Peng Gao

Orcid: 0000-0002-9342-9863

Affiliations:
  • Virginia Tech, Department of Computer Science, Blacksburg, VA, USA
  • University of California Berkeley, CA, USA (2019 - 2021)
  • Princeton University, NJ, USA (PhD 2019)


According to our database1, Peng Gao authored at least 27 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023

PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022

Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation.
CoRR, 2022

PrivGuard: Privacy Regulation Compliance Made Easier.
Proceedings of the 31st USENIX Security Symposium, 2022

Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

A Knowledge Base Question Answering System for Cyber Threat Knowledge Acquisition.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
A System for Automated Open-Source Threat Intelligence Gathering and Management.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Effective and Efficient Forensic Analysis via System Monitoring
PhD thesis, 2019

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2015
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection.
CoRR, 2015

Exploiting Temporal Dynamics in Sybil Defenses.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...