متابعة
Yingfei Dong
Yingfei Dong
Professor of Computer Engineering, University of Hawaii
بريد إلكتروني تم التحقق منه على hawaii.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Detecting spam zombies by monitoring outgoing messages
Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker
IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011
1292011
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
1072010
Video streaming having controlled quality assurance over best-effort networks
ZL Zhang, Y Dong
US Patent App. 10/421,657, 2004
1042004
Server-based network performance metrics generation system and method
YT Hou, Y Dong, T Taniguchi
US Patent 6,901,051, 2005
662005
DMTP: Controlling spam through message delivery differentiation
Z Duan, Y Dong, K Gopalan
Computer Networks 51 (10), 2616-2630, 2007
482007
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
462013
A traceback attack on freenet
G Tian, Z Duan, T Baumeister, Y Dong
IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015
442015
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Z Duan, K Gopalan, Y Dong
SRUTI 5, 25-30, 2005
432005
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
392017
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
352014
Loopback: Exploiting collaborative caches for large-scale streaming
E Kusmierek, Y Dong, DHC Du
IEEE Transactions on Multimedia 8 (2), 233-242, 2006
352006
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
262012
Blocking spam by separating end-user machines from legitimate mail server machines
F Sanchez, Z Duan, Y Dong
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
242011
A novel comprehensive network security assessment approach
C Wang, Y Wang, Y Dong, T Zhang
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
242011
Understanding forgery properties of spam delivery paths
F Sanchez, Z Duan, Y Dong
Proc. of 7th CEAS, 2010
232010
Manipulating drone position control
W Chen, Y Dong, Z Duan
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
222019
A differentiated message delivery architecture to control spam
Z Duan, Y Dong, K Gopalan
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
222005
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations
Y Dong, X Du, X Zhang
Computer Communications 21 (5), 470-484, 1998
211998
Leakage models and inference attacks on searchable encryption for cyber-physical social systems
G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang
IEEE Access 6, 21828-21839, 2018
202018
A routing table insertion (RTI) attack on Freenet
T Baumeister, Y Dong, Z Duan, G Tian
2012 International Conference on Cyber Security, 8-15, 2012
202012
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20