default search action
Ping Yang 0002
Person information
- affiliation: State University of New York at Binghamton, NY, USA
- affiliation: State University of New York at Stony Brook, NY, USA
Other persons with the same name
- Ping Yang — disambiguation page
- Ping Yang 0001 — Texas Instruments, VLSI Laboratory, Dallas, TX, USA
- Ping Yang 0003 — Wireless Networks, NORTEL, Richardson, TX, USA (and 1 more)
- Ping Yang 0004 — IBM, Austin, TX, USA (and 3 more)
- Ping Yang 0005 — University of Electronic Science and Technology of China, National Key Laboratory of Science and Technology on Communications, Chengdu, China (and 1 more)
- Ping Yang 0006 — Guizhou University, College of Big Data and Information Engineering, Guiyang, China
- Ping Yang 0007 — Texas A&M University, Department of Atmospheric Sciences, College Station, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Dinuni K. Fernando, Jonathan Terner, Ping Yang, Kartik Gopalan:
V-Recover: Virtual Machine Recovery When Live Migration Fails. IEEE Trans. Cloud Comput. 11(3): 3289-3300 (2023) - [c32]Joon-Young Gwak, Priti Prabhakar Wakodikar, Meng Wang, Guanhua Yan, Xiaokui Shu, Scott D. Stoller, Ping Yang:
Debugging Malware Classification Models Based on Event Logs with Explainable AI. ICDM (Workshops) 2023: 939-948 - 2022
- [j14]Saeid Mofrad, Ishtiaq Ahmed, Fengwei Zhang, Shiyong Lu, Ping Yang, Heming Cui:
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 4187-4203 (2022) - [c31]Jerome Dinal Herath, Priti Prabhakar Wakodikar, Ping Yang, Guanhua Yan:
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs. DSN 2022: 172-184 - 2021
- [j13]Zezhang Yang, Jian Li, Ping Yang:
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning. EAI Endorsed Trans. Security Safety 8(29): e4 (2021) - [c30]Jerome Dinal Herath, Ping Yang, Guanhua Yan:
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs. CODASPY 2021: 29-40
2010 – 2019
- 2019
- [c29]Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, Fengwei Zhang:
SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments. ACSAC 2019: 390-403 - [c28]Jerome Dinal Herath, Changxin Bai, Guanhua Yan, Ping Yang, Shiyong Lu:
RAMP: Real-Time Anomaly Detection in Scientific Workflows. IEEE BigData 2019: 1367-1374 - [c27]Dinuni K. Fernando, Siddharth Kulshrestha, Jerome Dinal Herath, Nitin Mahadik, Yanzhe Ma, Changxin Bai, Ping Yang, Guanhua Yan, Shiyong Lu:
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance. CIC 2019: 81-90 - [c26]Tianlin Li, Kartik Gopalan, Ping Yang:
ContainerVisor: Customized Control of Container Resources. IC2E 2019: 190-199 - [c25]Dinuni K. Fernando, Jonathan Terner, Kartik Gopalan, Ping Yang:
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration. INFOCOM 2019: 343-351 - 2017
- [c24]Tianlin Li, Amish Mehta, Ping Yang:
Security Analysis of Email Systems. CSCloud 2017: 91-96 - 2016
- [c23]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick Eviction of Virtual Machines through Proactive Snapshots. CLUSTER 2016: 156-157 - [c22]Dinuni K. Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles A. Kamhoua, Kevin A. Kwiat:
Quick eviction of virtual machines through proactive live snapshots. UCC 2016: 99-107 - 2015
- [j12]Ping Yang, Mikhail I. Gofman, Scott D. Stoller, Zijiang Yang:
Policy analysis for administrative role based access control without separate administration. J. Comput. Secur. 23(1): 1-29 (2015) - [c21]Yaohui Hu, Sanket Panhale, Tianlin Li, Emine Kaynar, Danny Chan, Umesh Deshpande, Ping Yang, Kartik Gopalan:
Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines. CLOUD 2015: 613-620 - [c20]Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan:
Privacy-preserving Virtual Machine. ACSAC 2015: 231-240 - 2014
- [j11]Mikhail I. Gofman, Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, Kartik Gopalan:
Privacy-preserving virtual machine checkpointing mechanism. Int. J. Cloud Comput. 3(3): 245-266 (2014) - [j10]Mikhail I. Gofman, Ping Yang:
Efficient Policy Analysis for Evolving Administrative Role Based Access Control. Int. J. Softw. Informatics 8(1): 95-131 (2014) - [j9]Ping Yang, Xiaolong Jin:
Editorial: Information and Systems Security. Int. J. Softw. Informatics 8(2): 143-144 (2014) - [j8]Ping Yang, Xing Xie, Indrakshi Ray, Shiyong Lu:
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints. IEEE Trans. Serv. Comput. 7(2): 237-251 (2014) - 2013
- [j7]Zijiang Yang, Shiyong Lu, Ping Yang, Andrey Kashlev:
Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments. Int. J. Comput. Their Appl. 20(2): 65-77 (2013) - [c19]Yaohui Hu, Tianlin Li, Ping Yang, Kartik Gopalan:
An Application-Level Approach for Privacy-Preserving Virtual Machine Checkpointing. IEEE CLOUD 2013: 59-66 - [c18]Ping Yang, Mikhail I. Gofman, Zijiang Yang:
Policy Analysis for Administrative Role Based Access Control without Separate Administration. DBSec 2013: 49-64 - 2012
- [c17]Ruiqi Luo, Ping Yang, Shiyong Lu, Mikhail I. Gofman:
Analysis of Scientific Workflow Provenance Access Control Policies. IEEE SCC 2012: 266-273 - 2011
- [j6]Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role-based access control. Comput. Secur. 30(2-3): 148-164 (2011) - [j5]Zijiang Yang, Shiyong Lu, Ping Yang, Fahima Amin Bhuyan:
Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows. Int. J. Comput. Their Appl. 18(3): 148-159 (2011) - [j4]Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy analysis for Administrative Role-Based Access Control. Theor. Comput. Sci. 412(44): 6208-6234 (2011) - [c16]Mikhail I. Gofman, Ruiqi Luo, Ping Yang, Kartik Gopalan:
SPARC: a security and privacy aware virtual machinecheckpointing mechanism. WPES 2011: 115-124 - 2010
- [j3]Ping Yang, Shiyong Lu, Mikhail I. Gofman, Zijiang Yang:
Information flow analysis of scientific workflows. J. Comput. Syst. Sci. 76(6): 390-402 (2010) - [j2]Artem Chebotko, Shiyong Lu, Seunghan Chang, Farshad Fotouhi, Ping Yang:
Secure Abstraction Views for Scientific Workflow Provenance Querying. IEEE Trans. Serv. Comput. 3(4): 322-337 (2010) - [c15]Mikhail I. Gofman, Ruiqi Luo, Ping Yang:
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. ESORICS 2010: 455-471 - [c14]Zhao Lin, Kartik Gopalan, Ping Yang:
A Case for Secure Virtual Append-Only Storage for Virtual Machines. ICPP Workshops 2010: 245-250
2000 – 2009
- 2009
- [c13]Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, Ping Yang:
Incremental Information Flow Analysis of Role Based Access Control. Security and Management 2009: 397-403 - [c12]Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role based access control. SACMAT 2009: 165-174 - [c11]Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, Scott D. Stoller:
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control. TACAS 2009: 46-49 - 2008
- [c10]Navodaya Garepalli, Kartik Gopalan, Ping Yang:
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols. ICCCN 2008: 125-130 - [c9]Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi, Ping Yang:
Scientific Workflow Provenance Querying with Security Views. WAIM 2008: 349-356 - 2007
- [c8]Zijiang Yang, Shiyong Lu, Ping Yang:
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows. AINA Workshops (2) 2007: 506-511 - [c7]Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, Mikhail I. Gofman:
Efficient policy analysis for administrative role based access control. CCS 2007: 445-455 - [c6]Ping Yang, Zijiang Yang, Shiyong Lu:
Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines. eScience 2007: 619-626 - 2006
- [c5]Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan:
Policy Analysis for Administrative Role Based Access Control. CSFW 2006: 124-138 - [c4]Zijiang Yang, Shiyong Lu, Ping Yang:
Runtime Security Verification for Itinerary-Driven Mobile Agents. DASC 2006: 177-186 - [c3]Ping Yang, Samik Basu, C. R. Ramakrishnan:
Parameterized Verification of pi-Calculus Systems. TACAS 2006: 42-57 - 2005
- [c2]Ping Yang, Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka:
A Provably Correct Compiler for Efficient Model Checking of Mobile Processes. PADL 2005: 113-127 - 2004
- [j1]Ping Yang, C. R. Ramakrishnan, Scott A. Smolka:
A logical encoding of the pi-calculus: model checking mobile processes using tabled resolution. Int. J. Softw. Tools Technol. Transf. 6(1): 38-66 (2004) - 2003
- [c1]Ping Yang, C. R. Ramakrishnan, Scott A. Smolka:
A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution. VMCAI 2003: 116-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint