Dong, Yingfei
93  results:
Search for persons X
?
2

Impacts of a Single GPS Spoofer on Multiple Receivers: Form..:

, In: 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC),
Chen, Wenxin ; Dong, Yingfei ; Duan, Zhenhai - p. 127-134 , 2024
 
?
3

Identifying Consumer Drones via Encrypted Traffic:

, In: Proceedings of the IUTAM Symposium on Optimal Guidance and Control for Autonomous Systems 2023; IUTAM Bookseries,
Liang, David ; Dong, Yingfei - p. 65-83 , 2024
 
?
4

Detecting Compromised IoT Devices Using Autoencoders with S..:

, In: 2023 IEEE International Conference on Big Data (BigData),
Mainuddin, Md ; Duan, Zhenhai ; Dong, Yingfei - p. 1344-1351 , 2023
 
?
6

DPM: Towards Accurate Drone Position Manipulation:

Chen, Wenxin ; Dong, Yingfei ; Duan, Zhenhai
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  1 - p. 813-826 , 2023
 
?
7

Authenticating Outsourced Location-Based Skyline Queries un..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
Hu, Yidan ; Dong, Yukun ; Chen, Wenxin.. - p. 1-9 , 2023
 
?
8

IoT Device Identification Based on Network Traffic Characte..:

, In: GLOBECOM 2022 - 2022 IEEE Global Communications Conference,
Mainuddin, Md ; Duan, Zhenhai ; Dong, Yingfei.. - p. 6067-6072 , 2022
 
?
9

Strigolactone maintains strawberry quality by regulating ph..:

Huang, Dandan ; Wang, Yuanyi ; Zhang, Dingchuan...
Postharvest Biology and Technology.  178 (2021)  - p. 111546 , 2021
 
?
10

Compromising Flight Paths of Autopiloted Drones:

, In: 2019 International Conference on Unmanned Aircraft Systems (ICUAS),
Chen, Wenxin ; Dong, Yingfei ; Duan, Zhenhai - p. 1316-1325 , 2019
 
?
11

Manipulating Drone Position Control:

, In: 2019 IEEE Conference on Communications and Network Security (CNS),
 
?
12

FileCrypt: Transparent and Scalable Protection of Sensitive..:

, In: 2019 IEEE Conference on Communications and Network Security (CNS),
Han, Peiyi ; Liu, Chuanyi ; Dong, Yingfei... - p. 46-54 , 2019
 
?
13

Implementation of Chaotic Analysis on Retweet Time Series:

, In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015,
Bao, Yuanyuan ; Yi, Chengqi ; Jiang, Jingchi.. - p. 1225-1231 , 2015
 
?
14

A Traceback Attack on Freenet:

Tian, Guanyu ; Duan, Zhenhai ; Baumeister, Todd.
IEEE Transactions on Dependable and Secure Computing.  , 2015
 
?
15

Cascading failures of social networks under attacks:

, In: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining,
Yi, Chengqi ; Bao, Yuanyuan ; Jiang, Jingchi.. - p. 679-686 , 2014
 
1-15