Peng Gao
Peng Gao
Assistant Professor, Department of Computer Science, Virginia Tech
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Sybilfuse: Combining local attributes with global structure to perform robust sybil detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
69*2018
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018
412018
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
322018
Exploiting temporal dynamics in sybil defenses
C Liu, P Gao, M Wright, P Mittal
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
292015
Hyperservice: Interoperability and programmability across heterogeneous blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
152019
DeepIntent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps
S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
142019
Data capsule: A new paradigm for automatic compliance with data privacy regulations
L Wang, JP Near, N Somani, P Gao, A Low, D Dao, D Song
Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 3-23, 2019
112019
Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps
X Xiao, X Wang, Z Cao, H Wang, P Gao
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
102019
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection
P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal
International Conference on Data Engineering (ICDE), 2020
5*2020
A query system for efficiently investigating complex attack behaviors for enterprise security
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
arXiv preprint arXiv:1810.03464, 2018
42018
A system for efficiently hunting for cyber threats in computer systems using threat intelligence
P Gao, F Shao, X Liu, X Xiao, H Liu, Z Qin, F Xu, P Mittal, SR Kulkarni, ...
arXiv preprint arXiv:2101.06761, 2021
22021
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu, P Mittal, SR Kulkarni, D Song
arXiv preprint arXiv:2010.13637, 2020
22020
A System for Automated Open-Source Threat Intelligence Gathering and Management
P Gao, X Liu, E Choi, B Soman, C Mishra, K Farris, D Song
arXiv preprint arXiv:2101.07769, 2021
12021
Detecting Abnormal Behaviors in Smart Home
Y Yu, C Li, MA Jonas, C Ma, FH Shezan, S Shen, P Gao, Y Tian
2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems …, 2019
12019
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies
Y Hu, H Wang, T Ji, X Xiao, X Luo, P Gao, Y Guo
arXiv preprint arXiv:2103.00712, 2021
2021
Effective and Efficient Forensic Analysis via System Monitoring
P Gao
Princeton, NJ: Princeton University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–16