Yu Fu
Yu Fu
Verified email at
Cited by
Cited by
Stealthy domain generation algorithms
Y Fu, L Yu, O Hambolu, I Ozcelik, B Husain, J Sun, K Sapra, D Du, ...
IEEE Transactions on Information Forensics and Security 12 (6), 1430-1443, 2017
Stealthy malware traffic-not as innocent as it looks
X Zhong, Y Fu, L Yu, R Brooks, GK Venayagamoorthy
2015 10th International Conference on Malicious and Unwanted Software …, 2015
Security and data privacy of modern automobiles
J Deng, L Yu, Y Fu, O Hambolu, RR Brooks
Data Analytics for Intelligent Transportation Systems, 131-163, 2017
Side channel analysis of multiple PMU data in electric power systems
X Zhong, A Ahmadi, R Brooks, GK Venayagamoorthy, L Yu, Y Fu
2015 Clemson University Power Systems Conference (PSC), 1-6, 2015
DoS detection is easier now
I Ozcelik, Y Fu, RR Brooks
2013 Second GENI Research and Educational Experiment Workshop, 50-55, 2013
Analysis of Botnet Counter-Counter-Measures
Y Fu, B Husain, RR Brooks
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
A covert data transport protocol
Y Fu, Z Jia, L Yu, X Zhong, R Brooks
Malicious and Unwanted Software (MALWARE), 2016 11th International …, 2016
Using markov models and statistics to learn, extract, fuse, and detect patterns in raw data
RR Brooks, L Yu, Y Fu, G Cordone, J Oakley, X Zhong
Proceedings of International Symposium on Sensor Networks, Systems and …, 2018
Internet freedom in west africa: technical support for journalists and democracy advocates
RR Brooks, L Yu, Y Fu, O Hambolu, J Gaynard, J Owono, A Yepmou, ...
Communications of the ACM 61 (5), 72-82, 2018
Using botnet technologies to counteract network traffic analysis
Y Fu
Clemson University, 2017
Privacy preserving count statistics
L Yu, O Hambolu, Y Fu, J Oakley, RR Brooks
arXiv preprint arXiv:1910.07020, 2019
Creating a tailored trustworthy space for democracy advocates using hostile host
RR Brooks, O Hambolu, P Marusich, Y Fu, S Balachandran
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms
L Yu, Y Fu, J Oakley, O Hambolu, R Brooks
Computers & Security 105, 102206, 2021
The system can't perform the operation now. Try again later.
Articles 1–13