default search action
Yu-Sung Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Sanoop Mallissery, Yu-Sung Wu:
Demystify the Fuzzing Methods: A Comprehensive Survey. ACM Comput. Surv. 56(3): 71:1-71:38 (2024) - [j12]Shiuhpyng Winston Shieh, Jeffrey M. Voas, Phil Laplante, Jason W. Rupe, Christian K. Hansen, Yu-Sung Wu, Yi-Ting Chen, Chi-Yu Li, Kai-Chiang Wu:
Reliability Engineering in a Time of Rapidly Converging Technologies. IEEE Trans. Reliab. 73(1): 73-82 (2024) - [c24]Zheng-Hong Huang, Yu-Sung Wu, Ying-Dar Lin, Chia-Mu Yu, Wei-Bin Lee:
Neural Network-based Functional Degradation for Cyber-Physical Systems. QRS 2024: 425-434 - 2023
- [j11]Sanoop Mallissery, Kun-Yi Chiang, Chun-An Bau, Yu-Sung Wu:
Pervasive Micro Information Flow Tracking. IEEE Trans. Dependable Secur. Comput. 20(6): 4957-4975 (2023) - [c23]Sanoop Mallissery, Yu-Sung Wu:
Enriching the Semantics of Information Flow Tracking with Source-Level Memory Allocation Event Logging. DSC 2023: 1-10 - 2022
- [j10]Hong-Wei Li, Yu-Sung Wu, Yennun Huang:
On the Feasibility of Anomaly Detection with Fine-Grained Program Tracing Events. J. Netw. Syst. Manag. 30(2): 28 (2022) - [c22]Shao-Fu Chen, Yu-Sung Wu:
Linux Kernel Module Development with Rust. DSC 2022: 1-2 - [c21]Wen-Yang Lai, Kun-Che Tsai, Che Chen, Yu-Sung Wu:
In-Vivo Fuzz Testing for Network Services. SRDS 2022: 35-45 - 2021
- [c20]Yu-Hsin Hung, Bing-Jhong Jheng, Hong-Wei Li, Wen-Yang Lai, Sanoop Mallissery, Yu-Sung Wu:
Mixed-mode Information Flow Tracking with Compile-time Taint Semantics Extraction and Offline Replay. DSC 2021: 1-8 - 2020
- [c19]Sanoop Mallissery, Min-Chieh Wu, Chun-An Bau, Guan-Zhang Huang, Chen-Yu Yang, Wei-Chun Lin, Yu-Sung Wu:
POSTER: Data Leakage Detection for Health Information System based on Memory Introspection. AsiaCCS 2020: 898-900 - [c18]Sanoop Mallissery, Yu-Sung Wu, Chih-Hao Hsieh, Chun-An Bau:
Identification of data propagation paths for efficient dynamic information flow tracking. SAC 2020: 92-99
2010 – 2019
- 2019
- [j9]Sanoop Mallissery, M. M. Manohara Pai, Milad Mehbadi, Radhika M. Pai, Yu-Sung Wu:
Online and offline communication architecture for vehicular ad-hoc networks using NS3 and SUMO simulators. J. High Speed Networks 25(3): 253-271 (2019) - 2018
- [j8]Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Phrase Search for Encrypted Cloud Storage. J. Inf. Sci. Eng. 34(2): 401-417 (2018) - [c17]Yu-Hsin Hung, Hong-Wei Li, Yu-Sung Wu, Bing-Jhong Jheng, Yennun Huang:
HIT: Hybrid-Mode Information Flow Tracking with Taint Semantics Extraction and Replay. DSN Workshops 2018: 75-76 - [c16]Pang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu:
Enforcing Enterprise Mobile Application Security Policy with Plugin Framework. PRDC 2018: 263-268 - [c15]Shu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu:
Semantic Failover in Software-Defined Networking. PRDC 2018: 299-308 - [c14]Shu-Hao Chang, Sanoop Mallissery, Chih-Hao Hsieh, Yu-Sung Wu:
Hypervisor-Based Sensitive Data Leakage Detector. QRS 2018: 155-162 - 2017
- [j7]Hong-Wei Li, Yu-Sung Wu, Yi-Yung Chen, Chieh-Min Wang, Yennun Huang:
Application Execution Time Prediction for Effective CPU Provisioning in Virtualization Environment. IEEE Trans. Parallel Distributed Syst. 28(11): 3074-3088 (2017) - [c13]Chieh-Min Wang, Yu-Sung Wu, Hsing-Hsuan Chung:
FUSION: A unified application model for virtual mobile infrastructure. DSC 2017: 224-231 - 2016
- [c12]Tzi-cker Chiueh, Houcheng Lin, Ares Chao, Anthony, Tan-Gen Wu, Chieh-Min Wang, Yu-Sung Wu:
Smartphone Virtualization. ICPADS 2016: 141-150 - [c11]Patrick Ngai, Sung-Jer Lu, Yu-Sung Wu, Wei-Sheng Lim, Tung-Yueh Lin:
Network Performance Bottleneck Detection and Maximum Network Throughput Estimation for Datacenter Applications. QRS 2016: 33-40 - 2015
- [c10]Eric Lui, Yu-Sung Wu, Patrick Ngai, Tung-Yueh Lin, Hong-Wei Li, Shih-Yi Huang:
Towards consistent software defined networking with logic programming. APNOMS 2015: 109-114 - 2014
- [j6]Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai:
Active versus Passive Malware Collection. Computer 47(4): 59-65 (2014) - [j5]Ying-Dar Lin, Yi-Ta Chiang, Yu-Sung Wu, Yuan-Cheng Lai:
Automatic Analysis and Classification of Obfuscated Bot Binaries. Int. J. Netw. Secur. 16(6): 477-486 (2014) - [j4]Yen-Chung Chen, Yu-Sung Wu, Wen-Guey Tzeng:
Preserving user query privacy in cloud-based security services. J. Comput. Secur. 22(6): 997-1024 (2014) - [j3]Ying-Dar Lin, Tzung-Bi Shih, Yu-Sung Wu, Yuan-Cheng Lai:
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment. Secur. Commun. Networks 7(3): 626-640 (2014) - [c9]Li-Juin Wu, Hong-Wei Li, Yu-Jui Cheng, Yu-Sung Wu, Houcheng Lin:
Application dependency tracing for message oriented middleware. APNOMS 2014: 1-6 - [c8]Yen-Chun Hsu, Yu-Sung Wu, Tsung-Han Tsai, Yi Pin Chiu, Chih-Hung Lin, Zhi-Wei Chen:
MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment. SERE (Companion) 2014: 97-106 - 2013
- [c7]Yu-Sung Wu, Pei-Keng Sun, Chun-Chi Huang, Sung-Jer Lu, Syu-Fang Lai, Yi-Yung Chen:
EagleEye: Towards mandatory security monitoring in virtualized datacenter environment. DSN 2013: 1-12 - [c6]Hsu-Fang Lai, Yu-Sung Wu, Yu-Jui Cheng:
Exploiting Neigborhood Similarity for Virtual Machine Migration over Wide-Area Network. SERE 2013: 149-158
2000 – 2009
- 2009
- [j2]Yu-Sung Wu, Vinita Apte, Saurabh Bagchi, Sachin Garg, Navjot Singh:
Intrusion detection in voice over IP environments. Int. J. Inf. Sec. 8(3): 153-172 (2009) - [c5]Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita:
Spam detection in voice-over-IP calls through semi-supervised clustering. DSN 2009: 307-316 - 2007
- [j1]Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
Automated adaptive intrusion containment in systems of interacting services. Comput. Networks 51(5): 1334-1360 (2007) - 2005
- [c4]Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. DSN 2005: 508-517 - 2004
- [c3]Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai:
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. DSN 2004: 433-442 - [c2]Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu:
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks. DSN 2004: 795-804 - 2003
- [c1]Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi:
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. ACSAC 2003: 234-244
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint