Containment of Misinformation Spread in Online Social Networks NP Nguyen, G Yan, MT Thai, S Eidenbenz | 203 | 2012 |
Discriminant malware distance learning on structural information for automated malware classification D Kong, G Yan Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013 | 185 | 2013 |
Virusmeter: Preventing your cellphone from spies L Liu, G Yan, X Zhang, S Chen International workshop on recent advances in intrusion detection, 244-264, 2009 | 184 | 2009 |
Fine-grained private matching for proximity-based mobile social networking R Zhang, Y Zhang, J Sun, G Yan 2012 Proceedings IEEE INFOCOM, 1969-1977, 2012 | 155 | 2012 |
Malware propagation in online social networks: nature, dynamics, and defense implications G Yan, G Chen, S Eidenbenz, N Li Proceedings of the 6th acm symposium on information, computer and …, 2011 | 125 | 2011 |
Modeling propagation dynamics of bluetooth worms (extended version) G Yan, S Eidenbenz IEEE transactions on mobile computing 8 (3), 353-368, 2008 | 118 | 2008 |
Simulation of large scale networks using SSF G Yan Proceedings of the 2003 Winter Simulation Conference, 2003. 1, 650-657, 2003 | 111 | 2003 |
Privacy-preserving profile matching for proximity-based mobile social networking R Zhang, J Zhang, Y Zhang, J Sun, G Yan IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013 | 106 | 2013 |
Bottracer: Execution-based bot-like malware detection L Liu, S Chen, G Yan, Z Zhang International Conference on Information Security, 97-113, 2008 | 99 | 2008 |
Chrome Extensions: Threat Analysis and Countermeasures. L Liu, X Zhang, G Yan, S Chen NDSS, 2012 | 96 | 2012 |
Rinse: The real-time immersive network simulation environment for network security exercises M Liljenstam, J Liu, D Nicol, Y Yuan, G Yan, C Grier Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 119-128, 2005 | 96 | 2005 |
Designing a practical access point association protocol F Xu, CC Tan, Q Li, G Yan, J Wu 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 93 | 2010 |
Bluetooth worm propagation: mobility pattern matters! G Yan, HD Flores, L Cuellar, N Hengartner, S Eidenbenz, V Vu Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 91 | 2007 |
Exploring discriminatory features for automated malware classification G Yan, N Brown, D Kong International Conference on Detection of Intrusions and Malware, and …, 2013 | 82 | 2013 |
An event buffer flooding attack in DNP3 controlled SCADA systems D Jin, DM Nicol, G Yan Proceedings of the 2011 Winter Simulation Conference (WSC), 2614-2626, 2011 | 80 | 2011 |
Discrete event fluid modeling of background TCP traffic DM Nicol, G Yan ACM Transactions on Modeling and Computer Simulation (TOMACS) 14 (3), 211-250, 2004 | 60 | 2004 |
Analysis of misinformation containment in online social networks NP Nguyen, G Yan, MT Thai Computer Networks 57 (10), 2133-2146, 2013 | 57 | 2013 |
Detecting selfish exploitation of carrier sensing in 802.11 networks K Pelechrinis, G Yan, S Eidenbenz, SV Krishnamurthy IEEE INFOCOM 2009, 657-665, 2009 | 57 | 2009 |
Towards a Bayesian network game framework for evaluating DDoS attacks and defense G Yan, R Lee, A Kent, D Wolpert Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 53 | 2012 |
On the effectiveness of structural detection and defense against P2P-based botnets DT Ha, G Yan, S Eidenbenz, HQ Ngo 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 51 | 2009 |