2024 2024 IoTJ DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management Ao Liu, Jing Chen, Kun He, Ruiying Du, Jiahua Xu, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma IEEE Internet of Things Journal, Nov 2024 Bib HTML PDF @article{liu2024dynashard, author = {Liu, Ao and Chen, Jing and He, Kun and Du, Ruiying and Xu, Jiahua and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng}, journal = {IEEE Internet of Things Journal}, title = {DYNASHARD: Secure and Adaptive Blockchain Sharding Protocol With Hybrid Consensus and Dynamic Shard Management}, year = {2024}, volume = {}, number = {}, pages = {1-1}, month = nov, doi = {10.1109/JIOT.2024.3490036} } arXiv Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning Wei Qiao, Yebo Feng, Teng Li, Zijian Zhang, Zhengzi Xu, Zhuo Ma, Yulong Shen, JianFeng Ma, and Yang Liu Oct 2024 Bib HTML PDF @misc{qiao2024slotprovenancedrivenaptdetection, doi = {10.48550/arXiv.2410.17910}, title = {Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning}, author = {Qiao, Wei and Feng, Yebo and Li, Teng and Zhang, Zijian and Xu, Zhengzi and Ma, Zhuo and Shen, Yulong and Ma, JianFeng and Liu, Yang}, year = {2024}, month = oct, eprint = {2410.17910}, archiveprefix = {arXiv}, primaryclass = {cs.CR}, url = {https://arxiv.org/abs/2410.17910} } IoTJ HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning Ao Liu, Jing Chen, Ruiying Du, Cong Wu, Yebo Feng, Teng Li, and Jianfeng Ma IEEE Internet of Things Journal, Oct 2024 Bib HTML PDF @article{liu2024heterosample, author = {Liu, Ao and Chen, Jing and Du, Ruiying and Wu, Cong and Feng, Yebo and Li, Teng and Ma, Jianfeng}, journal = {IEEE Internet of Things Journal}, title = {HETEROSAMPLE: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning}, year = {2024}, volume = {}, number = {}, pages = {1-1}, month = oct, doi = {10.1109/JIOT.2024.3484996} } GLOBECOM 24 Heuristic-based Parsing System for Big Data Log Teng Li, Shengkai Zhang, Yebo Feng, Jiahua Xu, Zhuo Ma, Yulong Shen, and Jianfeng Ma In 2024 IEEE Global Communications Conference, Dec 2024 Bib @inproceedings{li2024logparser, author = {Li, Teng and Zhang, Shengkai and Feng, Yebo and Xu, Jiahua and Ma, Zhuo and Shen, Yulong and Ma, Jianfeng}, booktitle = {2024 IEEE Global Communications Conference}, title = {Heuristic-based Parsing System for Big Data Log}, month = dec, year = {2024} } ISSTA 24 DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications Maoyi Xie, Ming Hu, Ziqiao Kong, Cen Zhang, Yebo Feng, Haijun Wang, Yue Xue, Hao Zhang, Ye Liu, and Yang Liu In Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, Sep 2024 Bib HTML PDF @inproceedings{xie2024defort, doi = {10.1145/3650212.3652137}, author = {Xie, Maoyi and Hu, Ming and Kong, Ziqiao and Zhang, Cen and Feng, Yebo and Wang, Haijun and Xue, Yue and Zhang, Hao and Liu, Ye and Liu, Yang}, title = {DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications}, year = {2024}, isbn = {9798400706127}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3650212.3652137}, booktitle = {Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis}, pages = {402-414}, numpages = {13}, keywords = {blockchain, decentralized finance (DeFi), price manipulation attack, smart contract}, location = {Vienna, Austria}, month = sep, series = {ISSTA 2024} } arXiv Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains Hanze Guo, Yebo Feng, Cong Wu, Zengpeng Li, and Jiahua Xu Sep 2024 Bib HTML PDF @misc{guo2024benchmarkingzkfriendlyhashfunctions, doi = {10.48550/arXiv.2409.01976}, title = {Benchmarking ZK-Friendly Hash Functions and SNARK Proving Systems for EVM-compatible Blockchains}, author = {Guo, Hanze and Feng, Yebo and Wu, Cong and Li, Zengpeng and Xu, Jiahua}, year = {2024}, eprint = {2409.01976}, archiveprefix = {arXiv}, primaryclass = {cs.CR}, url = {https://arxiv.org/abs/2409.01976} } arXiv Eliminating Backdoors in Neural Code Models via Trigger Inversion Weisong Sun, Yuchen Chen, Chunrong Fang, Yebo Feng, Yuan Xiao, An Guo, Quanjun Zhang, Yang Liu, Baowen Xu, and Zhenyu Chen Sep 2024 Bib HTML PDF @misc{sun2024eliminatingbackdoorsneuralcode, doi = {10.48550/arXiv.2408.04683}, title = {Eliminating Backdoors in Neural Code Models via Trigger Inversion}, author = {Sun, Weisong and Chen, Yuchen and Fang, Chunrong and Feng, Yebo and Xiao, Yuan and Guo, An and Zhang, Quanjun and Liu, Yang and Xu, Baowen and Chen, Zhenyu}, year = {2024}, eprint = {2408.04683}, archiveprefix = {arXiv}, primaryclass = {cs.CR}, url = {https://arxiv.org/abs/2408.04683} } TDSC On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic Yebo Feng, Jun Li, Devkishen Sisodia, and Peter Reiher IEEE Transactions on Dependable and Secure Computing, Jul 2024 Bib HTML PDF @article{feng2024ddosdetection, author = {Feng, Yebo and Li, Jun and Sisodia, Devkishen and Reiher, Peter}, journal = {IEEE Transactions on Dependable and Secure Computing}, title = {On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic}, year = {2024}, month = jul, volume = {21}, number = {4}, pages = {2211-2226}, keywords = {Computer crime;Denial-of-service attack;Adaptation models;Telecommunication traffic;Machine learning;Training data;Principal component analysis;Anomaly detection;DDoS detection;distributed denial -of- service (DDoS);explainable machine learning;K-nearest neighbors (KNN);principal component analysis (PCA);traffic analysis}, doi = {10.1109/TDSC.2023.3301293} } ASIACCS 24 SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks Sanidhay Arora, Yingjiu Li, Yebo Feng, and Jiahua Xu In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Jul 2024 Bib HTML PDF @inproceedings{arora2024secplf, author = {Arora, Sanidhay and Li, Yingjiu and Feng, Yebo and Xu, Jiahua}, title = {SecPLF: Secure Protocols for Loanable Funds against Oracle Manipulation Attacks}, year = {2024}, month = jul, isbn = {9798400704826}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3634737.3637681}, doi = {10.1145/3634737.3637681}, booktitle = {Proceedings of the 19th ACM Asia Conference on Computer and Communications Security}, pages = {1394-1405}, numpages = {12}, location = {Singapore, Singapore}, series = {ASIA CCS '24} } arXiv How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study Chong Wang, Kaifeng Huang, Jian Zhang, Yebo Feng, Lyuye Zhang, Yang Liu, and Xin Peng Jun 2024 Bib HTML PDF @misc{wang2024llms, doi = {10.48550/arXiv.2406.09834}, url = {https://arxiv.org/abs/2406.09834}, title = {How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study}, author = {Wang, Chong and Huang, Kaifeng and Zhang, Jian and Feng, Yebo and Zhang, Lyuye and Liu, Yang and Peng, Xin}, year = {2024}, month = jun, eprint = {2406.09834}, archiveprefix = {arXiv}, primaryclass = {id='cs.SE' full_name='Software Engineering' is_active=True alt_name=None in_archive='cs' is_general=False description='Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.'} } SCIS CToMP: a cycle-task-oriented memory protection scheme for unmanned systems Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, and Jianfeng Ma Science China Information Sciences, May 2024 Bib HTML PDF @article{ma2024ctomp, author = {Ma, Chengyan and Xi, Ning and Lu, Di and Feng, Yebo and Ma, Jianfeng}, date = {2024/05/21}, date-added = {2024-05-31 13:36:14 +0800}, date-modified = {2024-05-31 13:36:14 +0800}, isbn = {1869-1919}, journal = {Science China Information Sciences}, number = {6}, pages = {162305}, title = {CToMP: a cycle-task-oriented memory protection scheme for unmanned systems}, url = {https://doi.org/10.1007/s11432-023-3865-0}, doi = {10.1007/s11432-023-3865-0}, volume = {67}, year = {2024}, month = may, bdsk-url-1 = {https://doi.org/10.1007/s11432-023-3865-0} } arXiv Piercing the Veil of TVL: DeFi Reappraised Yichen Luo, Yebo Feng, Jiahua Xu, and