Publication

Conference Proceedings

Yingfei Dong, Ding-Zhu Du, Oscar H. Ibarra, Algorithms and Computation, 20th International Symposium, ISAAC 2009, Dec.16-18, 2009. Springer.

Refereed Journal Papers

  1. W. Chen*, Z. Duan, and Y. Dong, “DPM: Towards Accurate Drone Position Manipulation,” IEEE Trans. on Dependable and Secure Computing. DOI: 10.1109/TDSC.2022.3144319. Page(s): 1 – 13, Jan, 2022.

  2. G. Wang*, C. Liu, Y. Dong, K. Choo, P. Han, H. Pan, B. Fang, “Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems,” IEEE ACCESS (Vol.6), pp.21828 - 21839, DOI: 10.1109/ACCESS.2018.2800684. Feb. 2018.

  3. G. Wang*, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, "IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications," IEEE ACCESS (Vol.6), pp.2908 – 2921, DOI: 10.1109/ACCESS.2017.2786026. Dec. 2017.

  4. G. Wang*, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, "Revisit the Security of Searchable Encryption: Leakage, Attack and Mitigation", submitted, Springer Journal of Cluster Computing.

  5. D. Li, R. Zhang, Y. Dong, F. Zhu, and D. Pavlovic, “A Multi-Secret Value Access Control Framework for Airliner in Multinational Air Traffic Management," IEEE Internet of Things Journal, Vol.4, Issue:6, pp.1853-1867, Dec. 2017.

  6. G. Tian*, Z. Duan, T. Baumeister*, and Y. Dong, “Traceback Attacks on Freenet,” IEEE Transactions on Dependable and Secure Computing, Volume 14 Issue 3, pp.294-307, May 2017.

  7. T. Baumeister* and Y. Dong, “Towards Secure Identity Management for the Smart Grid,” Security and Communication Networks, Volume 9, Issue 9, pp.808-822, June 2016.

  8. F. Sanchez*, Z. Duan, and Y. Dong, "Blocking Spam By Separating End-User Machines from Legitimate Mail Server Machines," Security and Communication Networks. Volume 9, Issue 4, pp.316-326, March 2016.

  9. Y. Bao*, C. Yi*, Y. Xue, and Y. Dong, “Precise Modeling Rumor Propagation and Control Strategy on Social Networks,” Applications of Social Media and Social Network Analysis, Lecture Notes in Social Networks, 2190-5428, pp.77-102, 2015.

  10. J. Zhang* and Y. Dong, “Reliable Protection Relays in Smart Grid,” Special Issue of ZTE Communications on Smart Grid, 2015.

  11. J. Zhang* and Y. Dong, “Preventing False Trips of Zone 3 Protection Relays in Smart Grid,” Tsinghua Science and Technology, ISSN 1007-0214, 03/11, pp.142-154, Vol.20, No.2, April 2015.

  12. C. Wang, C. Liu, B. Liu*, and Y. Dong, “DIV: Dynamic integrity validation framework for detecting compromises on virtual machine based cloud services in real time,” China Communications, Volume: 11, Issue: 8, pp.15-27, Aug. 2014.

  13. Z. Duan, P. Chen*, F. Sanchez*, Y. Dong, M. Stephenson, and J. Barker. “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE Transactions on Dependable and Secure Computing. Vol.9, No.2, pp.198-210, March/April, 2012.

  14. C, Li*, Y. Xue, Y. Dong, and D. Wang, “MCC: A Message and Command Correlation Method for Identifying New Interactive Protocols via Session Analyses,” Journal of Tsinghua University (SCI indexed journal in English), Vol.17, Issue: 3, pp.344-353, 2012.

  15. D. Wang*, Y. Xue, and Y. Dong, “Anomaly Detection Using Neighborhood Negative Selection,” Intelligent Automation and Soft Computing, Vol.17, Issue 5, Aug. 2011.

  16. A. Raghuveer*, Y. Dong, and D. H-C. Du, “StatStream: Providing Statistical Reliability Guarantees in Peer-to-Peer Live Video Streaming,” International Journal of Advanced Media and Communication (IJAMC), pp.4-30, Vol.4, Issue 1, 2010.

  17. Y. Dong and X. Liu*, “Novel dynamic delay allocation adjustment for improving bandwidth efficiency,” Vol.33, Issue 4, Elsevier Computer Communications 33(4), pp.463-476, 2010.

  18. Z. Duan, Y. Dong, and K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” Elsevier Computer Networks Journal, Volume 51, Issue 10, pp.2616-2630, Jul. 2007.

  19. Y. Dong, Z. Zhang, and D. Du, “Full-Sharing Optimal Scheduling for VOD Services on Broadband Cable Networks,” Journal of Multimedia Tools and Application. Vol.33, Issue 2, pp.131-156, May 2007.

  20. Y. Dong, C. Choi*, and Z. Zhang, “LIPS: A lightweight permit system for packet source origin accountability,” Elsevier Computer Networks Journal, Volume 50, Issue 18, pp.3622-3641, Dec. 2006.

