Yu-Sung Wu

Orcid: 0000-0002-9219-4804

According to our database1, Yu-Sung Wu authored at least 37 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reliability Engineering in a Time of Rapidly Converging Technologies.
IEEE Trans. Reliab., March, 2024

Demystify the Fuzzing Methods: A Comprehensive Survey.
ACM Comput. Surv., March, 2024

Neural Network-based Functional Degradation for Cyber-Physical Systems.
Proceedings of the 24th IEEE International Conference on Software Quality, 2024

2023
Pervasive Micro Information Flow Tracking.
IEEE Trans. Dependable Secur. Comput., 2023

Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events.
J. Netw. Syst. Manag., 2022

In-Vivo Fuzz Testing for Network Services.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

Linux Kernel Module Development with Rust.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Identification of data propagation paths for efficient dynamic information flow tracking.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

POSTER: Data Leakage Detection for Health Information System based on Memory Introspection.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Online and offline communication architecture for vehicular ad-hoc networks using NS3 and SUMO simulators.
J. High Speed Networks, 2019

2018
Phrase Search for Encrypted Cloud Storage.
J. Inf. Sci. Eng., 2018

Hypervisor-Based Sensitive Data Leakage Detector.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Semantic Failover in Software-Defined Networking.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Enforcing Enterprise Mobile Application Security Policy with Plugin Framework.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

2017
Application Execution Time Prediction for Effective CPU Provisioning in Virtualization Environment.
IEEE Trans. Parallel Distributed Syst., 2017

FUSION: A unified application model for virtual mobile infrastructure.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Network Performance Bottleneck Detection and Maximum Network Throughput Estimation for Datacenter Applications.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Smartphone Virtualization.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

2015
Towards consistent software defined networking with logic programming.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment.
Secur. Commun. Networks, 2014

Preserving user query privacy in cloud-based security services.
J. Comput. Secur., 2014

Automatic Analysis and Classification of Obfuscated Bot Binaries.
Int. J. Netw. Secur., 2014

Active versus Passive Malware Collection.
Computer, 2014

MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Application dependency tracing for message oriented middleware.
Proceedings of the 16th Asia-Pacific Network Operations and Management Symposium, 2014

2013
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

EagleEye: Towards mandatory security monitoring in virtualized datacenter environment.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2009
Intrusion detection in voice over IP environments.
Int. J. Inf. Sec., 2009

Spam detection in voice-over-IP calls through semi-supervised clustering.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2007
Automated adaptive intrusion containment in systems of interacting services.
Comput. Networks, 2007

2005
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003


  Loading...