Paolo Tasca Apr 2024 Bib HTML PDF @misc{luo2024piercing, doi = {10.48550/arXiv.2404.11745}, url = {https://arxiv.org/abs/2404.11745}, title = {Piercing the Veil of TVL: DeFi Reappraised}, author = {Luo, Yichen and Feng, Yebo and Xu, Jiahua and Tasca, Paolo}, year = {2024}, month = apr, eprint = {2404.11745}, archiveprefix = {arXiv}, primaryclass = {q-fin.GN} } arXiv EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, and Cong Wu Apr 2024 Bib HTML PDF @misc{sun2024earpasssecureimplicitreceiver, doi = {10.48550/arXiv.2404.15000}, title = {EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing}, author = {Sun, Xiping and Chen, Jing and He, Kun and He, Zhixiang and Du, Ruiying and Feng, Yebo and Zhao, Qingchuan and Wu, Cong}, year = {2024}, month = apr, eprint = {2404.15000}, archiveprefix = {arXiv}, primaryclass = {cs.CR}, url = {https://arxiv.org/abs/2404.15000} } arXiv MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, and Xianhao Chen Apr 2024 Bib HTML PDF @misc{sun2024magliverobustvoiceliveness, doi = {10.48550/arXiv.2404.01106}, title = {MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes}, author = {Sun, Xiping and Chen, Jing and Wu, Cong and He, Kun and Xu, Haozhe and Feng, Yebo and Du, Ruiying and Chen, Xianhao}, year = {2024}, month = apr, eprint = {2404.01106}, archiveprefix = {arXiv}, primaryclass = {cs.CR}, url = {https://arxiv.org/abs/2404.01106} } arXiv On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, and Zhenyu Chen Mar 2024 Bib HTML PDF @misc{han2024backdoors, doi = {10.48550/arXiv.2403.03846}, url = {https://arxiv.org/abs/2403.03846}, title = {On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder}, author = {Han, Tingxu and Huang, Shenghan and Ding, Ziqi and Sun, Weisong and Feng, Yebo and Fang, Chunrong and Li, Jun and Qian, Hanwei and Wu, Cong and Zhang, Quanjun and Liu, Yang and Chen, Zhenyu}, year = {2024}, eprint = {2403.03846}, archiveprefix = {arXiv}, primaryclass = {cs.LG}, month = mar } TechRxiv CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ju Jia, Yebo Feng, Congrui Chen, and Ruiying Du Feb 2024 Bib HTML PDF @article{Gu_2024, title = {CSIPose: Unveiling Body Pose Using Commodity WiFi Devices Through the Wall}, url = {http://dx.doi.org/10.36227/techrxiv.170775475.59127516/v1}, doi = {10.36227/techrxiv.170775475.59127516/v1}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, author = {Gu, Yangyang and Chen, Jing and Wu, Cong and He, Kun and Jia, Ju and Feng, Yebo and Chen, Congrui and Du, Ruiying}, year = {2024}, month = feb } arXiv Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation Chong Wang, Jian Zhang, Yebo Feng, Tianlin Li, Weisong Sun, Yang Liu, and Xin Peng Jan 2024 Bib HTML PDF @misc{wang2024teaching, doi = {10.48550/arXiv.2401.06391}, url = {https://arxiv.org/abs/2401.06391}, title = {Teaching Code LLMs to Use Autocompletion Tools in Repository-Level Code Generation}, author = {Wang, Chong and Zhang, Jian and Feng, Yebo and Li, Tianlin and Sun, Weisong and Liu, Yang and Peng, Xin}, year = {2024}, month = jan, eprint = {2401.06391}, archiveprefix = {arXiv}, primaryclass = {cs.SE} } 2023 2023 arXiv Automated Market Maker on the XRP Ledger Firas Dahi, Walter Hernandez, Yebo Feng, Jiahua Xu, Aanchal Malhotra, and Paolo Tasca Dec 2023 Bib HTML PDF @misc{dahi2023automated, doi = {10.48550/arXiv.2312.13749}, url = {https://arxiv.org/abs/2312.13749}, title = {Automated Market Maker on the XRP Ledger}, author = {Dahi, Firas and Hernandez, Walter and Feng, Yebo and Xu, Jiahua and Malhotra, Aanchal and Tasca, Paolo}, year = {2023}, month = dec, eprint = {2312.13749}, archiveprefix = {arXiv}, primaryclass = {cs.CE} } CNS 23 Toward Adaptive DDoS-Filtering Rule Generation Jun Li, Devkishen Sisodia, Yebo Feng, Lumin Shi, Mingwei Zhang, Christopher Early, and Peter Reiher In 2023 IEEE Conference on Communications and Network Security (CNS), Oct 2023 Bib HTML