Hongyu Gao

According to our database1, Hongyu Gao authored at least 23 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Testing the Message Flow of Android Auto Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

2016
Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates.
IEEE/ACM Trans. Netw., 2016

Reexamining DNS From a Global Recursive Resolver Perspective.
IEEE/ACM Trans. Netw., 2016

Uncertain Risk Assessment of Knowledge Management: Based on Set Pair Analysis.
Scientific Programming, 2016

2014
Information Risk Evaluation and Application: Based on Set Pair Analysis.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

Public Opinion Propagation Model on Social Networks.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

Spam ain't as diverse as it seems: throttling OSN spam with templates underneath.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Automatic Parallelization of XQuery Programs.
JSW, 2013

An empirical reexamination of global DNS behavior.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Enterprise social network analysis and modeling: A tale of two graphs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Twig Pattern Matching with Positional Predicates in XML Queries.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2012
Graph accordance of next-generation sequence assemblies.
Bioinformatics, 2012

Towards Online Spam Filtering in Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Twig Pattern Matching Running on XML Streams.
Proceedings of the Web Technologies and Applications, 2012

2011
Security Issues in Online Social Networks.
IEEE Internet Computing, 2011

A new Temporal-Constraint-Based algorithm by handling temporal qualities for video enhancement.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

A new network-based algorithm for multi-camera abnormal activity detection.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

Poster: CUD: crowdsourcing for URL spam detection.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: online spam filtering in social networks.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
TwigLinkedList: Improvement of TwigList.
Proceedings of the Web-Age Information Management, 2010

NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...