Yingbo Song
Yingbo Song
Perspecta Labs
Verified email at perspectalabs.com
Title
Cited by
Cited by
Year
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Y Song, AD Keromytis, SJ Stolfo
US Patent 8,844,033, 2014
2972014
On the infeasibility of modeling polymorphic shellcode
Y Song, ME Locasto, A Stavrou, AD Keromytis, SJ Stolfo
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1512007
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
Y Song, AD Keromytis, S Stolfo
1462009
Spectral clustering and embedding with hidden markov models
T Jebara, Y Song, K Thadani
European Conference on Machine Learning, 164-175, 2007
902007
System level user behavior biometrics using Fisher features and Gaussian mixture models
Y Song, MB Salem, S Hershkop, SJ Stolfo
2013 IEEE Security and Privacy Workshops, 52-59, 2013
472013
On the infeasibility of modeling polymorphic shellcode
Y Song, ME Locasto, A Stavrou, AD Keromytis, SJ Stolfo
Machine learning 81 (2), 179-205, 2010
422010
Brave new world: Pervasive insecurity of embedded network devices
A Cui, Y Song, PV Prabhu, SJ Stolfo
International Workshop on Recent Advances in Intrusion Detection, 378-380, 2009
352009
System level user behavior biometrics using feature extraction and modeling
Y Song, SJ Stolfo
US Patent 9,275,345, 2016
252016
Effect of Fe doping on structural, optical and magnetic properties of ZnO nanoparticles derived by surfactant assisted combustion synthesis
YT Prabhu, V Kumar, KV Rao
Advanced Science, Engineering and Medicine 5 (3), 198-205, 2013
142013
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
82019
Behavior-based network traffic synthesis
Y Song, SJ Stolfo, T Jebara
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
82011
You are what you use: an initial study of authenticating mobile users via application usage
J Voris, Y Song, M Ben Salem, S Stolfo
Proceedings of the 8th EAI International Conference on Mobile Computing …, 2016
72016
Markov models for network-behavior modeling and anonymization
Y Song, S Stolfo, T Jebara
72011
Smashing the stack with hydra: The many heads of advanced polymorphic shellcode
P Prabhu, Y Song, S Stolfo
72009
On the infeasibility of Modeling Polymorphic shellcode for Signature Detection
Y Song, ME Locasto, A Stavrou, AD Keromytis, S Stolfo
72007
Method of forming bump
H Tong, C Lee, J Fang, M Huang, J Chen, C Su, C Weng, Y Lee
US Patent 6,875,683, 2005
72005
A behavior-based approach towards statistics-preserving network trace anonymization
Y Song
Columbia University, 2012
32012
Density estimation under independent similarly distributed sampling assumptions
T Jebara, Y Song, K Thadani
Advances in Neural Information Processing Systems 20, 713-720, 2007
22007
Detecting network anomalies by probabilistic modeling of argument strings with markov chains
Y Song, AD Keromytis, SJ Stolfo
US Patent 9,253,201, 2016
12016
Systems, methods, and media for detecting network anomalies
Y Song, AD Keromytis, SJ Stolfo
US Patent App. 14/476,142, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20