Follow
Yiwei Hou
Title
Cited by
Cited by
Year
Limits of I/O Based Ransomware Detection: An Imitation Based Attack
C Zhou, L Guo, Y Hou, Z Ma, Q Zhang, M Wang, Z Liu, Y Jiang
2023 IEEE Symposium on Security and Privacy (SP), 2584-2601, 2023
62023
Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic features
Y Hou, H Wang, H Wang
Information Processing & Management 59 (5), 103033, 2022
52022
A novel framework of identifying Chinese jargons for telegram underground markets
H Wang, Y Hou, H Wang
The 30th International Conference on Computer Communications and Networks …, 2021
52021
MIDAS: Safeguarding IoT Devices Against Malware via Real-Time Behavior Auditing
Y Xu, Z Yin, Y Hou, J Liu, Y Jiang
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2022
32022
An Empirical Study of Data Disruption by Ransomware Attacks
Y Hou, L Guo, C Zhou, Y Xu, Z Yin, S Li, C Sun, Y Jiang
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE'24), 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–5