Yingfei Dong
Yingfei Dong
Professor of Computer Engineering, University of Hawaii
Verified email at
Cited by
Cited by
Detecting spam zombies by monitoring outgoing messages
Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker
IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011
Video streaming having controlled quality assurance over best-effort networks
ZL Zhang, Y Dong
US Patent App. 10/421,657, 2004
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
Server-based network performance metrics generation system and method
YT Hou, Y Dong, T Taniguchi
US Patent 6,901,051, 2005
DMTP: Controlling spam through message delivery differentiation
Z Duan, Y Dong, K Gopalan
Computer Networks 51 (10), 2616-2630, 2007
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Z Duan, K Gopalan, Y Dong
SRUTI 5, 25-30, 2005
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
A traceback attack on freenet
G Tian, Z Duan, T Baumeister, Y Dong
IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
Loopback: Exploiting collaborative caches for large-scale streaming
E Kusmierek, Y Dong, DHC Du
IEEE Transactions on Multimedia 8 (2), 233-242, 2006
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
Blocking spam by separating end-user machines from legitimate mail server machines
F Sanchez, Z Duan, Y Dong
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti …, 2011
Understanding forgery properties of spam delivery paths
F Sanchez, Z Duan, Y Dong
Proc. of 7th CEAS, 2010
A novel comprehensive network security assessment approach
C Wang, Y Wang, Y Dong, T Zhang
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
A differentiated message delivery architecture to control spam
Z Duan, Y Dong, K Gopalan
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations
Y Dong, X Du, X Zhang
Computer Communications 21 (5), 470-484, 1998
A routing table insertion (RTI) attack on Freenet
T Baumeister, Y Dong, Z Duan, G Tian
2012 International Conference on Cyber Security, 8-15, 2012
A practical technique to support controlled quality assurance in video streaming across the Internet
Y Dong, R Rohit, Z Zhang
Proc. Packet Video Workshop, 2002
Manipulating drone position control
W Chen, Y Dong, Z Duan
2019 IEEE Conference on Communications and Network Security (CNS), 1-9, 2019
The system can't perform the operation now. Try again later.
Articles 1–20