Detecting spam zombies by monitoring outgoing messages Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011 | 129 | 2011 |
An novel hybrid method for effectively classifying encrypted traffic GL Sun, Y Xue, Y Dong, D Wang, C Li 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 105 | 2010 |
Video streaming having controlled quality assurance over best-effort networks ZL Zhang, Y Dong US Patent App. 10/421,657, 2004 | 104 | 2004 |
Server-based network performance metrics generation system and method YT Hou, Y Dong, T Taniguchi US Patent 6,901,051, 2005 | 64 | 2005 |
DMTP: Controlling spam through message delivery differentiation Z Duan, Y Dong, K Gopalan Computer Networks 51 (10), 2616-2630, 2007 | 48 | 2007 |
A new rumor propagation model and control strategy on social networks Y Bao, C Yi, Y Xue, Y Dong Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 46 | 2013 |
A traceback attack on freenet G Tian, Z Duan, T Baumeister, Y Dong IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015 | 44 | 2015 |
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic. Z Duan, K Gopalan, Y Dong SRUTI 5, 25-30, 2005 | 43 | 2005 |
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications G Wang, C Liu, Y Dong, P Han, H Pan, B Fang IEEE Access 6, 2908-2921, 2017 | 39 | 2017 |
Characterizing application behaviors for classifying p2p traffic D Wang, L Zhang, Z Yuan, Y Xue, Y Dong 2014 International Conference on Computing, Networking and Communications …, 2014 | 35 | 2014 |
Loopback: Exploiting collaborative caches for large-scale streaming E Kusmierek, Y Dong, DHC Du IEEE Transactions on Multimedia 8 (2), 233-242, 2006 | 35 | 2006 |
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time D Wang, L He, Y Xue, Y Dong 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012 | 26 | 2012 |
Blocking spam by separating end-user machines from legitimate mail server machines F Sanchez, Z Duan, Y Dong Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011 | 24 | 2011 |
A novel comprehensive network security assessment approach C Wang, Y Wang, Y Dong, T Zhang 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 24 | 2011 |
Understanding forgery properties of spam delivery paths F Sanchez, Z Duan, Y Dong Proc. of 7th CEAS, 2010 | 23 | 2010 |
Manipulating drone position control W Chen, Y Dong, Z Duan 2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019 | 22 | 2019 |
A differentiated message delivery architecture to control spam Z Duan, Y Dong, K Gopalan 11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005 | 22 | 2005 |
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations Y Dong, X Du, X Zhang Computer Communications 21 (5), 470-484, 1998 | 21 | 1998 |
Leakage models and inference attacks on searchable encryption for cyber-physical social systems G Wang, C Liu, Y Dong, KKR Choo, P Han, H Pan, B Fang IEEE Access 6, 21828-21839, 2018 | 20 | 2018 |
A routing table insertion (RTI) attack on Freenet T Baumeister, Y Dong, Z Duan, G Tian 2012 International Conference on Cyber Security, 8-15, 2012 | 20 | 2012 |