Follow
Yingbo Song
Yingbo Song
Peraton Labs
Verified email at peratonlabs.com
Title
Cited by
Cited by
Year
Systems, methods, and media for detecting network anomalies using a trained probabilistic model
Y Song, AD Keromytis, SJ Stolfo
US Patent 8,844,033, 2014
3932014
On the infeasibility of modeling polymorphic shellcode
Y Song, ME Locasto, A Stavrou, AD Keromytis, SJ Stolfo
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2052007
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
Y Song, AD Keromytis, S Stolfo
1582009
Spectral clustering and embedding with hidden markov models
T Jebara, Y Song, K Thadani
Machine Learning: ECML 2007: 18th European Conference on Machine Learning …, 2007
1002007
System level user behavior biometrics using feature extraction and modeling
Y Song, SJ Stolfo
US Patent 9,275,345, 2016
612016
System level user behavior biometrics using Fisher features and Gaussian mixture models
Y Song, MB Salem, S Hershkop, SJ Stolfo
2013 IEEE Security and Privacy Workshops, 52-59, 2013
582013
Brave new world: Pervasive insecurity of embedded network devices
A Cui, Y Song, PV Prabhu, SJ Stolfo
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
452009
Active authentication using file system decoys and user behavior modeling: results of a large scale study
J Voris, Y Song, MB Salem, S Hershkop, S Stolfo
Computers & Security 87, 101412, 2019
252019
Markov models for network-behavior modeling and anonymization
Y Song, S Stolfo, T Jebara
92011
Behavior-based network traffic synthesis
Y Song, SJ Stolfo, T Jebara
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
82011
On the infeasibility of Modeling Polymorphic shellcode for Signature Detection
Y Song, ME Locasto, A Stavrou, AD Keromytis, S Stolfo
82007
You are what you use: An initial study of authenticating mobile users via application usage
J Voris, Y Song, M Ben Salem, S Stolfo
Proceedings of the 8th EAI International Conference on Mobile Computing …, 2016
72016
Smashing the stack with hydra: The many heads of advanced polymorphic shellcode
P Prabhu, Y Song, S Stolfo
72009
Smashing the Stack with Hydra
P Prabhu, Y Song, S Stolfo
Downloaded on Sep 5, 1-22, 2013
62013
Systems, methods, and media for detecting network anomalies
Y Song, AD Keromytis, SJ Stolfo
US Patent App. 14/476,142, 2014
42014
Detecting network anomalies by probabilistic modeling of argument strings with markov chains
Y Song, AD Keromytis, SJ Stolfo
US Patent 9,253,201, 2016
32016
A behavior-based approach towards statistics-preserving network trace anonymization
Y Song
Columbia University, 2012
22012
Density estimation under independent similarly distributed sampling assumptions
T Jebara, Y Song, K Thadani
Advances in Neural Information Processing Systems 20, 2007
22007
Independent similarly distributed assumptions for semiparametric density estimation
T Jebara, Y Song, J Thadani
Department of Computer Science, Columbia University, New York, NY 10027, 0
1
Detecting network anomalies by probabilistic modeling of argument strings with markov chains
Y Song, AD Keromytis, SJ Stolfo
US Patent 10,819,726, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20