Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers
Chao Yang, Harkreader, R., Guofei Gu
Published in IEEE transactions on information forensics and security (01.08.2013)
Published in IEEE transactions on information forensics and security (01.08.2013)
Get full text
Journal Article
Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis
Jing Zheng, Qi Li, Guofei Gu, Jiahao Cao, Yau, David K. Y., Jianping Wu
Published in IEEE transactions on information forensics and security (01.07.2018)
Published in IEEE transactions on information forensics and security (01.07.2018)
Get full text
Journal Article
Flow Wars: Systemizing the Attack Surface and Defenses in Software-Defined Networks
Changhoon Yoon, Seungsoo Lee, Heedo Kang, Taejune Park, Seungwon Shin, Yegneswaran, Vinod, Porras, Phillip, Guofei Gu
Published in IEEE/ACM transactions on networking (01.12.2017)
Published in IEEE/ACM transactions on networking (01.12.2017)
Get full text
Journal Article
Malware Propagation in Large-Scale Networks
Yu, Shui, Gu, Guofei, Barnawi, Ahmed, Guo, Song, Stojmenovic, Ivan
Published in IEEE transactions on knowledge and data engineering (01.01.2015)
Published in IEEE transactions on knowledge and data engineering (01.01.2015)
Get full text
Journal Article
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks
Haopei Wang, Lei Xu, Guofei Gu
Published in 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01.06.2015)
Published in 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (01.06.2015)
Get full text
Conference Proceeding
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
Seungwon Shin, Guofei Gu
Published in 2012 20th IEEE International Conference on Network Protocols (ICNP) (01.10.2012)
Published in 2012 20th IEEE International Conference on Network Protocols (ICNP) (01.10.2012)
Get full text
Conference Proceeding
Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities
Mendoza, Abner, Guofei Gu
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Get full text
Conference Proceeding
A First Step Toward Network Security Virtualization: From Concept To Prototype
Shin, Seungwon, Wang, Haopei, Gu, Guofei
Published in IEEE transactions on information forensics and security (01.10.2015)
Published in IEEE transactions on information forensics and security (01.10.2015)
Get full text
Journal Article
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
Published in 2010 IEEE Symposium on Security and Privacy (01.05.2010)
Published in 2010 IEEE Symposium on Security and Privacy (01.05.2010)
Get full text
Conference Proceeding
Active User-Side Evil Twin Access Point Detection Using Statistical Techniques
Yang, Chao, Song, Yimin, Gu, Guofei
Published in IEEE transactions on information forensics and security (01.10.2012)
Published in IEEE transactions on information forensics and security (01.10.2012)
Get full text
Journal Article
Rethinking Permission Enforcement Mechanism on Mobile Systems
Zhang, Yuan, Yang, Min, Gu, Guofei, Chen, Hao
Published in IEEE transactions on information forensics and security (01.10.2016)
Published in IEEE transactions on information forensics and security (01.10.2016)
Get full text
Journal Article
Shadow Attacks Based on Password Reuses: A Quantitative Empirical Analysis
Han, Weili, Li, Zhigong, Ni, Minyue, Gu, Guofei, Xu, Wenyuan
Published in IEEE transactions on dependable and secure computing (01.03.2018)
Published in IEEE transactions on dependable and secure computing (01.03.2018)
Get full text
Journal Article
A Large-Scale Empirical Study of Conficker
Seungwon Shin, Guofei Gu, Reddy, Narasimha, Lee, Christopher P.
Published in IEEE transactions on information forensics and security (01.04.2012)
Published in IEEE transactions on information forensics and security (01.04.2012)
Get full text
Journal Article
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Applications
Guangliang Yang, Huang, Jeff, Guofei Gu, Mendoza, Abner
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Published in 2018 IEEE Symposium on Security and Privacy (SP) (01.05.2018)
Get full text
Conference Proceeding
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
Zhang, Yuan, Yang, Min, Yang, Zhemin, Gu, Guofei, Ning, Peng, Zang, Binyu
Published in IEEE transactions on information forensics and security (01.11.2014)
Published in IEEE transactions on information forensics and security (01.11.2014)
Get full text
Journal Article
Identifying User-Input Privacy in Mobile Applications at a Large Scale
Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin
Published in IEEE transactions on information forensics and security (01.03.2017)
Published in IEEE transactions on information forensics and security (01.03.2017)
Get full text
Journal Article