Using customer-related data to enhance e-grocery home delivery S Pan, V Giannikas, Y Han, E Grover-Silva, B Qiao Industrial Management & Data Systems 117 (9), 1917-1933, 2017 | 183 | 2017 |
Riskteller: Predicting the risk of cyber incidents L Bilge, Y Han, M Dell'Amico Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 99 | 2017 |
Analysis of large-scale traffic dynamics in an urban transportation network using non-negative tensor factorization Y Han, F Moutarde International Journal of Intelligent Transportation Systems Research 14, 36-49, 2016 | 83 | 2016 |
Embedded palmprint recognition system on mobile devices Y Han, T Tan, Z Sun, Y Hao Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 58 | 2007 |
Accurate spear phishing campaign attribution and early detection YF Han, Y Shen Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016 | 54 | 2016 |
Palmprint recognition under unconstrained scenes Y Han, Z Sun, F Wang, T Tan Computer Vision–ACCV 2007: 8th Asian Conference on Computer Vision, Tokyo …, 2007 | 54 | 2007 |
Model Stealing Attacks Against Inductive Graph Neural Networks YZ Yun Shen, Xinlei He, Yufei Han The 43rd IEEE Symposium on Security and Privacy, https://arxiv.org/abs/2112 …, 2021 | 52* | 2021 |
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes A Küchler, A Mantovani, Y Han, L Bilge, D Balzarotti Network and Distributed Systems Security Symposium, https://www.ndss …, 2021 | 50 | 2021 |
On the impact of socio-economic factors on power load forecasting Y Han, X Sha, E Grover-Silva, P Michiardi 2014 IEEE International Conference on Big Data (Big Data), 742-747, 2014 | 35 | 2014 |
Learning gabor magnitude features for palmprint recognition R Chu, Z Lei, Y Han, R He, SZ Li Asian Conference on Computer Vision, 22-31, 2007 | 35 | 2007 |
Large scale estimation of arterial traffic and structural analysis of traffic patterns using probe vehicles A Hofleitner, R Herring, A Bayen, Y Han, F Moutarde, A de La Fortelle Transportation Research Board 91st Annual Meeting (TRB'2012), 2012 | 34 | 2012 |
Fusion of face and palmprint for personal identification based on ordinal features R Chu, S Liao, Y Han, Z Sun, SZ Li, T Tan 2007 IEEE Conference on Computer Vision and Pattern Recognition, 1-2, 2007 | 34 | 2007 |
Explainable artificial intelligence for cybersecurity: a literature survey TTZZ Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre ... Annals of Telecommunications, 2022 | 33 | 2022 |
Analysis of network-level traffic states using locality preservative non-negative matrix factorization Y Han, F Moutarde 2011 14th international IEEE conference on Intelligent Transportation …, 2011 | 33 | 2011 |
Marmite: spreading malicious file reputation through download graphs G Stringhini, Y Shen, Y Han, X Zhang Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017 | 32 | 2017 |
Accurate real-time identification of malicious BGP hijacks PAV Yun Shen, Yufei Han US Patent 10,148,690, 2018 | 29 | 2018 |
Robust federated learning via collaborative machine teaching Y Han, X Zhang Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4075-4082, 2020 | 28 | 2020 |
Mini-batch spectral clustering Y Han, M Filippone 2017 International Joint Conference on Neural Networks (IJCNN), 3888-3895, 2017 | 27 | 2017 |
Systems and methods for detecting security events HAN Yufei, Y Shen US Patent 9,628,506, 2017 | 26 | 2017 |
Palmprint recognition based on directional features and graph matching Y Han, T Tan, Z Sun Advances in Biometrics: International Conference, ICB 2007, Seoul, Korea …, 2007 | 26 | 2007 |