default search action
Yingfei Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c55]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation. CCNC 2024: 127-134 - [i3]Md Mainuddin, Zhenhai Duan, Yingfei Dong:
Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing. CoRR abs/2404.13690 (2024) - 2023
- [j22]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
DPM: Towards Accurate Drone Position Manipulation. IEEE Trans. Dependable Secur. Comput. 20(1): 813-826 (2023) - [c54]Md Mainuddin, Zhenhai Duan, Yingfei Dong:
Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing. IEEE Big Data 2023: 1344-1351 - [c53]Yidan Hu, Yukun Dong, Wenxin Chen, Yingfei Dong, Rui Zhang:
Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance. CNS 2023: 1-9 - 2022
- [c52]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Accurately Redirecting a Malicious Drone. CCNC 2022: 827-834 - [c51]Md Mainuddin, Zhenhai Duan, Yingfei Dong, Shaeke Salman, Tania Taami:
IoT Device Identification Based on Network Traffic Characteristics. GLOBECOM 2022: 6067-6072 - [i2]Md Mainuddin, Zhenhai Duan, Yingfei Dong, Shaeke Salman, Tania Taami:
IoT Device Identification Based on Network Traffic Characteristics. CoRR abs/2212.08905 (2022) - 2021
- [c50]Md Mainuddin, Zhenhai Duan, Yingfei Dong:
Network Traffic Characteristics of IoT Devices in Smart Homes. ICCCN 2021: 1-11 - [i1]Md Mainuddin, Zhenhai Duan, Yingfei Dong:
Network Traffic Characteristics of IoT Devices in Smart Homes. CoRR abs/2109.01855 (2021)
2010 – 2019
- 2019
- [c49]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Manipulating Drone Position Control. CNS 2019: 10-18 - [c48]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c47]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - 2018
- [j21]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j20]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [c46]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Manipulating Drone Dynamic State Estimation to Compromise Navigation. CNS 2018: 1-9 - [c45]Dawei Wang, Shuzhuang Zhang, Yibo Xue, Yingfei Dong:
Identifying Influential Factors of CDN Performance with Large-scale Data Analysis. ICNC 2018: 873-877 - [c44]Jun Yang, Nan Zhou, Yifan Li, Xueer Xue, Yingfei Dong, Yibo Xue, Jun Li:
Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusion. INFOCOM Workshops 2018: 1-2 - [c43]Wenxin Chen, Yingfei Dong, Zhenhai Duan:
Attacking altitude estimation in drone navigation. INFOCOM Workshops 2018: 888-893 - 2017
- [j19]Depeng Li, Rui Zhang, Yingfei Dong, Fangjin Zhu, Dusko Pavlovic:
A Multisecret Value Access Control Framework for Airliner in Multinational Air Traffic Management. IEEE Internet Things J. 4(6): 1853-1867 (2017) - [j18]Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
A Traceback Attack on Freenet. IEEE Trans. Dependable Secur. Comput. 14(3): 294-307 (2017) - [c42]Jiapeng Zhang, Yingfei Dong:
Cyber attacks on remote relays in smart grid. CNS 2017: 1-9 - [c41]Dawei Wang, Qingin He, Liping Qian, Yibo Xue, Yingfei Dong:
Understanding IP address multiplexing with large-scale SSL/TLS flow analysis. ICNC 2017: 541-545 - [c40]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge. SecureComm 2017: 530-549 - [c39]Guofeng Wang, Chuanyi Liu, Yingfei Dong, Hezhong Pan, Peiyi Han, Binxing Fang:
SafeBox: A scheme for searching and sharing encrypted data in cloud applications. SPAC 2017: 648-653 - 2016
- [j17]Fernando Sanchez, Zhenhai Duan, Yingfei Dong:
Blocking spam by separating end-user machines from legitimate mail server machines. Secur. Commun. Networks 9(4): 316-326 (2016) - [j16]Todd Baumeister, Yingfei Dong:
Towards secure identity management for the smart grid. Secur. Commun. Networks 9(9): 808-822 (2016) - [c38]Zhaoguo Wang, Chenglong Li, Yi Guan, Yibo Xue, Yingfei Dong:
ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data. ICCCN 2016: 1-9 - 2015
- [c37]Yuanyuan Bao, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Implementation of Chaotic Analysis on Retweet Time Series. ASONAM 2015: 1225-1231 - [c36]Xiang Cao, Yingfei Dong, David Hung-Chang Du:
Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs. ICCCN 2015: 1-8 - [c35]Yuanyuan Bao, Wenting Huang, Chengqi Yi, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Effective deployment of monitoring points on social networks. ICNC 2015: 62-66 - [p1]Yuanyuan Bao, Chengqi Yi, Yibo Xue, Yingfei Dong:
Precise Modeling Rumor Propagation and Control Strategy on Social Networks. Applications of Social Media and Social Network Analysis 2015: 77-102 - 2014
- [c34]Chengqi Yi, Yuanyuan Bao, Jingchi Jiang, Yibo Xue, Yingfei Dong:
Cascading failures of social networks under attacks. ASONAM 2014: 679-686 - [c33]Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
Reroute on loop in anonymous peer-to-peer content sharing networks. CNS 2014: 409-417 - [c32]Jiapeng Zhang, Yingfei Dong:
Utilizing path dynamics for delay assurance in synchronized multihop scheduling. ICCCN 2014: 1-6 - [c31]Dawei Wang, Luoshi Zhang, Zhenlong Yuan, Yibo Xue, Yingfei Dong:
Characterizing Application Behaviors for classifying P2P traffic. ICNC 2014: 21-25 - 2013
- [c30]Yuanyuan Bao, Chengqi Yi, Yibo Xue, Yingfei Dong:
A new rumor propagation model and control strategy on social networks. ASONAM 2013: 1472-1473 - [c29]Zhenlong Yuan, Yibo Xue, Yingfei Dong:
Harvesting unique characteristics in packet sequences for effective application classification. CNS 2013: 341-349 - [c28]Chunlu Wang, Chuanyi Liu, Xiaoliang Wang, Yingfei Dong:
Effectively auditing IaaS cloud servers. GLOBECOM 2013: 682-688 - [c27]Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
Thwarting traceback attack on Freenet. GLOBECOM 2013: 741-746 - [c26]Todd Baumeister, Yingfei Dong, Guanyu Tian, Zhenhai Duan:
Using randomized routing to counter routing table insertion attack on Freenet. GLOBECOM 2013: 754-759 - [c25]Guanyu Tian, Zhenhai Duan, Todd Baumeister, Yingfei Dong:
A traceback attack on Freenet. INFOCOM 2013: 1797-1805 - 2012
- [j15]Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker:
Detecting Spam Zombies by Monitoring Outgoing Messages. IEEE Trans. Dependable Secur. Comput. 9(2): 198-210 (2012) - [c24]Dawei Wang, Longtao He, Yibo Xue, Yingfei Dong:
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time. CCIS 2012: 646-650 - [c23]Todd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian:
A Routing Table Insertion (RTI) Attack on Freenet. CyberSecurity 2012: 8-15 - [c22]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
Relay recommendation system (RRS) and selective anonymity for tor. GLOBECOM 2012: 833-838 - 2011
- [j14]Dawei Wang, Yibo Xue, Yingfei Dong:
Anomaly Detection Using Neighborhood Negative Selection. Intell. Autom. Soft Comput. 17(5): 595-605 (2011) - [j13]Ding-Zhu Du, Yingfei Dong, Zhao Zhang:
Preface. Theor. Comput. Sci. 412(32): 4073 (2011) - [c21]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
"Super nodes" in Tor: existence and security implication. ACSAC 2011: 217-226 - [c20]Fernando Sanchez, Zhenhai Duan, Yingfei Dong:
Blocking spam by separating end-user machines from legitimate mail server machines. CEAS 2011: 116-124 - [c19]Dawei Wang, Yibo Xue, Yingfei Dong:
Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores. GLOBECOM 2011: 1-6 - [c18]Chunlu Wang, Yancheng Wang, Yingfei Dong, Tianle Zhang:
A Novel Comprehensive Network Security Assessment Approach. ICC 2011: 1-6 - 2010
- [j12]Yingfei Dong, Xiaojiang Liu:
Novel dynamic delay allocation adjustment for improving bandwidth efficiency. Comput. Commun. 33(4): 463-476 (2010) - [j11]Aravindan Raghuveer, Yingfei Dong, David Hung-Chang Du:
StatStream: providing statistical reliability guarantees in peer-to-peer live video streaming. Int. J. Adv. Media Commun. 4(1): 4-30 (2010) - [c17]Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:
HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic. GLOBECOM 2010: 1-5 - [c16]Guanglu Sun, Yibo Xue, Yingfei Dong, Dongsheng Wang, Chenglong Li:
An Novel Hybrid Method for Effectively Classifying Encrypted Traffic. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [c15]Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, James Michael Barker:
Detecting Spam Zombies by Monitoring Outgoing Messages. INFOCOM 2009: 1764-1772 - [c14]Edoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara:
Practical distributed voter-verifiable secret ballot system. SAC 2009: 16-21 - [e1]Yingfei Dong, Ding-Zhu Du, Oscar H. Ibarra:
Algorithms and Computation, 20th International Symposium, ISAAC 2009, Honolulu, Hawaii, USA, December 16-18, 2009. Proceedings. Lecture Notes in Computer Science 5878, Springer 2009, ISBN 978-3-642-10630-9 [contents] - 2008
- [c13]Xiaojiang Liu, Yingfei Dong:
Intelligently Balancing Per-Hop Delay Allocation to Improve Network Utilization. ICC 2008: 95-99 - 2007
- [j10]Zhenhai Duan, Yingfei Dong, Kartik Gopalan:
DMTP: Controlling spam through message delivery differentiation. Comput. Networks 51(10): 2616-2630 (2007) - [j9]Yingfei Dong, Zhi-Li Zhang, David Hung-Chang Du:
Full-sharing: efficient bandwidth scheduling for video streaming over broadband cable networks (BCNs). Multim. Tools Appl. 33(2): 131-156 (2007) - [c12]Vicky Zeng, Yingfei Dong:
Efficient Placement Schemes to Fully Utilize Peer Upstream Bandwidth. ICC 2007: 1673-1678 - 2006
- [j8]Yingfei Dong, Changho Choi, Zhi-Li Zhang:
LIPS: A lightweight permit system for packet source origin accountability. Comput. Networks 50(18): 3622-3641 (2006) - [j7]Yingfei Dong, Zhi-Li Zhang, David Hung-Chang Du:
Optimal Scheduling and Adaptation for VOD Service on Broadband Cable Networks. IEICE Trans. Commun. 89-B(2): 581-589 (2006) - [j6]Ewa Kusmierek, Yingfei Dong, David Hung-Chang Du:
Loopback: exploiting collaborative caches for large-scale streaming. IEEE Trans. Multim. 8(2): 233-242 (2006) - [c11]Yingfei Dong:
Distributed Active Filtering for Protecting Critical Servers. ICCCN 2006: 396-401 - [c10]Zhenhai Duan, Yingfei Dong, Kartik Gopalan:
DMTP: Controlling Spam Through Message Delivery Differentiation. Networking 2006: 355-367 - 2005
- [j5]Yingfei Dong, Zhi-Li Zhang:
Providing Controlled Quality Assurance for Streaming Stored-Videos Across the Internet Using VPNs. Multim. Tools Appl. 25(2): 281-304 (2005) - [c9]Yingfei Dong, Ewa Kusmierek, Zhenhai Duan:
Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming. ICME 2005: 1230-1233 - [c8]Zhenhai Duan, Yingfei Dong, Kartik Gopalan:
A Differentiated Message Delivery Architecture to Control Spam. ICPADS (2) 2005: 255-259 - [c7]Changho Choi, Yingfei Dong, Zhi-Li Zhang:
LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets. NETWORKING 2005: 178-190 - 2004
- [j4]Yingfei Dong, Changho Choi, Zhi-Li Zhang:
A security framework for protecting traffic between collaborative domains. Microprocess. Microsystems 28(10): 547-559 (2004) - [c6]Yingfei Dong, Changho Choi, Zhi-Li Zhang:
Secure Name Service: A Framework for Protecting Critical Internet Resources. NETWORKING 2004: 783-794 - 2003
- [c5]Yingfei Dong, Zhi-Li Zhang, David Hung-Chang Du:
Maximizing the profit of VOD service on broadband cable networks. GLOBECOM 2003: 2875-2879 - 2002
- [c4]Yingfei Dong, Zhi-Li Zhang, David Hung-Chang Du:
Optimized Upstream Scheduling in Broadband Cable Networks. Hot Interconnects 2002: 140-145 - [c3]Yingfei Dong, Zhi-Li Zhang, Yiwei Thomas Hou:
Server-Based Dynamic Server Selection Algorithms. ICOIN (2) 2002: 575-584 - 2001
- [j3]Xing Du, Xiaodong Zhang, Yingfei Dong, Lin Zhang:
Architectural Effects of Symmetric Multiprocessors on TPC-C Commercial Workload. J. Parallel Distributed Comput. 61(5): 609-640 (2001)
1990 – 1999
- 1999
- [j2]Yingfei Dong, Yiwei Thomas Hou, Zhi-Li Zhang, Tomohiko Taniguchi:
A Server-Based Non-Intrusive Measurement Infrastructure for Enterprise Networks. Perform. Evaluation 36-37(1-4): 233-247 (1999) - 1998
- [j1]Yingfei Dong, Xing Du, Xiaodong Zhang:
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations. Comput. Commun. 21(5): 470-484 (1998) - 1997
- [c2]Xing Du, Yingfei Dong, Xiaodong Zhang:
Effectively Scheduling Parallel Tasks and Communications on Networks of Workstations. Euro-Par 1997: 887-894 - [c1]Xing Du, Yingfei Dong, Xiaodong Zhang:
Characterizing Communication Interactions of Parallel and Sequential Jobs on Networks of Workstations. ICC (2) 1997: 1133-1137
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint