Yun Shen
Yun Shen
Norton Research Group
Verified email at
Cited by
Cited by
A privacy manager for cloud computing
S Pearson, Y Shen, M Mowbray
IEEE International Conference on Cloud Computing, 90-106, 2009
Enhancing privacy in cloud computing via policy-based obfuscation
M Mowbray, S Pearson, Y Shen
The Journal of Supercomputing 61 (2), 267-291, 2012
Tiresias: Predicting security events through deep learning
Y Shen, E Mariconti, PA Vervier, G Stringhini
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Data protection-aware design for cloud services
S Creese, P Hopkins, S Pearson, Y Shen
IEEE International Conference on Cloud Computing, 119-130, 2009
Privacy enhancing technologies: A review
Y Shen, S Pearson
Hewlet Packard Development Company. Disponible en https://bit. ly/3cfpAKz, 2011
Context-aware privacy design pattern selection
S Pearson, Y Shen
International Conference on Trust, Privacy and Security in Digital Business …, 2010
Accurate spear phishing campaign attribution and early detection
YF Han, Y Shen
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2079-2086, 2016
Clustering schemaless xml documents
Y Shen, B Wang
On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE …, 2003
Before toasters rise up: A view into the emerging iot threat landscape
PA Vervier, Y Shen
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
Incremental evolution of fuzzy grammar fragments to enhance instance matching and text mining
T Martin, Y Shen, B Azvine
IEEE Transactions on Fuzzy Systems 16 (6), 1425-1438, 2008
Marmite: spreading malicious file reputation through download graphs
G Stringhini, Y Shen, Y Han, X Zhang
Proceedings of the 33rd Annual Computer Security Applications Conference, 91-102, 2017
Discovery of time‐varying relations using fuzzy formal concept analysis and associations
T Martin, Y Shen, A Majidian
International Journal of Intelligent Systems 25 (12), 1217-1248, 2010
On the management of consent and revocation in enterprises: setting the context
MC Mont, S Pearson, G Kounga, Y Shen, P Bramhall
HP Laboratories, Technical Report HPL-2009-49 11, 2009
Attack2vec: Leveraging temporal word embeddings to understand the evolution of cyberattacks
Y Shen, G Stringhini
28th {USENIX} Security Symposium ({USENIX} Security 19), 905-921, 2019
The tangled genealogy of IoT malware
E Cozzi, PA Vervier, M Dell'Amico, Y Shen, L Bilge, D Balzarotti
Annual Computer Security Applications Conference, 1-16, 2020
Mini-batch spectral clustering
Y Han, M Filippone
2017 International Joint Conference on Neural Networks (IJCNN), 3888-3895, 2017
Systems and methods for detecting security events
HAN Yufei, Y Shen
US Patent 9,628,506, 2017
Fuzzy association rules to summarise multiple taxonomies in large databases
T Martin, Y Shen
Scalable fuzzy algorithms for data management and analysis: Methods and …, 2010
Systems and methods for detecting anomalous messages in automobile networks
N Evans, A Benameur, Y Shen
US Patent 9,843,594, 2017
Study of collective user behaviour in Twitter: a fuzzy approach
X Fu, Y Shen
Neural Computing and Applications 25 (7), 1603-1614, 2014
The system can't perform the operation now. Try again later.
Articles 1–20