Seuraa
Peng Gao
Peng Gao
Assistant Professor, Department of Computer Science, Virginia Tech
Vahvistettu sähköpostiosoite verkkotunnuksessa vt.edu - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Hyperservice: Interoperability and programmability across heterogeneous blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1282019
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018
1082018
Enabling efficient cyber threat hunting with cyber threat intelligence
P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu, P Mittal, SR Kulkarni, D Song
2021 IEEE 37th International Conference on Data Engineering (ICDE), 193-204, 2021
1062021
Make web3. 0 connected
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu
IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021
832021
{AIQL}: Enabling efficient attack investigation from system monitoring data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
822018
Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps
X Xiao, X Wang, Z Cao, H Wang, P Gao
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
652019
Deepintent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps
S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
592019
Sybilfuse: Combining local attributes with global structure to perform robust sybil detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
552018
Data capsule: A new paradigm for automatic compliance with data privacy regulations
L Wang, JP Near, N Somani, P Gao, A Low, D Dao, D Song
Heterogeneous Data Management, Polystores, and Analytics for Healthcare …, 2019
542019
Sybilframe: A defense-in-depth framework for structure-based sybil detection
P Gao, NZ Gong, S Kulkarni, K Thomas, P Mittal
arXiv preprint arXiv:1503.02985, 2015
532015
Exploiting temporal dynamics in sybil defenses
C Liu, P Gao, M Wright, P Mittal
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
402015
{Back-Propagating} system dependency impact for attack investigation
P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao
31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022
382022
A system for automated open-source threat intelligence gathering and management
P Gao, X Liu, E Choi, B Soman, C Mishra, K Farris, D Song
Proceedings of the 2021 International conference on management of data, 2716 …, 2021
322021
{PrivGuard}: Privacy regulation compliance made easier
L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ...
31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022
232022
Champ: Characterizing undesired app behaviors from user comments based on market policies
Y Hu, H Wang, T Ji, X Xiao, X Luo, P Gao, Y Guo
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
192021
A system for efficiently hunting for cyber threats in computer systems using threat intelligence
P Gao, F Shao, X Liu, X Xiao, H Liu, Z Qin, F Xu, P Mittal, SR Kulkarni, ...
2021 IEEE 37th International Conference on Data Engineering (ICDE), 2705-2708, 2021
172021
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection
P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal
International Conference on Data Engineering (ICDE), 2020
12*2020
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
arXiv preprint arXiv:1810.03464, 2018
102018
Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management
P Gao, X Liu, E Choi, S Ma, X Yang, Z Ji, Z Zhang, D Song
arXiv preprint arXiv:2212.10388, 2022
72022
Zebra: Deeply integrating system-level provenance search and tracking for efficient attack investigation
X Yang, H Liu, Z Wang, P Gao
arXiv preprint arXiv:2211.05403, 2022
72022
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20