Seguir
Yingfei Dong
Yingfei Dong
Professor of Computer Engineering, University of Hawaii
Dirección de correo verificada de hawaii.edu
Título
Citado por
Citado por
Año
Detecting spam zombies by monitoring outgoing messages
Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker
IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011
1262011
Video streaming having controlled quality assurance over best-effort networks
ZL Zhang, Y Dong
US Patent App. 10/421,657, 2004
1032004
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1012010
Server-based network performance metrics generation system and method
YT Hou, Y Dong, T Taniguchi
US Patent 6,901,051, 2005
632005
DMTP: Controlling spam through message delivery differentiation
Z Duan, Y Dong, K Gopalan
Computer Networks 51 (10), 2616-2630, 2007
452007
A traceback attack on freenet
G Tian, Z Duan, T Baumeister, Y Dong
IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015
432015
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
432013
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Z Duan, K Gopalan, Y Dong
SRUTI 5, 25-30, 2005
432005
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
382017
Loopback: Exploiting collaborative caches for large-scale streaming
E Kusmierek, Y Dong, DHC Du
IEEE Transactions on Multimedia 8 (2), 233-242, 2006
352006
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
332014
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
242012
Blocking spam by separating end-user machines from legitimate mail server machines
F Sanchez, Z Duan, Y Dong
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
242011
A novel comprehensive network security assessment approach
C Wang, Y Wang, Y Dong, T Zhang
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
242011
Understanding forgery properties of spam delivery paths
F Sanchez, Z Duan, Y Dong
Proc. of 7th CEAS, 2010
232010
A differentiated message delivery architecture to control spam
Z Duan, Y Dong, K Gopalan
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
222005
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations
Y Dong, X Du, X Zhang
Computer Communications 21 (5), 470-484, 1998
211998
A routing table insertion (RTI) attack on Freenet
T Baumeister, Y Dong, Z Duan, G Tian
2012 International Conference on Cyber Security, 8-15, 2012
192012
Manipulating drone position control
W Chen, Y Dong, Z Duan
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
182019
Leakage models and inference attacks on searchable encryption for cyber-physical social systems
G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang
IEEE Access 6, 21828-21839, 2018
182018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20