Peng Gao
Orcid: 0000-0002-9342-9863Affiliations:
- Virginia Tech, Department of Computer Science, Blacksburg, VA, USA
- University of California Berkeley, CA, USA (2019 - 2021)
- Princeton University, NJ, USA (PhD 2019)
According to our database1,
Peng Gao
authored at least 27 papers
between 2015 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022
Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2015
CoRR, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015