Shyhtsun Felix Wu

Orcid: 0000-0001-6033-5353

Affiliations:
  • University of California, Davis, USA


According to our database1, Shyhtsun Felix Wu authored at least 135 papers between 1989 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Online Social Community Sub-Location Classification.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2021
The implementation of data storage and analytics platform for big data lake of electricity usage with spark.
J. Supercomput., 2021

2019
A data-driven metric learning-based scheme for unsupervised network anomaly detection.
Comput. Electr. Eng., 2019

Globalness Detection in Online Social Network.
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019

2018
More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018

Attack Graph Convolutional Networks by Adding Fake Nodes.
CoRR, 2018

Multi-View Community Detection in Facebook Public Pages.
CoRR, 2018

Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
CoRR, 2018

FakeBuster: A Robust Fake Account Detection by Activity Analysis.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Multi-view Community Detection in Facebook Public Pages.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Profiling Facebook Public Page Graph.
Proceedings of the 2018 International Conference on Computing, 2018

Geo-Location Identification of Facebook Pages.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

2017
Defining and Detecting Environment Discrimination in Android Apps.
Proceedings of the Security and Privacy in Communication Networks, 2017

Social Coordinates: A Scalable Embedding Framework for Online Social Networks.
Proceedings of the 2017 International Conference on Machine Learning and Soft Computing, 2017

Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2015
Triaging Anomalies in Dynamic Graphs: Towards Reducing False Positives.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Localizing Temporal Anomalies in Large Evolving Graphs.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

Crawling Online Social Networks.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

Mining User Deliberation and Bias in Online Newsgroups: A Dynamic View.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Bandwagon Effect in Facebook Discussion Groups.
Proceedings of the ASE BigData & SocialInformatics 2015, 2015

2014
Peeking into the invitation-based adoption process of OSN-based applications.
Comput. Commun. Rev., 2014

2013
Social network user lifetime.
Soc. Netw. Anal. Min., 2013

SmartWiki: A reliable and conflict-refrained Wiki model based on reader differentiation and social context analysis.
Knowl. Based Syst., 2013

Making social interactions accessible in online social networks.
Inf. Serv. Use, 2013

Measuring message propagation and social influence on Twitter.com.
Int. J. Commun. Networks Distributed Syst., 2013

Leveraging Social Interactions to Suggest Friends.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

The influence of feedback with different opinions on continued user participation in online newsgroups.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Social-Aware DNS: First Step towards Future Internet.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

SIN: A Platform to Make Interactions in Social Networks Accessible.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Collaborative assessment of functional reliability in wireless networks.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

On a Triadic Approach to Connect Microstructural Properties to Social Macrostructural Patterns.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Analysis of user keyword similarity in online social networks.
Soc. Netw. Anal. Min., 2011

Analysis of inter-domain collaborative routing: provider competition for clients.
J. Commun. Networks, 2011

Estimating the size of online social networks.
Int. J. Soc. Comput. Cyber Phys. Syst., 2011

Inter-domain collaborative routing (IDCR): Server selection for optimal client performance.
Comput. Commun., 2011

Read What You Trust: An Open Wiki Model Enhanced by Social Context.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Anti-preferential Attachment: If I Follow You, Will You Follow Me?
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

The Evolution of Ego-Centric Triads: A Microscopic Approach toward Predicting Macroscopic Network Properties.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A Socially-Aware Operating System for Trustworthy Computing.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Trustworthy opportunistic sensing: A Social Computing Paradigm.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Your best might not be good enough: Ranking in collaborative social search engines.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Design and Implementation of FAITH, An Experimental System to Intercept and Manipulate Online Social Informatics.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011

2010
SocialWiki: Bring Order to Wiki Systems with Social Context.
Proceedings of the Social Informatics - Second International Conference, 2010

Social Email: A Framework and Application for More Socially-Aware Communications.
Proceedings of the Social Informatics - Second International Conference, 2010

Social Manipulation of Online Recommender Systems.
Proceedings of the Social Informatics - Second International Conference, 2010

Toward a Behavioral Approach to Privacy for Online Social Networks.
Proceedings of the Social Informatics - Second International Conference, 2010

Crawling Online Social Graphs.
Proceedings of the Advances in Web Technologies and Applications, 2010

2009
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection.
Trans. Comput. Sci., 2009

Design and Implementation of Davis Social Links OSN Kernel.
Proceedings of the Wireless Algorithms, 2009

Davis Social Links: Leveraging Social Networks for Future Internet Communication.
Proceedings of the Ninth Annual International Symposium on Applications and the Internet, 2009

Noise Injection for Search Privacy Protection.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Davis Social Links or: How I Learned to Stop Worrying and Love the Net.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Information Flow and Search in Unstructured Keyword Based Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Trust Is in the Eye of the Beholder.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Inter-Profile Similarity (IPS): A Method for Semantic Analysis of Online Social Networks.
Proceedings of the Complex Sciences, 2009

Social Network Model Based on Keyword Categorization.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Proceedings of the Information Security, 11th International Conference, 2008

iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Using Soft-Line Recursive Response to Improve Query Aggregation in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Davis social links: integrating social networks with internet routing.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

Bounds on the Performance of P2P Networks Using Tit-for-Tat Strategies.
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), 2007

Filter-Based RFD: Can We Stabilize Network Without Sacrificing Reachability Too Much?
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Analysis of BGP Origin AS Changes Among Brazil-Related Autonomous Systems.
Proceedings of the IP Operations and Management, 7th IEEE International Workshop, 2007

Interactive Informatics on Internet Infrastructure.
Proceedings of the Integrated Network Management, 2007

CLID: A general approach to validate security policies in a dynamic network.
Proceedings of the Integrated Network Management, 2007

2006
Minos: Architectural support for protecting control data.
ACM Trans. Archit. Code Optim., 2006

IPsec/VPN security policy correctness and assurance.
J. High Speed Networks, 2006

An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Hierarchical Defense Structure for Mitigating DoS Attacks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Decision System for Adequate Authentication.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

ExecRecorder: VM-based full-system replay for attack analysis and system recovery.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

Temporal search: detecting hidden malware timebombs with virtual machines.
Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, 2006

2005
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Design, Implementation, and Evaluation of "FRiTrace".
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

On Interactive Internet Traffic Replay.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Performing BGP Experiments on a Semi-realistic Internet Testbed Environment.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

TCPtransform: Property-Oriented TCP Traffic Transformation.
Proceedings of the Detection of Intrusions and Malware, 2005

Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities.
Proceedings of the Detection of Intrusions and Malware, 2005

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
SOLA: Lightweight Security for Access Control in IEEE 802.11.
IT Prof., 2004

Detecting Flaws and Intruders with Visual Data Analysis.
IEEE Computer Graphics and Applications, 2004

Cyber defense technology networking and evaluation.
Commun. ACM, 2004

Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP.
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004

On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Panel three: Monitoring and controlling networks: Have we lost control of our networks?
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

On Detection of Anomalous Routing Dynamics in BGP.
Proceedings of the NETWORKING 2004, 2004

An analysis on selective dropping attack in BGP.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Threat Analysis on NEtwork MObility (NEMO).
Proceedings of the Information and Communications Security, 6th International Conference, 2004

On Attacking Statistical Spam Filters.
Proceedings of the CEAS 2004, 2004

2003
A Visual Exploration Process for the Analysis of Internet Routing Data.
Proceedings of the 14th IEEE Visualization Conference, 2003

An approach to certificate path discovery in mobile Ad Hoc networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Protecting BGP Routes to Top Level DNS Servers.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Analysis and improvement on IPSec anti-replay window protocol.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

RBWA: an efficient random-bit window-based authentication protocol.
Proceedings of the Global Telecommunications Conference, 2003

Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events.
Proceedings of the Self-Managing Distributed Systems, 2003

A Study of Packet Delivery Performance during Routing Convergence.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Understanding BGP Behavior through a Study of DoD Prefixes.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Case Study: Interactive Visualization for Internet Security.
Proceedings of the 13th IEEE Visualization Conference, 2002

Improving BGP Convergence Through Consistency Assertions.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Observation and analysis of BGP behavior under stress.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2002

Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.
Proceedings of the Computer Security, 2002

Detection of Invalid Routing Announcement in the Internet.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Real-time protocol analysis for detecting link-state routing protocol attacks.
ACM Trans. Inf. Syst. Secur., 2001

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution.
Proceedings of the Policies for Distributed Systems and Networks, 2001

An analysis of BGP multiple origin AS (MOAS) conflicts.
Proceedings of the 1st ACM SIGCOMM Internet Measurement Workshop, 2001

IPSec/PHIL (packet header information list): design, implementation, and evaluation.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

On design and evaluation of "intention-driven" ICMP traceback.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

Automatic Generation of IPSec/VPN Security Policies In an Intra-Domain Environment.
Proceedings of the Operations & Management, 2001

2000
Intrusion-detection for incident-response, using a military battlefield-intelligence process.
Comput. Networks, 2000

ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol.
Proceedings of the Networked Planet: Management Beyond 2000, 2000

Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

A property oriented fault detection approach for link state routing protocol.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
Intrusion Detection for an On-Going Attack.
Proceedings of the Recent Advances in Intrusion Detection, Second International Workshop, 1999

DecIdUouS: Decentralized Source Identification for Network-Based Intrusions.
Proceedings of the 1999 IEEE/IFIP International Symposium on Integrated Network Management, 1999

Intrusion detection for link state routing protocol through integrated network management.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
Statistical Anomaly Detection for Link-State Routing Protocols.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

On the Vulnerabilities and Protection of OSPF Routing Protocol.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

An experimental study of insider attacks for OSPF routing protocol.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

1996
Sleepy Network-Layer Authentication Service for IPSEC.
Proceedings of the Computer Security, 1996

1991
An object-based approach to implementing distributed concurrency control.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
MELDing transactions and objects.
Proceedings of the Workshop on Object-based Concurrent Programming, 1990

Multiple concurrency control policies in an object-oriented programming system.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

1989
MELDing Multiple Granularities of Parallelism.
Proceedings of the ECOOP '89: Proceedings of the Third European Conference on Object-Oriented Programming, 1989


  Loading...