Guanhua Yan

Orcid: 0000-0001-7482-4043

According to our database1, Guanhua Yan authored at least 78 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Debugging Malware Classification Models Based on Event Logs with Explainable AI.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference.
IEEE Internet Things J., 2022

VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

IoTReplay: Troubleshooting COTS IoT Devices with Record and Replay.
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020

Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

RAMP: Real-Time Anomaly Detection in Scientific Workflows.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
The Rise of Social Botnets: Attacks and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2018

BigBing: Privacy-Preserving Cloud-Based Malware Classification Service.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning.
Proceedings of the Computer Security, 2018

Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

2017
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Improving Efficiency of Link Clustering on Multi-core Machines.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing.
Proceedings of the Information Security - 19th International Conference, 2016

2015
Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Transductive malware label propagation: Find your lineage from your neighbors.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Finding common ground among experts' opinions on data clustering: With applications in malware analysis.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

2013
SmartAssoc: Decentralized Access Point Selection Algorithm to Improve Throughput.
IEEE Trans. Parallel Distributed Syst., 2013

iDispatcher: A unified platform for secure planet-scale information dissemination.
Peer-to-Peer Netw. Appl., 2013

Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking.
IEEE J. Sel. Areas Commun., 2013

Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments.
Internet Math., 2013

Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks.
Comput. Networks, 2013

Analysis of misinformation containment in online social networks.
Comput. Networks, 2013

Discriminant malware distance learning on structuralinformation for automated malware classification.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Discriminant malware distance learning on structural information for automated malware classification.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Exploring Discriminatory Features for Automated Malware Classification.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013

On the impact of social botnets for spam distribution and digital-influence manipulation.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks.
IEEE Trans. Mob. Comput., 2012

Containment of misinformation spread in online social networks.
Proceedings of the Web Science 2012, 2012

Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Fine-grained private matching for proximity-based mobile social networking.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Towards a bayesian network game framework for evaluating DDoS attacks and defense.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
AntBot: Anti-pollution peer-to-peer botnets.
Comput. Networks, 2011

An event buffer flooding attack in DNP3 controlled SCADA systems.
Proceedings of the Winter Simulation Conference 2011, 2011

Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Measuring the effectiveness of infrastructure-level detection of large-scale botnets.
Proceedings of the 19th International Workshop on Quality of Service, 2011

RatBot: Anti-enumeration Peer-to-Peer Botnets.
Proceedings of the Information Security, 14th International Conference, 2011

Privacy analysis of user association logs in a large-scale wireless LAN.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Geography-based analysis of the Internet infrastructure.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Malware propagation in online social networks: nature, dynamics, and defense implications.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Criticality analysis of Internet infrastructure.
Comput. Networks, 2010

CyberSim: Geographic, temporal, and organizational dynamics of malware propagation.
Proceedings of the 2010 Winter Simulation Conference, 2010

A correlation attack against user mobility privacy in a large-scale WLAN network.
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010

Designing a Practical Access Point Association Protocol.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

2009
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version).
IEEE Trans. Mob. Comput., 2009

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.
Ad Hoc Networks, 2009

Mobi-watchdog: you can steal, but you can't run!
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Detecting Selfish Exploitation of Carrier Sensing in 802.11 Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Blue-Watchdog: Detecting Bluetooth worm propagation in public areas.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

On the effectiveness of structural detection and defense against P2P-based botnets.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Catching Instant Messaging Worms with Change-Point Detection Techniques.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

DDoS Mitigation in Non-cooperative Environments.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Dynamic Balancing of Packet Filtering Workloads on Distributed Firewalls.
Proceedings of the 16th International Workshop on Quality of Service, 2008

BotTracer: Execution-Based Bot-Like Malware Detection.
Proceedings of the Information Security, 11th International Conference, 2008

Worm Propagation Dynamics in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Modeling Propagation Dynamics of Bluetooth Worms.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Bluetooth worm propagation: mobility pattern matters!
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
High-Performance Simulation of Low-Resolution Network Flows.
Simul., 2006

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version).
Simul., 2006

Sluggish Calendar Queues for Network Simulation.
Proceedings of the 14th International Symposium on Modeling, 2006

Packet Reordering Metrics: Some Methodological Considerations.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Bluetooth Worms: Models, Dynamics, and Defense Implications.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Improving Large-Scale Network Traffic Simulation with Multi-Resolution Models.
PhD thesis, 2005

Simulation of Network Traffic at Coarse Timescales.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005

2004
Discrete event fluid modeling of background TCP traffic.
ACM Trans. Model. Comput. Simul., 2004

2003
Simulation of large scale networks I: simulation of large-scale networks using SSF.
Proceedings of the 35th Winter Simulation Conference: Driving Innovation, 2003

2000
An Efficient Method to Simulate Communication Networks.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000


  Loading...