


default search action
Yu Wen 0001
Person information
- affiliation: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Yu Wen — disambiguation page
- Yu Wen 0002 — Nanjing Agricultural University, Nanjing, China
- Yu Wen 0003 — University of Houston, Houston, TX, USA
- Yu Wen 0004
— Chongqing University, Chongqing, China
- Yu Wen 0005 — Southwest Jiaotong University, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Zhaoyang Wang, Yanfei Hu, Yu Wen, Boyang Zhang, Shuailou Li, Wenbo Wang, Zheng Liu, Dan Meng:
FineGCP: Fine-grained dependency graph community partitioning for attack investigation. Comput. Secur. 151: 104311 (2025) - 2024
- [j5]Yanfei Hu, Shuai Li, Wenchao Xue, Yanlong Zhao, Yu Wen:
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition. Comput. Secur. 143: 103884 (2024) - [c27]Chun Yang, Gang Shi, Yu Wen, Xinqiang Zhao:
ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models. CSCWD 2024: 2339-2344 - [c26]Wenbo Wang, Tao Xue, Shuailou Li, Zhaoyang Wang, Boyang Zhang, Yu Wen:
Interpretable Risk-aware Access Control for Spark: Blocking Attack Purpose Behind Actions. ICCD 2024: 122-129 - [c25]Baoming Chang, Zhaoyang Wang, Shuai Li, Fengxi Zhou, Yu Wen, Boyang Zhang:
TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer. IJCNN 2024: 1-10 - [c24]Shuailou Li, Yu Wen, Zhaoyang Wang, Wenbo Wang, Lisong Zhang, Dan Meng:
StreamDP: Continual Observation of Real-world Data Streams with Differential Privacy. IPCCC 2024: 1-10 - 2023
- [j4]Tao Xue
, Yu Wen
, Bo Luo
, Gang Li
, Yingjiu Li
, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [c23]Baoming Chang, Fengxi Zhou, Zhaoyang Wang, Yu Wen, Boyang Zhang:
A Distributed Storage System for System Logs Based on Hybrid Compression Scheme. ISPA/BDCloud/SocialCom/SustainCom 2023: 724-735 - [c22]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture. ICPADS 2023: 340-347 - [c21]Yanfei Hu, Shuai Li, Shuailou Li, Boyang Zhang, Yu Wen:
DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition. ISCC 2023: 1-7 - [c20]Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen:
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method. ISCC 2023: 1020-1026 - [c19]Shuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng:
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark. SRDS 2023: 93-106 - [c18]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. TrustCom 2023: 1-9 - 2022
- [c17]Yanfei Hu, Shuangshuang Liang, Min Li, Tao Xue, Boyang Zhang, Yu Wen:
CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition. HPCC/DSS/SmartCity/DependSys 2022: 586-594 - [c16]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao
, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c15]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [c14]Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu:
A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. TrustCom 2022: 759-768 - 2021
- [j3]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [c13]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c12]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c11]Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, Yu Wen:
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention. ICICS (1) 2021: 243-259 - [c10]Yanna Wu, Fucheng Liu, Yu Wen:
Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism. IFIP Int. Conf. Digital Forensics 2021: 157-173 - [c9]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - 2020
- [j2]Dan Meng, Rui Hou
, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c8]Tao Xue, Yu Wen, Bo Luo
, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li
, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c7]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c6]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687
2010 – 2019
- 2019
- [c5]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - 2018
- [c4]Xingwang Xiong, Lei Wang, Wanling Gao, Rui Ren, Ke Liu, Chen Zheng, Yu Wen, Yi Liang:
DCMIX: Generating Mixed Workloads for the Cloud Data Center. Bench 2018: 105-117 - 2017
- [c3]Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. IPCCC 2017: 1-9 - 2014
- [j1]Yu Wen, Weiping Wang, Li Guo, Dan Meng:
Automated Power Control for Virtualized Infrastructures. J. Comput. Sci. Technol. 29(6): 1111-1122 (2014)
2000 – 2009
- 2007
- [c2]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c1]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-08 01:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint