Yifeng Lian

According to our database1, Yifeng Lian authored at least 10 papers between 2008 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks).
计算机科学, 2016

A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2014
Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

VulLocator: Automatically Locating Vulnerable Code in Binary Programs.
Proceedings of the Information Security Practice and Experience, 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

2011
AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A novel vector edge sampling scheme for IP traceback against DDoS attacks.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2008
Game-Theoretical Effectiveness Evaluation of DDoS Defense.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008


  Loading...