Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 80 matches
- 2023
- Joon-Young Gwak, Priti Prabhakar Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:
Debugging Malware Classification Models Based on Event Logs with Explainable AI. ICDM (Workshops) 2023: 939-948 - 2022
- Zhan Shu, Guanhua Yan:
IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference. IEEE Internet Things J. 9(22): 22737-22751 (2022) - Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan:
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs. DSN 2022: 172-184 - Zhixin Wen, Harsh Sanjay Pacherkar, Guanhua Yan:
VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation. CSET @ USENIX Security Symposium 2022: 19-29 - 2021
- Jerome Dinal Herath, Ping Yang, Guanhua Yan:
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs. CODASPY 2021: 29-40 - 2020
- Yunus Kucuk, Guanhua Yan:
Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. CODASPY 2020: 341-352 - Kaiming Fang, Guanhua Yan:
IoTReplay: Troubleshooting COTS IoT Devices with Record and Replay. SEC 2020: 193-205 - Kaiming Fang, Guanhua Yan:
Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications. WISEC 2020: 295-305 - 2019
- Jerome Dinal Herath, Changxin Bai, Guanhua Yan, Ping Yang, Shiyong Lu:
RAMP: Real-Time Anomaly Detection in Scientific Workflows. IEEE BigData 2019: 1367-1374 - Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang, Guanhua Yan, Shiyong Lu:
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. CIC 2019: 81-90 - Jiaqi Yan, Guanhua Yan, Dong Jin:
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network. DSN 2019: 52-63 - 2018
- Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. IEEE Trans. Dependable Secur. Comput. 15(6): 1068-1082 (2018) - Zhan Shu, Guanhua Yan:
Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats. MTD@CCS 2018: 69-79 - Kaiming Fang, Guanhua Yan:
Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning. ESORICS (2) 2018: 20-40 - Yunus Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan:
BigBing: Privacy-Preserving Cloud-Based Malware Classification Service. PAC 2018: 43-54 - 2017
- Guanhua Yan:
Improving Efficiency of Link Clustering on Multi-core Machines. ICDCS 2017: 2017-2024 - Guanhua Yan, Junchen Lu, Zhan Shu, Yunus Kucuk:
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability. PAC 2017: 164-175 - 2016
- Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last:
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. ISC 2016: 343-365 - Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
The Rise of Social Botnets: Attacks and Countermeasures. CoRR abs/1603.02714 (2016) - 2015
- Guanhua Yan:
Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification. AsiaCCS 2015: 121-132 - 2014
- Guanhua Yan, Stephan J. Eidenbenz:
Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs. ICDCS 2014: 154-165 - Guanhua Yan:
Finding common ground among experts' opinions on data clustering: With applications in malware analysis. ICDE 2014: 15-27 - Deguang Kong, Guanhua Yan:
Transductive malware label propagation: Find your lineage from your neighbors. INFOCOM 2014: 1411-1419 - 2013
- Nam P. Nguyen, Guanhua Yan, My T. Thai:
Analysis of misinformation containment in online social networks. Comput. Networks 57(10): 2133-2146 (2013) - Guanhua Yan:
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Comput. Networks 57(2): 540-555 (2013) - Milan Bradonjic, Michael Molloy, Guanhua Yan:
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments. Internet Math. 9(4): 406-433 (2013) - Rui Zhang, Jinxue Zhang, Yanchao Zhang, Jinyuan Sun, Guanhua Yan:
Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking. IEEE J. Sel. Areas Commun. 31(9-Supplement): 656-668 (2013) - Md. Sazzadur Rahman, Guanhua Yan, Harsha V. Madhyastha, Michalis Faloutsos, Stephan J. Eidenbenz, Mike Fisk:
iDispatcher: A unified platform for secure planet-scale information dissemination. Peer-to-Peer Netw. Appl. 6(1): 46-60 (2013) - Fengyuan Xu, Xiaojun Zhu, Chiu C. Tan, Qun Li, Guanhua Yan, Jie Wu:
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput. IEEE Trans. Parallel Distributed Syst. 24(12): 2482-2491 (2013) - Jinxue Zhang, Rui Zhang, Yanchao Zhang, Guanhua Yan:
On the impact of social botnets for spam distribution and digital-influence manipulation. CNS 2013: 46-54
skipping 50 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-19 02:53 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint