Artikkelit, joihin on yleisen käytön mandaatti - Guofei GuLisätietoja
Ei saatavilla missään: 1
Shadow attacks based on password reuses: A quantitative empirical analysis
W Han, Z Li, M Ni, G Gu, W Xu
IEEE Transactions on Dependable and Secure Computing 15 (2), 309-320, 2016
Mandaatit: National Natural Science Foundation of China
Saatavilla jossain: 60
Poseidon: Mitigating volumetric ddos attacks with programmable switches
M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu
the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020
Mandaatit: US National Science Foundation, US Department of Defense, National Natural …
Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis
J Zheng, Q Li, G Gu, J Cao, DKY Yau, J Wu
IEEE Transactions on Information Forensics and Security 13 (7), 1838-1853, 2018
Mandaatit: US National Science Foundation, National Natural Science Foundation of China
{UIPicker}:{User-Input} privacy identification in mobile applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993-1008, 2015
Mandaatit: National Natural Science Foundation of China
Flow wars: Systemizing the attack surface and defenses in software-defined networks
C Yoon, S Lee, H Kang, T Park, S Shin, V Yegneswaran, P Porras, G Gu
IEEE/ACM Transactions on Networking 25 (6), 3514-3530, 2017
Mandaatit: US National Science Foundation
SODA: A Generic Online Detection Framework for Smart Contracts.
T Chen, R Cao, T Li, X Luo, G Gu, Y Zhang, Z Liao, H Zhu, G Chen, Z He, ...
NDSS, 2020
Mandaatit: US National Science Foundation, National Natural Science Foundation of China …
Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART}
L Xue, Y Zhou, T Chen, X Luo, G Gu
26th USENIX Security Symposium (USENIX Security 17), 289-306, 2017
Mandaatit: US National Science Foundation, National Natural Science Foundation of China …
Attacking the brain: Races in the {SDN} control plane
L Xu, J Huang, S Hong, J Zhang, G Gu
26th USENIX Security Symposium (USENIX Security 17), 451-468, 2017
Mandaatit: US National Science Foundation
Effective topology tampering attacks and defenses in software-defined networks
R Skowyra, L Xu, G Gu, V Dedhia, T Hobson, H Okhravi, J Landry
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Mandaatit: US National Science Foundation, US Department of Defense
The {CrossPath} attack: Disrupting the {SDN} control channel via shared links
J Cao, Q Li, R Xie, K Sun, G Gu, M Xu, Y Yang
28th USENIX Security Symposium (USENIX Security 19), 19-36, 2019
Mandaatit: US National Science Foundation, US Department of Defense, National Natural …
Life after speech recognition: Fuzzing semantic misinterpretation for voice assistant applications
Y Zhang, L Xu, A Mendoza, G Yang, P Chinprutthiwong, G Gu
Proc. of the Network and Distributed System Security Symposium (NDSS'19), 2019
Mandaatit: US National Science Foundation
CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers.
A Nappa, Z Xu, MZ Rafique, J Caballero, G Gu
NDSS, 2014
Mandaatit: Government of Spain
Linkscope: Toward detecting target link flooding attacks
L Xue, X Ma, X Luo, EWW Chan, TTN Miu, G Gu
IEEE Transactions on Information Forensics and Security 13 (10), 2423-2438, 2018
Mandaatit: US National Science Foundation, National Natural Science Foundation of China …
Autoprobe: Towards automatic active malicious server probing using dynamic binary analysis
Z Xu, A Nappa, R Baykov, G Yang, J Caballero, G Gu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Mandaatit: Government of Spain
vNIDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems
H Li, H Hu, G Gu, GJ Ahn, F Zhang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandaatit: US National Science Foundation
Mobile application web api reconnaissance: Web-to-mobile inconsistencies & vulnerabilities
A Mendoza, G Gu
2018 IEEE Symposium on Security and Privacy (SP), 756-769, 2018
Mandaatit: US National Science Foundation
Control plane reflection attacks in SDNs: New attacks and countermeasures
M Zhang, G Li, L Xu, J Bi, G Gu, J Bai
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Mandaatit: US National Science Foundation, National Natural Science Foundation of China
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Le, G Gu
IEEE Micro 35 (1), 44-53, 2015
Mandaatit: National Natural Science Foundation of China, Research Grants Council, Hong Kong
NETHCF: Enabling line-rate and adaptive spoofed IP traffic filtering
G Li, M Zhang, C Liu, X Kong, A Chen, G Gu, H Duan
2019 IEEE 27th international conference on network protocols (ICNP), 1-12, 2019
Mandaatit: US National Science Foundation, National Natural Science Foundation of China
Towards fine-grained network security forensics and diagnosis in the SDN era
H Wang, G Yang, P Chinprutthiwong, L Xu, Y Zhang, G Gu
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandaatit: US National Science Foundation
Tietokoneohjelma arvioi ja määrittää julkaisu- ja rahoitustiedot automaattisesti