Yingfei Dong

Orcid: 0000-0003-2371-1043

According to our database1, Yingfei Dong authored at least 74 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impacts of a Single GPS Spoofer on Multiple Receivers: Formal Analysis and Experimental Evaluation.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
DPM: Towards Accurate Drone Position Manipulation.
IEEE Trans. Dependable Secur. Comput., 2023

Authenticating Outsourced Location-Based Skyline Queries under Shortest Path Distance.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
IoT Device Identification Based on Network Traffic Characteristics.
Proceedings of the IEEE Global Communications Conference, 2022

Accurately Redirecting a Malicious Drone.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
Network Traffic Characteristics of IoT Devices in Smart Homes.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2019
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Manipulating Drone Position Control.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

Poster abstract: Homophily and controversy: On the role of public opinion in online viral diffusion.
Proceedings of the IEEE INFOCOM 2018, 2018

Attacking altitude estimation in drone navigation.
Proceedings of the IEEE INFOCOM 2018, 2018

Identifying Influential Factors of CDN Performance with Large-scale Data Analysis.
Proceedings of the 2018 International Conference on Computing, 2018

Manipulating Drone Dynamic State Estimation to Compromise Navigation.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Traceback Attack on Freenet.
IEEE Trans. Dependable Secur. Comput., 2017

A Multisecret Value Access Control Framework for Airliner in Multinational Air Traffic Management.
IEEE Internet Things J., 2017

SafeBox: A scheme for searching and sharing encrypted data in cloud applications.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge.
Proceedings of the Security and Privacy in Communication Networks, 2017

Understanding IP address multiplexing with large-scale SSL/TLS flow analysis.
Proceedings of the 2017 International Conference on Computing, 2017

Cyber attacks on remote relays in smart grid.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Blocking spam by separating end-user machines from legitimate mail server machines.
Secur. Commun. Networks, 2016

Towards secure identity management for the smart grid.
Secur. Commun. Networks, 2016

ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Precise Modeling Rumor Propagation and Control Strategy on Social Networks.
Proceedings of the Applications of Social Media and Social Network Analysis, 2015

Effective deployment of monitoring points on social networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Implementation of Chaotic Analysis on Retweet Time Series.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Characterizing Application Behaviors for classifying P2P traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Utilizing path dynamics for delay assurance in synchronized multihop scheduling.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Reroute on loop in anonymous peer-to-peer content sharing networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Cascading failures of social networks under attacks.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Effectively auditing IaaS cloud servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Thwarting traceback attack on Freenet.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Using randomized routing to counter routing table insertion attack on Freenet.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Harvesting unique characteristics in packet sequences for effective application classification.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A new rumor propagation model and control strategy on social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Detecting Spam Zombies by Monitoring Outgoing Messages.
IEEE Trans. Dependable Secur. Comput., 2012

Relay recommendation system (RRS) and selective anonymity for tor.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A Routing Table Insertion (RTI) Attack on Freenet.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Preface.
Theor. Comput. Sci., 2011

Anomaly Detection Using Neighborhood Negative Selection.
Intell. Autom. Soft Comput., 2011

A Novel Comprehensive Network Security Assessment Approach.
Proceedings of IEEE International Conference on Communications, 2011

Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores.
Proceedings of the Global Communications Conference, 2011

"Super nodes" in Tor: existence and security implication.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
StatStream: providing statistical reliability guarantees in peer-to-peer live video streaming.
Int. J. Adv. Media Commun., 2010

Novel dynamic delay allocation adjustment for improving bandwidth efficiency.
Comput. Commun., 2010

An Novel Hybrid Method for Effectively Classifying Encrypted Traffic.
Proceedings of the Global Communications Conference, 2010

HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic.
Proceedings of the Global Communications Conference, 2010

2009
Practical distributed voter-verifiable secret ballot system.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Intelligently Balancing Per-Hop Delay Allocation to Improve Network Utilization.
Proceedings of IEEE International Conference on Communications, 2008

2007
Full-sharing: efficient bandwidth scheduling for video streaming over broadband cable networks (BCNs).
Multim. Tools Appl., 2007

DMTP: Controlling spam through message delivery differentiation.
Comput. Networks, 2007

Efficient Placement Schemes to Fully Utilize Peer Upstream Bandwidth.
Proceedings of IEEE International Conference on Communications, 2007

2006
Loopback: exploiting collaborative caches for large-scale streaming.
IEEE Trans. Multim., 2006

Optimal Scheduling and Adaptation for VOD Service on Broadband Cable Networks.
IEICE Trans. Commun., 2006

LIPS: A lightweight permit system for packet source origin accountability.
Comput. Networks, 2006

Distributed Active Filtering for Protecting Critical Servers.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Providing Controlled Quality Assurance for Streaming Stored-Videos Across the Internet Using VPNs.
Multim. Tools Appl., 2005

LIPS: Lightweight Internet Permit System for Stopping Unwanted Packets.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

A Differentiated Message Delivery Architecture to Control Spam.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

2004
A security framework for protecting traffic between collaborative domains.
Microprocess. Microsystems, 2004

Secure Name Service: A Framework for Protecting Critical Internet Resources.
Proceedings of the NETWORKING 2004, 2004

2003
Maximizing the profit of VOD service on broadband cable networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Server-Based Dynamic Server Selection Algorithms.
Proceedings of the Information Networking, 2002

Optimized Upstream Scheduling in Broadband Cable Networks.
Proceedings of the 10th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2002), August 21, 2002

2001
Architectural Effects of Symmetric Multiprocessors on TPC-C Commercial Workload.
J. Parallel Distributed Comput., 2001

1999
A Server-Based Non-Intrusive Measurement Infrastructure for Enterprise Networks.
Perform. Evaluation, 1999

1998
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations.
Comput. Commun., 1998

1997
Characterizing Communication Interactions of Parallel and Sequential Jobs on Networks of Workstations.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997

Effectively Scheduling Parallel Tasks and Communications on Networks of Workstations.
Proceedings of the Euro-Par '97 Parallel Processing, 1997


  Loading...