Yan, Guanhua
660  Ergebnisse:
Personensuche X
?
2

EAGLE: Evasion Attacks Guided by Local Explanations against..:

Shu, Zhan ; Yan, Guanhua
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
3

PROV5GC: Hardening 5G Core Network Security with Attack Det..:

, In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Pacherkar, Harsh Sanjay ; Yan, Guanhua - p. 254-264 , 2024
 
?
4

Debugging Malware Classification Models Based on Event Logs..:

, In: 2023 IEEE International Conference on Data Mining Workshops (ICDMW),
Gwak, Joon-Young ; Wakodikar, Priti ; Wang, Meng... - p. 939-948 , 2023
 
?
7

CFGExplainer: Explaining Graph Neural Network-Based Malware..:

, In: 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
 
?
8

VET5G: A Virtual End-to-End Testbed for 5G Network Security..:

, In: Proceedings of the 15th Workshop on Cyber Security Experimentation and Test,
 
?
9

Real-Time Evasion Attacks against Deep Learning-Based Anoma..:

, In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy,
Herath, J. Dinal ; Yang, Ping ; Yan, Guanhua - p. 29-40 , 2021
 
?
11

Deceiving Portable Executable Malware Classifiers into Targ..:

, In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy,
Kucuk, Yunus ; Yan, Guanhua - p. 341-352 , 2020
 
?
12

Paging storm attacks against 4G/LTE networks from regional ..:

, In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Fang, Kaiming ; Yan, Guanhua - p. 295-305 , 2020
 
?
14

RAMP: Real-Time Anomaly Detection in Scientific Workflows:

, In: 2019 IEEE International Conference on Big Data (Big Data),
Dinal Herath, J. ; Bai, Changxin ; Yan, Guanhua.. - p. 1367-1374 , 2019
 
?
15

SciBlock: A Blockchain-Based Tamper-Proof Non-Repudiable St..:

, In: 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC),
 
1-15