Ping Yang

Orcid: 0000-0001-9058-2822

Affiliations:
  • State University of New York at Binghamton, NY, USA
  • State University of New York at Stony Brook, NY, USA


According to our database1, Ping Yang authored at least 44 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
V-Recover: Virtual Machine Recovery When Live Migration Fails.
IEEE Trans. Cloud Comput., 2023

Debugging Malware Classification Models Based on Event Logs with Explainable AI.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments.
IEEE Trans. Dependable Secur. Comput., 2022

CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
FedADMP: A Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning.
EAI Endorsed Trans. Security Safety, 2021

Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2019
Live Migration Ate My VM: Recovering a Virtual Machine after Failure of Post-Copy Live Migration.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ContainerVisor: Customized Control of Container Resources.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019

SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

RAMP: Real-Time Anomaly Detection in Scientific Workflows.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
Security Analysis of Email Systems.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Quick eviction of virtual machines through proactive live snapshots.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Quick Eviction of Virtual Machines through Proactive Snapshots.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
Policy analysis for administrative role based access control without separate administration.
J. Comput. Secur., 2015

Privacy-preserving Virtual Machine.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints.
IEEE Trans. Serv. Comput., 2014

Editorial: Information and Systems Security.
Int. J. Softw. Informatics, 2014

Efficient Policy Analysis for Evolving Administrative Role Based Access Control.
Int. J. Softw. Informatics, 2014

Privacy-preserving virtual machine checkpointing mechanism.
Int. J. Cloud Comput., 2014

2013
Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments.
Int. J. Comput. Their Appl., 2013

Policy Analysis for Administrative Role Based Access Control without Separate Administration.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

An Application-Level Approach for Privacy-Preserving Virtual Machine Checkpointing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Analysis of Scientific Workflow Provenance Access Control Policies.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
Policy analysis for Administrative Role-Based Access Control.
Theor. Comput. Sci., 2011

Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows.
Int. J. Comput. Their Appl., 2011

Symbolic reachability analysis for parameterized administrative role-based access control.
Comput. Secur., 2011

SPARC: a security and privacy aware virtual machinecheckpointing mechanism.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

2010
Secure Abstraction Views for Scientific Workflow Provenance Querying.
IEEE Trans. Serv. Comput., 2010

Information flow analysis of scientific workflows.
J. Comput. Syst. Sci., 2010

A Case for Secure Virtual Append-Only Storage for Virtual Machines.
Proceedings of the 39th International Conference on Parallel Processing, 2010

User-Role Reachability Analysis of Evolving Administrative Role Based Access Control.
Proceedings of the Computer Security, 2010

2009
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2009

Incremental Information Flow Analysis of Role Based Access Control.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Scientific Workflow Provenance Querying with Security Views.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines.
Proceedings of the Third International Conference on e-Science and Grid Computing, 2007

Efficient policy analysis for administrative role based access control.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Parameterized Verification of pi-Calculus Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006

Runtime Security Verification for Itinerary-Driven Mobile Agents.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
A Provably Correct Compiler for Efficient Model Checking of Mobile Processes.
Proceedings of the Practical Aspects of Declarative Languages, 7th International Symposium, 2005

2004
A logical encoding of the pi-calculus: model checking mobile processes using tabled resolution.
Int. J. Softw. Tools Technol. Transf., 2004


  Loading...