Limits of I/O Based Ransomware Detection: An Imitation Based Attack C Zhou, L Guo, Y Hou, Z Ma, Q Zhang, M Wang, Z Liu, Y Jiang 2023 IEEE Symposium on Security and Privacy (SP), 2584-2601, 2023 | 6 | 2023 |
Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic features Y Hou, H Wang, H Wang Information Processing & Management 59 (5), 103033, 2022 | 5 | 2022 |
A novel framework of identifying Chinese jargons for telegram underground markets H Wang, Y Hou, H Wang The 30th International Conference on Computer Communications and Networks …, 2021 | 5 | 2021 |
MIDAS: Safeguarding IoT Devices Against Malware via Real-Time Behavior Auditing Y Xu, Z Yin, Y Hou, J Liu, Y Jiang IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022 | 3 | 2022 |
An Empirical Study of Data Disruption by Ransomware Attacks Y Hou, L Guo, C Zhou, Y Xu, Z Yin, S Li, C Sun, Y Jiang 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE'24), 2024 | | 2024 |