Hyperservice: Interoperability and programmability across heterogeneous blockchains Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 128 | 2019 |
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal 27th USENIX Security Symposium (USENIX Security 18), 639-656, 2018 | 107 | 2018 |
Sybilfuse: Combining local attributes with global structure to perform robust sybil detection P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal 2018 IEEE conference on communications and network security (CNS), 1-9, 2018 | 104* | 2018 |
Enabling efficient cyber threat hunting with cyber threat intelligence P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu, P Mittal, SR Kulkarni, D Song 2021 IEEE 37th International Conference on Data Engineering (ICDE), 193-204, 2021 | 103 | 2021 |
Make web3. 0 connected Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021 | 81 | 2021 |
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data P Gao, X Xiao, Z Li, F Xu, SR Kulkarni, P Mittal 2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018 | 81 | 2018 |
{PrivGuard}: Privacy regulation compliance made easier L Wang, U Khan, J Near, Q Pang, J Subramanian, N Somani, P Gao, ... 31st USENIX Security Symposium (USENIX Security 22), 3753-3770, 2022 | 71* | 2022 |
Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps X Xiao, X Wang, Z Cao, H Wang, P Gao 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 63 | 2019 |
Deepintent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 58 | 2019 |
Exploiting temporal dynamics in sybil defenses C Liu, P Gao, M Wright, P Mittal Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 39 | 2015 |
{Back-Propagating} System Dependency Impact for Attack Investigation P Fang, P Gao, C Liu, E Ayday, K Jee, T Wang, YF Ye, Z Liu, X Xiao 31st USENIX Security Symposium (USENIX Security 22), 2461-2478, 2022 | 38 | 2022 |
A system for automated open-source threat intelligence gathering and management P Gao, X Liu, E Choi, B Soman, C Mishra, K Farris, D Song Proceedings of the 2021 International conference on management of data, 2716 …, 2021 | 32 | 2021 |
A system for efficiently hunting for cyber threats in computer systems using threat intelligence P Gao, F Shao, X Liu, X Xiao, H Liu, Z Qin, F Xu, P Mittal, SR Kulkarni, ... 2021 IEEE 37th International Conference on Data Engineering (ICDE), 2705-2708, 2021 | 17 | 2021 |
Champ: Characterizing undesired app behaviors from user comments based on market policies Y Hu, H Wang, T Ji, X Xiao, X Luo, P Gao, Y Guo 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 15 | 2021 |
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection P Gao, X Xiao, D Li, K Jee, H Chen, SR Kulkarni, P Mittal International Conference on Data Engineering (ICDE), 2020 | 12* | 2020 |
A query system for efficiently investigating complex attack behaviors for enterprise security P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal arXiv preprint arXiv:1810.03464, 2018 | 10 | 2018 |
Threatkg: A threat knowledge graph for automated open-source cyber threat intelligence gathering and management P Gao, X Liu, E Choi, S Ma, X Yang, Z Ji, Z Zhang, D Song arXiv preprint arXiv:2212.10388, 2022 | 6 | 2022 |
Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation X Yang, H Liu, Z Wang, P Gao arXiv preprint arXiv:2211.05403, 2022 | 6 | 2022 |
A knowledge base question answering system for cyber threat knowledge acquisition Z Ji, E Choi, P Gao 2022 IEEE 38th International Conference on Data Engineering (ICDE), 3158-3161, 2022 | 5 | 2022 |
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape SM Abdullah, A Cheruvu, S Kanchi, T Chung, P Gao, M Jadliwala, ... arXiv preprint arXiv:2404.16212, 2024 | 1 | 2024 |