, Xinlei He, Yufei Han
The 43rd IEEE Symposium on Security and Privacy, https://arxiv.org/abs/2112 …, 2021
50*2021
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti
Network and Distributed Systems Security Symposium, https://www.ndss …, 2021
472021
Learning gabor magnitude features for palmprint recognition
R Chu, Z Lei, Y Han, R He, SZ Li
Asian Conference on Computer Vision, 22-31, 2007
352007
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles
A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle
Transportation Research Board 91st Annual Meeting (TRB'2012), 2012
342012
Fusion of face and palmprint for personal identification based on ordinal features
R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan
2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007
342007
On the impact of socio-economic factors on power load forecasting
Y Han, X Sha, E Grover-Silva, P Michiardi
2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014
332014
Analysis of network-level traffic states using locality preservative non-negative matrix factorization
Y Han, F Moutarde
2011 14th international IEEE conference on Intelligent Transportation …, 2011
332011
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
312017
Explainable artificial intelligence for cybersecurity: a literature survey
TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ...
Annals of Telecommunications, 2022
282022
Accurate real-time identification of malicious BGP hijacks
PAV Yun Shen, Yufei Han
US Patent 10,148,690, 2018
282018
Robust federated learning via collaborative machine teaching
Y Han, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020
272020
Mini-batch spectral clustering
Y Han, M Filippone
2017 International Joint Conference on Neural Networks (IJCNN), 3888-3895, 2017
262017
Systems and methods for detecting security events
HAN Yufei, Y Shen
US Patent 9,628,506, 2017
262017
Palmprint recognition based on directional features and graph matching
Y Han, T Tan, Z Sun
Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007
262007
The system can't perform the operation now. Try again later.
Articles 1–20