PDF @inproceedings{li2023drawbridge, author = {Li, Jun and Sisodia, Devkishen and Feng, Yebo and Shi, Lumin and Zhang, Mingwei and Early, Christopher and Reiher, Peter}, booktitle = {2023 IEEE Conference on Communications and Network Security (CNS)}, title = {Toward Adaptive DDoS-Filtering Rule Generation}, month = oct, year = {2023}, volume = {}, number = {}, pages = {1-9}, doi = {10.1109/CNS59707.2023.10288699} } arXiv SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets Yimika Erinle, Yathin Kethepalli, Yebo Feng, and Jiahua Xu Aug 2023 Bib HTML PDF @misc{erinle2023sok, doi = {10.48550/arXiv.2307.12874}, url = {https://arxiv.org/abs/2307.12874}, title = {SoK: Design, Vulnerabilities, and Security Measures of Cryptocurrency Wallets}, author = {Erinle, Yimika and Kethepalli, Yathin and Feng, Yebo and Xu, Jiahua}, year = {2023}, month = aug, publisher = {arXiv}, eprint = {2307.12874} } PhD Dissertation Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection Yebo Feng University of Oregon, Jun 2023 PhD Dissertation Bib HTML PDF @phdthesis{feng2023fine, title = {Fine-Grained, Content-Agnostic Network Traffic Analysis for Malicious Activity Detection}, author = {Feng, Yebo}, year = {2023}, month = jun, school = {University of Oregon}, note = {PhD Dissertation} } RG Preprints Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis Yebo Feng, Jun Li, Jelena Mirkovic, Cong Wu, Chong Wang, Hao Ren, and Yang Liu Mar 2023 Bib HTML PDF @misc{feng2023fgta, doi = {10.13140/RG.2.2.36632.88325/1}, url = {http://dx.doi.org/10.13140/RG.2.2.36632.88325/1}, author = {Feng, Yebo and Li, Jun and Mirkovic, Jelena and Wu, Cong and Wang, Chong and Ren, Hao and Liu, Yang}, title = {Unmasking the Internet: A Survey of Fine-Grained Network Traffic Analysis}, publisher = {ResearchGate Preprints}, month = mar, year = {2023} } TNSM Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols Jiahua Xu, and Yebo Feng IEEE Transactions on Network and Service Management, Mar 2023 Bib HTML PDF @article{yield2022xu, author = {Xu, Jiahua and Feng, Yebo}, journal = {IEEE Transactions on Network and Service Management}, title = {Reap the Harvest on Blockchain: A Survey of Yield Farming Protocols}, year = {2023}, volume = {20}, number = {1}, pages = {858-869}, doi = {10.1109/TNSM.2022.3222815} } CSUR SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols Jiahua Xu, Krzysztof Paruch, Simon Cousaert, and Yebo Feng ACM Computing Surveys, Feb 2023 Bib HTML PDF @article{xu2023ammsok, author = {Xu, Jiahua and Paruch, Krzysztof and Cousaert, Simon and Feng, Yebo}, title = {SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) Protocols}, year = {2023}, issue_date = {November 2023}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, volume = {55}, number = {11}, issn = {0360-0300}, url = {https://doi.org/10.1145/3570639}, doi = {10.1145/3570639}, journal = {ACM Computing Surveys}, month = feb, articleno = {238}, numpages = {50} } arXiv Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi) Jiahua Xu, Daniel Perez, Yebo Feng, and Benjamin Livshits Feb 2023 Bib HTML PDF @misc{xu2023autogov, doi = {10.48550/ARXIV.2302.09551}, url = {https://arxiv.org/abs/2302.09551}, author = {Xu, Jiahua and Perez, Daniel and Feng, Yebo and Livshits, Benjamin}, title = {Auto.gov: Learning-based On-chain Governance for Decentralized Finance (DeFi)}, publisher = {arXiv}, month = feb, year = {2023}, copyright = {arXiv.org perpetual, non-exclusive license} } 2022 2022 RAID 22 CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic Yebo Feng, Jun Li, and Devkishen Sisodia In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Oct 2022 Bib HTML PDF @inproceedings{10.1145/3545948.3545973, author = {Feng, Yebo and Li, Jun and Sisodia, Devkishen}, title = {CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking Traffic}, year = {2022}, isbn = {9781450397049}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3545948.3545973}, doi = {10.1145/3545948.3545973}, booktitle = {Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)}, pages = {482–494}, numpages = {13}, keywords = {anomaly detection, cryptocurrency, cryptojacking, cryptomining, network traffic analysis}, location = {Limassol, Cyprus}, series = {RAID '22}, month = oct } GLOBECOM 22 I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network Yebo Feng, Jianzhen Luo, Chengyan Ma, Teng Li, and Liang Hui In 2022 IEEE Global Communications Conference, Dec 2022 Bib HTML PDF @inproceedings{feng2022osnfp, author = {Feng, Yebo and Luo, Jianzhen and Ma, Chengyan and Li, Teng and Hui, Liang}, booktitle = {2022 IEEE Global Communications Conference}, title = {I Can Still Observe You: Flow-level Behavior Fingerprinting for Online Social Network}, year = {2022}, month = dec, volume = {}, number = {}, pages = {6427-6432}, doi = {10.1109/GLOBECOM48099.2022.10001510} } Potentials University Blockchain Research Initiative (UBRI): Boosting blockchain education and research Yebo Feng, Jiahua Xu, and Lauren Weymouth IEEE Potentials, Dec 2022 Bib HTML PDF @article{feng2022ubri, author = {Feng, Yebo and Xu, Jiahua and Weymouth, Lauren}, journal = {IEEE Potentials}, title = {University Blockchain Research Initiative (UBRI): Boosting blockchain education and research}, year = {2022}, volume = {41}, number = {6}, pages = {19-25}, doi = {10.1109/MPOT.2022.3198929} } JSAC CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases Teng Li, Siwei Yin, Runze Yu, Yebo Feng, Lei Jiao, Yulong Shen, and Jianfeng Ma IEEE Journal on Selected Areas in Communications, Dec 2022 Bib HTML PDF @article{9908579, author = {Li, Teng and Yin, Siwei and Yu, Runze and Feng, Yebo and Jiao, Lei and Shen, Yulong and Ma, Jianfeng}, journal = {IEEE Journal on Selected Areas in Communications}, title = {{CoAvoid}: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases}, year = {2022}, volume = {40}, number = {11}, pages = {3191-3206}, doi = {10.1109/JSAC.2022.3211547} } arXiv Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures Jelena Mirkovic, Yebo Feng, and Jun Li Mar 2022 Bib HTML PDF @misc{mirkovic2022measuring, doi = {10.48550/ARXIV.2203.00742}, url = {https://arxiv.org/abs/2203.00742}, author = {Mirkovic, Jelena and Feng, Yebo and Li, Jun}, keywords = {Networking and Internet Architecture (cs.NI), Computers and Society (cs.CY), FOS: Computer and information sciences, FOS: Computer and information sciences}, title = {Measuring Changes in Regional Network Traffic Due to COVID-19 Stay-at-Home Measures}, publisher = {arXiv}, year = {2022}, month = mar, copyright = {arXiv.org perpetual, non-exclusive license} } UO CS Report Toward Finer Granularity Analysis of Network Traffic Yebo Feng Mar 2022 Bib HTML PDF @techreport{AREA-202203-Feng, type = {Area Exam}, author = {Feng, Yebo}, title = {Toward Finer Granularity Analysis of Network Traffic}, school = {College of Arts and Sciences, University of Oregon}, month = mar, year = {2022}, url = {https://www.cs.uoregon.edu/Reports/AREA-202203-Feng.pdf} } 2021 2021 TDSC Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu IEEE Transactions on Dependable and Secure Computing (TDSC), Mar 2021 Bib HTML PDF @article{feng2021botflowmon, author = {Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao}, journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)}, title = {Towards Learning-Based, Content-Agnostic Detection of Social Bot Traffic}, year = {2021}, volume = {18}, number = {5}, pages = {2149-2163}, doi = {10.1109/TDSC.2020.3047399} } 2020 2020 IWQoS 20 Application-Layer DDoS Defense with Reinforcement Learning Yebo Feng, Jun Li, and Thanh Nguyen In 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS), Jun 2020 Bib HTML PDF @inproceedings{feng2020appddos, author = {Feng, Yebo and Li, Jun and Nguyen, Thanh}, booktitle = {2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS)}, title = {Application-Layer {DDoS} Defense with Reinforcement Learning}, year = {2020}, pages = {1-10}, doi = {10.1109/IWQoS49365.2020.9213026}, issn = {1548-615X}, month = jun, keywords = {application-layer DDoS;distributed denial of service (DDoS);reinforcement learning;anomaly detection} } KDD MLHat 20 Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks Yebo Feng, and Jun Li In 2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense, Jun 2020 Bib HTML PDF @inproceedings{10.1007/978-3-030-59621-7_6, author = {Feng, Yebo and Li, Jun}, title = {Toward Explainable and Adaptable Detection and Classification of Distributed Denial-of-Service Attacks}, booktitle = {2020 KDD MLHat: The First International Workshop on Deployable Machine Learning for Security Defense}, year = {2020}, publisher = {Springer International Publishing}, address = {Cham}, pages = {105--121}, isbn = {978-3-030-59621-7} } ASIACCS 20 POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic Yebo Feng, Devkishen Sisodia, and Jun Li In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper, Jun 2020 Bib HTML PDF @inproceedings{feng2020crypto, author = {Feng, Yebo and Sisodia, Devkishen and Li, Jun}, title = {POSTER: Content-Agnostic Identification of Cryptojacking in Network Traffic}, year = {2020}, isbn = {9781450367509}, publisher = {Association for Computing Machinery}, address = {New York, NY, USA}, url = {https://doi.org/10.1145/3320269.3405440}, doi = {10.1145/3320269.3405440}, booktitle = {Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIACCS 2020) - poster paper}, pages = {907–909}, numpages = {3}, keywords = {anomaly detection, network traffic classification, cryptojacking}, location = {Taipei, Taiwan}, series = {ASIA CCS '20} } PAM 20 Towards Explicable and Adaptive DDoS Traffic Classification Yebo Feng, and Jun Li The 21st Passive and Active Measurement Conference (PAM) - poster paper, Mar 2020 Bib HTML PDF @article{feng2020pam, author = {Feng, Yebo and Li, Jun}, title = {Towards Explicable and Adaptive {DDoS} Traffic Classification}, journal = {The 21st Passive and Active Measurement Conference (PAM) - poster paper}, year = {2020}, month = mar } 2019 2019 UO CS Report Towards Intelligent Defense against Application-Layer DDoS with Reinforcement Learning Yebo Feng Dec 2019 Directed Research Project Bib HTML PDF @misc{DRP-201912-Feng, author = {Feng, Yebo}, title = {Towards Intelligent Defense against Application-Layer {DDoS} with Reinforcement Learning}, note = {Directed Research Project}, publisher = {University of Oregon, Computer and Information Sciences Department}, address = {Eugene OR}, month = dec, year = {2019}, howpublished = {Available at \url{http://www.cs.uoregon.edu/Reports/DRP-201912-Feng.pdf} (2020/02/25)} } CNS 19 BestPaper BotFlowMon: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows Yebo Feng, Jun Li, Lei Jiao, and Xintao Wu In 2019 IEEE Conference on Communications and Network Security (CNS), Jun 2019 Bib HTML PDF @inproceedings{feng2019botflowmon, author = {Feng, Yebo and Li, Jun and Jiao, Lei and Wu, Xintao}, booktitle = {2019 IEEE Conference on Communications and Network Security (CNS)}, title = {{BotFlowMon}: Learning-based, Content-Agnostic Identification of Social Bot Traffic Flows}, year = {2019}, pages = {169-177}, keywords = {online social network (OSN);OSN security;social bot;NetFlow data;OSN bot traffic;machine learning}, doi = {10.1109/CNS.2019.8802706}, month = jun } 2018 2018 Master Thesis BotFlowMon: Identify Social Bot Traffic With NetFlow and Machine Learning Yebo Feng Jun 2018 Bib HTML PDF @article{feng2018botflowmon, title = {{BotFlowMon}: Identify Social Bot Traffic With {NetFlow} and Machine Learning}, author = {Feng, Yebo}, year = {2018}, month = jun, publisher = {University of Oregon}, url = {http://hdl.handle.net/1794/23799} }