Dong, Yingfei
18  results:
Search for persons X
?
1

Impacts of a Single GPS Spoofer on Multiple Receivers: Form..:

, In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC),
Chen, Wenxin ; Dong, Yingfei ; Duan, Zhenhai - p. 127-134 , 2024
 
?
2

Identifying Consumer Drones via Encrypted Traffic:

, In: Proceedings of the IUTAM Symposium on Optimal Guidance and Control for Autonomous Systems 2023; IUTAM Bookseries,
Liang, David ; Dong, Yingfei - p. 65-83 , 2024
 
?
3

Detecting Compromised IoT Devices Using Autoencoders with S..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Mainuddin, Md ; Duan, Zhenhai ; Dong, Yingfei - p. 1344-1351 , 2023
 
?
4

Authenticating Outsourced Location-Based Skyline Queries un..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
Hu, Yidan ; Dong, Yukun ; Chen, Wenxin.. - p. 1-9 , 2023
 
?
5

IoT Device Identification Based on Network Traffic Characte..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
Mainuddin, Md ; Duan, Zhenhai ; Dong, Yingfei.. - p. 6067-6072 , 2022
 
?
6

Compromising Flight Paths of Autopiloted Drones:

, In: 2019 International Conference on Unmanned Aircraft Systems (ICUAS),
Chen, Wenxin ; Dong, Yingfei ; Duan, Zhenhai - p. 1316-1325 , 2019
 
?
7

FileCrypt: Transparent and Scalable Protection of Sensitive..:

, In: 2019 IEEE Conference on Communications and Network Security (CNS),
Han, Peiyi ; Liu, Chuanyi ; Dong, Yingfei... - p. 46-54 , 2019
 
?
8

Manipulating Drone Position Control:

, In: 2019 IEEE Conference on Communications and Network Security (CNS),
 
?
9

Implementation of Chaotic Analysis on Retweet Time Series:

, In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015,
Bao, Yuanyuan ; Yi, Chengqi ; Jiang, Jingchi.. - p. 1225-1231 , 2015
 
?
10

Cascading failures of social networks under attacks:

, In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining,
Yi, Chengqi ; Bao, Yuanyuan ; Jiang, Jingchi.. - p. 679-686 , 2014
 
?
11

A new rumor propagation model and control strategy on socia..:

, In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining,
Bao, Yuanyuan ; Yi, Chengqi ; Xue, Yibo. - p. 1472-1473 , 2013
 
?
12

"Super nodes" in Tor : existence and security implicatio:

, In: Proceedings of the 27th Annual Computer Security Applications Conference,
Li, Chenglong ; Xue, Yibo ; Dong, Yingfei. - p. 217-226 , 2011
 
?
13

Blocking spam by separating end-user machines from legitima..:

, In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference,
 
?
14

Practical distributed voter-verifiable secret ballot system:

, In: Proceedings of the 2009 ACM symposium on Applied Computing,
 
?
15

Session details: Wireless sensor networks symposium: networ..:

, In: Proceedings of the 2007 international conference on Wireless communications and mobile computing,
Dong, Yingfei , 2007
 
1-15