Follow
Yingfei Dong
Yingfei Dong
Professor of Computer Engineering, University of Hawaii
Verified email at hawaii.edu
Title
Cited by
Cited by
Year
Detecting spam zombies by monitoring outgoing messages
Z Duan, P Chen, F Sanchez, Y Dong, M Stephenson, JM Barker
IEEE Transactions on dependable and secure computing 9 (2), 198-210, 2011
1212011
Video streaming having controlled quality assurance over best-effort networks
ZL Zhang, Y Dong
US Patent App. 10/421,657, 2004
942004
An novel hybrid method for effectively classifying encrypted traffic
GL Sun, Y Xue, Y Dong, D Wang, C Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
912010
Server-based network performance metrics generation system and method
YT Hou, Y Dong, T Taniguchi
US Patent 6,901,051, 2005
552005
DMTP: Controlling spam through message delivery differentiation
Z Duan, Y Dong, K Gopalan
Computer Networks 51 (10), 2616-2630, 2007
462007
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic.
Z Duan, K Gopalan, Y Dong
SRUTI 5, 25-30, 2005
402005
A new rumor propagation model and control strategy on social networks
Y Bao, C Yi, Y Xue, Y Dong
2013 IEEE/ACM International Conference on Advances in Social Networks …, 2013
392013
A traceback attack on freenet
G Tian, Z Duan, T Baumeister, Y Dong
IEEE Transactions on Dependable and Secure Computing 14 (3), 294-307, 2015
382015
IDCrypt: A multi-user searchable symmetric encryption scheme for cloud applications
G Wang, C Liu, Y Dong, P Han, H Pan, B Fang
IEEE Access 6, 2908-2921, 2017
332017
Loopback: Exploiting collaborative caches for large-scale streaming
E Kusmierek, Y Dong, DHC Du
IEEE Transactions on Multimedia 8 (2), 233-242, 2006
322006
Exploiting Artificial Immune systems to detect unknown DoS attacks in real-time
D Wang, L He, Y Xue, Y Dong
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence …, 2012
242012
Blocking spam by separating end‐user machines from legitimate mail server machines
F Sanchez, Z Duan, Y Dong
Security and Communication Networks 9 (4), 316-326, 2016
232016
Understanding forgery properties of spam delivery paths
F Sanchez, Z Duan, Y Dong
Proc. of 7th CEAS, 2010
232010
Characterizing application behaviors for classifying p2p traffic
D Wang, L Zhang, Z Yuan, Y Xue, Y Dong
2014 International Conference on Computing, Networking and Communications …, 2014
222014
A novel comprehensive network security assessment approach
C Wang, Y Wang, Y Dong, T Zhang
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
222011
Characterizing and scheduling communication interactions of parallel and local jobs on networks of workstations
Y Dong, X Du, X Zhang
Computer Communications 21 (5), 470-484, 1998
201998
A routing table insertion (RTI) attack on Freenet
T Baumeister, Y Dong, Z Duan, G Tian
2012 International Conference on Cyber Security, 8-15, 2012
182012
A differentiated message delivery architecture to control spam
Z Duan, Y Dong, K Gopalan
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
152005
A practical technique to support controlled quality assurance in video streaming across the Internet
Y Dong, R Rohit, ZL Zhang
Proc. Packet Video Workshop, 2002
152002
A hybrid client-assisted streaming architecture: Modeling and analysis
Y Dong, E Kusmierek, Z Duan, D Du
Proceedings of the Eighth IASTED International Conference on Internet and …, 2004
142004
The system can't perform the operation now. Try again later.
Articles 1–20