Ren, Z., Liu, C., Xiao, X., Jiang, N., & Xie, T.(2019).Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing.International Conference on Automated Software Engineering (ASE).
Zhu, X., Ayday, E., & Vitenberg, R.(2019).A privacy-preserving framework for outsourcing location-based services to the cloud.IEEE Transactions on Dependable and Secure Computing.
Zhou, M., Wang, Y., Srivastava, A., Wu, Y., & Banerjee, P.(2019).Ensemble-Based Algorithm for Synchrophasor Data Anomaly Detection.IEEE TRANSACTIONS ON SMART GRID,10(3),2979-2988.
Li, D., Li, Q., Ye, F., & Xu, S.(2019).Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and Application to AICS’2019 Challenge.The AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS).
Ma, H., Alipourlangouri, M., Wu, Y., Chiang, F., & Pi, J.(2019).Ontology-based Entity Matching in Attributed Graphs.PROCEEDINGS OF THE VLDB ENDOWMENT,12(10),1195-1207.
Chen, H., & Li, J.(2019).Modeling Relational Drug-Target-Disease Interactions via Tensor Factorization with Multiple Web Sources.World Wide Web Conference - WWW.
Zhang, Y., Fan, Y., Ye, F., Zhao, L., & Shi, C.(2019).Key Player Identification in Underground Forums over Attributed Heterogeneous Information Network Embedding Framework.ACM Press.
Zhang, Y., Fan, Y., Song, W., Hou, S., Ye, F., Liu, X., Zhao, L., Shi, C., Wang, J., & Xiong, Q.(2019).Your Style Your Identity: Leveraging Writing and Photography Styles for Drug Trafficker Identification in Darknet Markets over Attributed Heterogeneous Information Network.ASSOC COMPUTING MACHINERY.
Gao, P., Xiao, X., Li, Z., Jee, K., Xu, F., Kulkarni, S., & Mittal, P.(2019).A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.International Conference on Very Large Data Bases (VLDB), Demo,12(12),1802--1805.
Zhang, X., Xiao, X., He, K., Maki, Y., Huang, Y., Liu, X., Xu, W., & Liu, C.(2019).PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing.In Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
Ahmed, A., Krishnan, Vignesh V. G., A., Foroutan, S., Touhiduzzaman, M., Rublein, C., Srivastava, A., Wu, Y., Hahn, A., & Suresh, S.(2019).Cyber Physical Security Analytics for Anomalies in Transmission Protection Systems.IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS,55(6),6313-6323.
Li, Q., Alipour-Fanid, A., Slawski, M., Ye, F., Wu, L., Zeng, K., & Zhao, L.(2019).Large-scale Cost-aware Classification Using Feature Computational Dependency Graph.IEEE Transactions on Knowledge and Data Engineering.