Year |
Citation |
Score |
2018 |
Xue L, Ma X, Luo X, Chan EWW, Miu TTN, Gu G. LinkScope: Toward Detecting Target Link Flooding Attacks Ieee Transactions On Information Forensics and Security. 13: 2423-2438. DOI: 10.1109/Tifs.2018.2815555 |
0.377 |
|
2018 |
Zheng J, Li Q, Gu G, Cao J, Yau DKY, Wu J. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis Ieee Transactions On Information Forensics and Security. 13: 1838-1853. DOI: 10.1109/Tifs.2018.2805600 |
0.364 |
|
2018 |
Hausheer D, Hohlfeld O, Schmid S, Gu G. Security and performance of software-defined networks and functions virtualization Computer Networks. 138: 15-17. DOI: 10.1016/J.Comnet.2018.03.025 |
0.32 |
|
2017 |
Yoon C, Lee S, Kang H, Park T, Shin S, Yegneswaran V, Porras P, Gu G. Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks Ieee Acm Transactions On Networking. 25: 3514-3530. DOI: 10.1109/Tnet.2017.2748159 |
0.368 |
|
2017 |
Nan Y, Yang Z, Yang M, Zhou S, Zhang Y, Gu G, Wang X, Sun L. Identifying User-Input Privacy in Mobile Applications at a Large Scale Ieee Transactions On Information Forensics and Security. 12: 647-661. DOI: 10.1109/Tifs.2016.2631949 |
0.326 |
|
2016 |
Zhang Y, Yang M, Gu G, Chen H. Rethinking Permission Enforcement Mechanism on Mobile Systems Ieee Transactions On Information Forensics and Security. 11: 2227-2240. DOI: 10.1109/Tifs.2016.2581304 |
0.339 |
|
2016 |
Hassanzadeh A, Xu Z, Stoleru R, Gu G, Polychronakis M. PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks Computers and Security. 62: 114-132. DOI: 10.1016/J.Cose.2016.06.007 |
0.353 |
|
2015 |
Yu S, Gu G, Barnawi A, Guo S, Stojmenovic I. Malware Propagation in Large-Scale Networks Ieee Transactions On Knowledge and Data Engineering. 27: 170-179. DOI: 10.1109/Tkde.2014.2320725 |
0.327 |
|
2015 |
Shin S, Wang H, Gu G. A first step toward network security virtualization: From concept to prototype Ieee Transactions On Information Forensics and Security. 10: 2236-2249. DOI: 10.1109/Tifs.2015.2453936 |
0.351 |
|
2015 |
Qian C, Luo X, Le Y, Gu G. VulHunter: Toward Discovering Vulnerabilities in Android Applications Ieee Micro. 35: 44-53. DOI: 10.1109/Mm.2015.25 |
0.316 |
|
2014 |
Först M, Tobey RI, Bromberger H, Wilkins SB, Khanna V, Caviglia AD, Chuang YD, Lee WS, Schlotter WF, Turner JJ, Minitti MP, Krupin O, Xu ZJ, Wen JS, Gu GD, et al. Melting of charge stripes in vibrationally driven La(1.875)Ba(0.125)CuO4: assessing the respective roles of electronic and lattice order in frustrated superconductors. Physical Review Letters. 112: 157002. PMID 24785066 DOI: 10.1103/Physrevlett.112.157002 |
0.357 |
|
2014 |
Zhang Y, Yang M, Yang Z, Gu G, Ning P, Zang B. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842. DOI: 10.1109/Tifs.2014.2347206 |
0.31 |
|
2013 |
Yang C, Harkreader R, Gu G. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Ieee Transactions On Information Forensics and Security. 8: 1280-1293. DOI: 10.1109/Tifs.2013.2267732 |
0.303 |
|
2013 |
Shin S, Xu Z, Gu G. EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection Computer Networks. 57: 2628-2642. DOI: 10.1016/J.Comnet.2013.05.010 |
0.364 |
|
2012 |
Yang C, Song Y, Gu G. Active User-Side Evil Twin Access Point Detection Using Statistical Techniques Ieee Transactions On Information Forensics and Security. 7: 1638-1651. DOI: 10.1109/Tifs.2012.2207383 |
0.37 |
|
2012 |
Shin S, Gu G, Reddy N, Lee CP. A Large-Scale Empirical Study of Conficker Ieee Transactions On Information Forensics and Security. 7: 676-690. DOI: 10.1109/Tifs.2011.2173486 |
0.345 |
|
2011 |
Wang T, Wei T, Gu G, Zou W. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution Acm Transactions On Information and System Security. 14: 15. DOI: 10.1145/2019599.2019600 |
0.324 |
|
2011 |
Ma W, Duan P, Liu S, Gu G, Liu J. Shadow attacks: automatically evading system-call-behavior based malware detection Journal in Computer Virology. 8: 1-13. DOI: 10.1007/S11416-011-0157-5 |
0.332 |
|
Show low-probability matches. |