Qiu, C., Yadav, S., Ji, Y., Squicciarini, ., Dantu, R., Zhao, J., Xu, C. Fine-Grained Geo-Obfuscation to Protect Workers’ Location Privacy in Large-Scale Time-Sensitive Spatial Crowdsourcing. 27th International Conference on Extending Database Technology (EDBT) 2024.
Feng, W., Chen, S., Liu, H., Ji, Y. (2023). PeeK: A Prune-Centric Approach for Shortest Path Computation. Denver, CO: International Conference for High Performance Computing, Networking, Storage, and Analysis (SC).
Chen, S., Zheng, D., Ding, C., Huan, C., Ji, Y., Liu, H. (2023). TANGO: re-thinking quantization for graph neural network training. International Conference for High Performance Computing, Networking, Storage, and Analysis (SC).
Caldwell, J., Feng, W., Byun, M., Albert, M. V., Shu, T., Ji, Y. (2023). Exploring Power and Thermal Dynamics in the Summit Supercomputer: A Data Visualization Study. 7th Annual Smoky Mountains Computational Sciences Data Challenge (SMCDC).
Haleem, Y., Wagenvoord, I., Wei, Q., Xiao, T., Shu, T., Ji, Y. (2023). Understanding Nationwide Power Outage and Restoration for Future Prediction. 7th Annual Smoky Mountains Computational Sciences Data Challenge (SMCDC).
Cui, L., Cui, J., Ji, Y., Hao, Z., Li, L., Ding, Z. (2023). API2vec: Learning Representations of API Sequences for Malware Detection. ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'23).
Fu, Q., Ji, Y., Huang, H. (2022). TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on GPU. ACM International Symposium on High-Performance Parallel and Distributed Computing (HPDC). https://dl.acm.org/doi/abs/10.1145/3502181.3531467
He, H., Ji, Y., Huang, H. (2022). Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis. IEEE European Symposium on Security and Privacy. https://ieeexplore.ieee.org/document/9797387
Ji, Y., Huang, H. NestedGNN: Detecting Malicious Network Activity with Nested Graph Neural Networks. IEEE.
Ji, Y., Elsabagh, M., Johnson, R., Stavrou, A. (2021). DEFInit: An Analysis of Exposed Android Init Routines. USENIX Security.
Ji, Y., Cui, L., Huang, H. (2021). Vestige: Identifying Binary Code Provenance for Vulnerability Detection. The 19th International Conference on Applied Cryptography and Network Security (ACNS).
Ji, Y., Cui, L., H. (2021). BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network. The ACM Asia Conference on Computer and Communications Security (AsiaCCS).
Ji, Y., Liu, H., Hu, Y., Huang, H. iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees. ACM.
Shang, L., Guo,, Ji, Y., Li, Q. (2021). Discovering Unknown Advanced Persistent Threat Using Shared Features Mined by Neural Networks. Computer Networks.
Wang, L., Malladi, A., Ji, Y. Efficient Sparse Deep Neural Network Computation on GPU. ACM/IEEE International Conference for High Performance Computing, Networking, Storage, and Analysis (SC).