关注
Yingfei Dong
Yingfei Dong
Professor of Computer Engineering, University of Hawaii
在 hawaii.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Detecting spam zombies by monitoring outgoing messages
Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker
IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011
1262011
Video streaming having controlled quality assurance over best-effort networks
ZL Zhang, Y Dong
US Patent App. 10/421,657, 2004
1042004
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1012010
Server-based network performance metrics generation system and method
YT Hou, Y Dong, T Taniguchi
US Patent 6,901,051, 2005
632005
DMTP: Controlling spam through message delivery differentiation
Z Duan, Y Dong, K Gopalan
Computer Networks 51 (10), 2616-2630, 2007
482007
A traceback attack on freenet
G Tian, Z Duan, T Baumeister, Y Dong
IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015
432015
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
432013
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Z Duan, K Gopalan, Y Dong
SRUTI 5, 25-30, 2005
432005
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
382017
Loopback: Exploiting collaborative caches for large-scale streaming
E Kusmierek, Y Dong, DHC Du
IEEE Transactions on Multimedia 8 (2), 233-242, 2006
352006
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
332014
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
242012
Blocking spam by separating end-user machines from legitimate mail server machines
F Sanchez, Z Duan, Y Dong
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
242011
A novel comprehensive network security assessment approach
C Wang, Y Wang, Y Dong, T Zhang
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
242011
Understanding forgery properties of spam delivery paths
F Sanchez, Z Duan, Y Dong
Proc. of 7th CEAS, 2010
232010
A differentiated message delivery architecture to control spam
Z Duan, Y Dong, K Gopalan
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
222005
Manipulating drone position control
W Chen, Y Dong, Z Duan
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
212019
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations
Y Dong, X Du, X Zhang
Computer Communications 21 (5), 470-484, 1998
211998
Leakage models and inference attacks on searchable encryption for cyber-physical social systems
G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang
IEEE Access 6, 21828-21839, 2018
192018
A routing table insertion (RTI) attack on Freenet
T Baumeister, Y Dong, Z Duan, G Tian
2012 International Conference on Cyber Security, 8-15, 2012
192012
系统目前无法执行此操作,请稍后再试。
文章 1–20