Guofei Gu, Ph.D. - Publications

Affiliations: 
2008 Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

18 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Xue L, Ma X, Luo X, Chan EWW, Miu TTN, Gu G. LinkScope: Toward Detecting Target Link Flooding Attacks Ieee Transactions On Information Forensics and Security. 13: 2423-2438. DOI: 10.1109/Tifs.2018.2815555  0.377
2018 Zheng J, Li Q, Gu G, Cao J, Yau DKY, Wu J. Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis Ieee Transactions On Information Forensics and Security. 13: 1838-1853. DOI: 10.1109/Tifs.2018.2805600  0.364
2018 Hausheer D, Hohlfeld O, Schmid S, Gu G. Security and performance of software-defined networks and functions virtualization Computer Networks. 138: 15-17. DOI: 10.1016/J.Comnet.2018.03.025  0.32
2017 Yoon C, Lee S, Kang H, Park T, Shin S, Yegneswaran V, Porras P, Gu G. Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks Ieee Acm Transactions On Networking. 25: 3514-3530. DOI: 10.1109/Tnet.2017.2748159  0.368
2017 Nan Y, Yang Z, Yang M, Zhou S, Zhang Y, Gu G, Wang X, Sun L. Identifying User-Input Privacy in Mobile Applications at a Large Scale Ieee Transactions On Information Forensics and Security. 12: 647-661. DOI: 10.1109/Tifs.2016.2631949  0.326
2016 Zhang Y, Yang M, Gu G, Chen H. Rethinking Permission Enforcement Mechanism on Mobile Systems Ieee Transactions On Information Forensics and Security. 11: 2227-2240. DOI: 10.1109/Tifs.2016.2581304  0.339
2016 Hassanzadeh A, Xu Z, Stoleru R, Gu G, Polychronakis M. PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks Computers and Security. 62: 114-132. DOI: 10.1016/J.Cose.2016.06.007  0.353
2015 Yu S, Gu G, Barnawi A, Guo S, Stojmenovic I. Malware Propagation in Large-Scale Networks Ieee Transactions On Knowledge and Data Engineering. 27: 170-179. DOI: 10.1109/Tkde.2014.2320725  0.327
2015 Shin S, Wang H, Gu G. A first step toward network security virtualization: From concept to prototype Ieee Transactions On Information Forensics and Security. 10: 2236-2249. DOI: 10.1109/Tifs.2015.2453936  0.351
2015 Qian C, Luo X, Le Y, Gu G. VulHunter: Toward Discovering Vulnerabilities in Android Applications Ieee Micro. 35: 44-53. DOI: 10.1109/Mm.2015.25  0.316
2014 Först M, Tobey RI, Bromberger H, Wilkins SB, Khanna V, Caviglia AD, Chuang YD, Lee WS, Schlotter WF, Turner JJ, Minitti MP, Krupin O, Xu ZJ, Wen JS, Gu GD, et al. Melting of charge stripes in vibrationally driven La(1.875)Ba(0.125)CuO4: assessing the respective roles of electronic and lattice order in frustrated superconductors. Physical Review Letters. 112: 157002. PMID 24785066 DOI: 10.1103/Physrevlett.112.157002  0.357
2014 Zhang Y, Yang M, Yang Z, Gu G, Ning P, Zang B. Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps Ieee Transactions On Information Forensics and Security. 9: 1828-1842. DOI: 10.1109/Tifs.2014.2347206  0.31
2013 Yang C, Harkreader R, Gu G. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers Ieee Transactions On Information Forensics and Security. 8: 1280-1293. DOI: 10.1109/Tifs.2013.2267732  0.303
2013 Shin S, Xu Z, Gu G. EFFORT: A new host-network cooperated framework for efficient and effective bot malware detection Computer Networks. 57: 2628-2642. DOI: 10.1016/J.Comnet.2013.05.010  0.364
2012 Yang C, Song Y, Gu G. Active User-Side Evil Twin Access Point Detection Using Statistical Techniques Ieee Transactions On Information Forensics and Security. 7: 1638-1651. DOI: 10.1109/Tifs.2012.2207383  0.37
2012 Shin S, Gu G, Reddy N, Lee CP. A Large-Scale Empirical Study of Conficker Ieee Transactions On Information Forensics and Security. 7: 676-690. DOI: 10.1109/Tifs.2011.2173486  0.345
2011 Wang T, Wei T, Gu G, Zou W. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution Acm Transactions On Information and System Security. 14: 15. DOI: 10.1145/2019599.2019600  0.324
2011 Ma W, Duan P, Liu S, Gu G, Liu J. Shadow attacks: automatically evading system-call-behavior based malware detection Journal in Computer Virology. 8: 1-13. DOI: 10.1007/S11416-011-0157-5  0.332
Show low-probability matches.