Guanhua Yan
Orcid: 0000-0001-7482-4043
According to our database1,
Guanhua Yan
authored at least 81 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EAGLE: Evasion Attacks Guided by Local Explanations Against Android Malware Classification.
IEEE Trans. Dependable Secur. Comput., 2024
PROV5GC: Hardening 5G Core Network Security with Attack Detection and Attribution Based on Provenance Graphs.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
HiP4-UPF: Towards High-Performance Comprehensive 5G User Plane Function on P4 Programmable Switches.
Proceedings of the 2024 USENIX Annual Technical Conference, 2024
2023
Proceedings of the IEEE International Conference on Data Mining, 2023
2022
IoTInfer: Automated Blackbox Fuzz Testing of IoT Network Protocols Guided by Finite State Machine Inference.
IEEE Internet Things J., 2022
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
2021
Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
Paging storm attacks against 4G/LTE networks from regional Android botnets: rationale, practicality, and implications.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Proceedings of the 5th IEEE/ACM Symposium on Edge Computing, 2020
Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Classifying Malware Represented as Control Flow Graphs using Deep Graph Convolutional Neural Network.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018
Emulation-Instrumented Fuzz Testing of 4G/LTE Android Mobile Devices Guided by Reinforcement Learning.
Proceedings of the Computer Security, 2018
Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
2017
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2016
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing.
Proceedings of the Information Security - 19th International Conference, 2016
2015
Be Sensitive to Your Errors: Chaining Neyman-Pearson Criteria for Automated Malware Classification.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Finding common ground among experts' opinions on data clustering: With applications in malware analysis.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Sim-Watchdog: Leveraging Temporal Similarity for Anomaly Detection in Dynamic Graphs.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Peer-to-Peer Netw. Appl., 2013
IEEE J. Sel. Areas Commun., 2013
Containing Viral Spread on Sparse Random Graphs: Bounds, Algorithms, and Experiments.
Internet Math., 2013
Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks.
Comput. Networks, 2013
Comput. Networks, 2013
Discriminant malware distance learning on structuralinformation for automated malware classification.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013
Discriminant malware distance learning on structural information for automated malware classification.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2013
On the impact of social botnets for spam distribution and digital-influence manipulation.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
IEEE Trans. Mob. Comput., 2012
Proceedings of the Web Science 2012, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
On Tuning the Knobs of Distribution-Based Methods for Detecting VoIP Covert Channels.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Winter Simulation Conference 2011, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Measuring the effectiveness of infrastructure-level detection of large-scale botnets.
Proceedings of the 19th International Workshop on Quality of Service, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Malware propagation in online social networks: nature, dynamics, and defense implications.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 2010 Winter Simulation Conference, 2010
Proceedings of the 2010 ACM workshop on Wireless of the students, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
2009
IEEE Trans. Mob. Comput., 2009
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.
Ad Hoc Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009
2008
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the 16th International Workshop on Quality of Service, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of IEEE International Conference on Communications, 2008
Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version).
Simul., 2006
Proceedings of the 14th International Symposium on Modeling, 2006
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
PhD thesis, 2005
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005
2004
ACM Trans. Model. Comput. Simul., 2004
2003
Proceedings of the 35th Winter Simulation Conference: Driving Innovation, 2003
2000
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000