Android malware detection via graphlet sampling T Gao, W Peng, D Sisodia, TK Saha, F Li, M Al Hasan IEEE Transactions on Mobile Computing 18 (12), 2754-2767, 2018 | 43 | 2018 |
Local differential privately anonymizing online social networks under hrg-based model T Gao, F Li, Y Chen, XK Zou IEEE Transactions on Computational Social Systems 5 (4), 1009-1020, 2018 | 41 | 2018 |
Understanding shilling attacks and their detection traits: A comprehensive survey AP Sundar, F Li, X Zou, T Gao, ED Russomanno IEEE Access 8, 171703-171715, 2020 | 35 | 2020 |
Sharing social networks using a novel differentially private graph model T Gao, F Li 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2019 | 25 | 2019 |
Protecting social network with differential privacy under novel graph model T Gao, F Li IEEE Access 8, 185276-185289, 2020 | 20 | 2020 |
Privacy-preserving sketching for online social network data publication T Gao, F Li 2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019 | 17 | 2019 |
Preserving local differential privacy in online social networks T Gao, F Li, Y Chen, XK Zou Wireless Algorithms, Systems, and Applications: 12th International …, 2017 | 16 | 2017 |
PHDP: Preserving persistent homology in differentially private graph publications T Gao, F Li IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2242-2250, 2019 | 15 | 2019 |
Studying the utility preservation in social network anonymization via persistent homology T Gao, F Li Computers & Security 77, 49-64, 2018 | 10 | 2018 |
Differential private social network publication and persistent homology preservation T Gao, F Li IEEE Transactions on Network Science and Engineering 8 (4), 3152-3166, 2021 | 8 | 2021 |
Obfuscating function call topography to test structural malware detection against evasion attacks A Choliy, F Li, T Gao 2017 International Conference on Computing, Networking and Communications …, 2017 | 8 | 2017 |
ACTS: extracting android app topological signature through graphlet sampling W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan 2016 IEEE Conference on Communications and Network Security (CNS), 37-45, 2016 | 7 | 2016 |
Multi-armed-bandit-based shilling attack on collaborative filtering recommender systems AP Sundar, F Li, X Zou, Q Hu, T Gao 2020 IEEE 17th international conference on mobile ad hoc and sensor systems …, 2020 | 6 | 2020 |
Deepdynamic clustering of spam reviewers using behavior-anomaly-based graph embedding AP Sundar, F Lilt, X Zou, T Gao GLOBECOM 2020-2020 IEEE Global Communications Conference, 01-06, 2020 | 6 | 2020 |
Machine learning-based online social network privacy preservation T Gao, F Li Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 5 | 2022 |
De-anonymization of dynamic online social networks via persistent structures T Gao, F Li ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 5 | 2019 |
Distributed swift and stealthy backdoor attack on federated learning AP Sundar, F Li, X Zou, T Gao 2022 IEEE International Conference on Networking, Architecture and Storage …, 2022 | 3 | 2022 |
Preserving graph utility in anonymized social networks? a study on the persistent homology T Gao, F Li 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems …, 2017 | 3 | 2017 |
Efficient content delivery via interest queueing T Gao, F Li ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 2 | 2019 |
Using persistent homology to represent online social network graphs CS Lee, T Gao, F Li 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems …, 2017 | 2 | 2017 |