Jiaojiao Jiang
Latest
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- VAlign-GLAR: Graph Retrieval-Based Vulnerability Intelligence Alignment via Structured LLM-Guided Inference
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- Vulnerability Aspects Extraction and Discrepancies Detection across Heterogeneous Threat Intelligence
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
- Unifying View-Specific Learning and Ambiguity Awareness With Emotions for Multimodal Misinformation Detection
- Unifying View-Specific Learning and Ambiguity Awareness With Emotions for Multimodal Misinformation Detection
- DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection
- DiHAN: A Novel Dynamic Hierarchical Graph Attention Network for Fake News Detection
- LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks
- LayerPlexRank: Exploring Node Centrality and Layer Influence through Algebraic Connectivity in Multiplex Networks
- Partial label learning via identifying outlier features
- Partial label learning via identifying outlier features
- MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction
- MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction
- Exploring Uncharted Waters of Website Fingerprinting
- Exploring Uncharted Waters of Website Fingerprinting
- Influence Robustness of Nodes in Multiplex Networks Against Attacks
- Influence Robustness of Nodes in Multiplex Networks Against Attacks
- Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis
- Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis
- Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
- Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
- Robust cross-network node classification via constrained graph mutual information
- Robust cross-network node classification via constrained graph mutual information
- Network Growth From Global and Local Influential Nodes
- Network Growth From Global and Local Influential Nodes
- R-gram: Inferring message formats of service protocols with relative positional n-grams
- R-gram: Inferring message formats of service protocols with relative positional n-grams
- P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages
- P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages