Peng Gao
Orcid: 0000-0002-9342-9863Affiliations:
- Virginia Tech, Department of Computer Science, Blacksburg, VA, USA
- University of California Berkeley, CA, USA (2019 - 2021)
- Princeton University, NJ, USA (PhD 2019)
According to our database1,
Peng Gao
authored at least 31 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CTINEXUS: Leveraging Optimized LLM In-Context Learning for Constructing Cybersecurity Knowledge Graphs Under Data Scarcity.
CoRR, 2024
P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
<i>ThreatKG: </i> An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
2023
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management.
CoRR, 2022
Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
2021
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2015
CoRR, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015