  21. E. Kusmierek, Y. Dong, and D. H-C. Du, “Loopback: A novel scalable approach for collaborative streaming,” IEEE Transactions on Multimedia, Vol.8, No.2, pp.233-242, Apr. 2006.

  22. Y. Dong, Z. Zhang, and D. H-C. Du, “Optimal Scheduling and Adaptation for VOD Service on Broadband Cable Networks,” IEICE Transactions on Information and Systems, Vol.E89-B, No.2, pp.581-589, Feb 2006.

  23. Y. Dong, Z. Zhang, and D. Du, “Providing Controlled Quality Assurance for Streaming Stored-Videos across the Internet Using VPNs,” Journal of Multimedia Tools and Application, Vol.25, No.1, pp. 281-304, Jan. 2005.

  24. Y. Dong, C. Choi, and Z. Zhang, “A security framework for protecting traffic between collaborative domains,” Journal of Microprocessors and Microsystems, Vol. 28, Issue 10, Secure Computing Platforms, pp.547-559, 1 Dec. 2004.

  25. E. Kusmierek, D. H-C. Du, and Y. Dong, “An Architecture of Proxy-Assisted Periodic Broadcast for Large-Scale Video Streaming,” in Journal of Internet Technology, Vol.5, No.3, pp.89-299, Oct. 2004.

  26. Y. Dong, Z.-L. Zhang, and Y. Hou, “Server-Based Dynamic Server Selection Algorithms for Enterprise Networks,” Springer Lecture Notes in Computer Science series, Vol. 2343/2344, 2002.

  27. X. Du, X. Zhang, Y. Dong, and L. Zhang, “Architectural Effects of Symmetric Multiprocessors on TPC-C Commercial Workload,” Journal of Parallel and Distributed Computing, Vol. 61, pp.609-640, 2001.

  28. Y. Dong, Y. Hou, and Z.-L. Zhang, T. Taniguchi: “A Server-Based Non-Intrusive Measurement Infrastructure for Enterprise Networks,” Journal of Performance Evaluation, Vol.36-37, pp.233-247, 1999.

  29. Y. Dong, X. Du, and X. Zhang, “Characterizing and Scheduling Communication Interactions of Parallel and Local Jobs in Networks of Workstations,” Computer Communications, Vol.21, pp.470-484, 1998.

  30. X. Du, Y. Dong, and X. Zhang, “Efficient Local Scheduling of Parallel Tasks and Communications on Heterogeneous Network of Workstations,” Lecture Notes in Computer Science, 1300, pp. 887-894, 1997.

  31. Y. Dong, D. Wang, and W. Zheng, “The Amendment of Pertel's Critique of the Adaptive Routing,” Chinese Journal of Computers, Vol.20, No.5, May 1997.

  32. Y. Dong, D. Wang, and W. Zheng, “Exact Computation of the Mean Minimal Path Length of n-Mesh and n-Torus,” Chinese Journal of Computers, Vol.20, No.4, Apr. 1997.

  33. Y. Dong, D. Wang, and W. Zheng, “A Method of Reducing the Communication Software Overhead,” Chinese Journal of Software, pp.129-137, Oct 1996.

  34. Y. Dong, et al., “The Architecture of a Fully-Connected Scalable Parallel Accelerator,” Chinese Journal of Computers, Vol.17, No.3, pp.204-211, 1994.

  35. Y. Dong, et al., “The Message-Passing Techniques in Multicomputers,” Chinese Journal Computer Research and Development, Vol.31, No.7, pp.1-9, 1994.

  36. Y. Dong, “The Network Frontier-- ATM,” Chinese Computer Communications, Vol.399, 1994.

  37. Y. Dong, “The Wormhole Routing in Multicomputer,” Chinese Journal Microcomputer and Applications, Vol.12, No.6, 1993.

  38. Y. Dong, “A Multicomputer Disk Operating System (DOS) for ADA,” Journal of Zhengzhou University, Vol.24, No.1, 1992.

  39. Y. Dong, et al., “The Design and Implementation of ABC-90 jr. Interconnection Network,” Journal of Chinese Computer Engineering and Design, Sum.64, No.4, pp.46-53, 1992.

Refereed Conference Papers

  1. Md Mainuddin, Zhenhai Duan, and Yingfei Dong, “IoT Device Identification Based on Network Traffic Characteristics,” submitted to 2022 IEEE Global Communications Conference: Communication & Information Systems Security.

  2. W. Chen*, Z. Duan, and Y. Dong, “'Accurately Redirecting a Malicious Drone,” in Proc. of IEEE CCNC’22.

  3. Md Mainuddin, Zhenhai Duan, and Yingfei Dong, “Network Traffic Characteristics of IoT Devices in Smart Homes,” in Proc. of IEEE International Conference on Computer Communications and Networks (ICCCN’21), Athens, Greece.

  4. W. Chen*, Z. Duan, and Y. Dong, “Compromising Flight Paths of Autopiloted Drones,” in Proc. of IEEE International Conference on Unmanned Aircraft Systems (ICUAS), 2019.

  5. P. Han, C. Liu, Y. Dong, H. Pan, S. Duan, and B. Fang, "CloudDLP: Transparent and Automatic Data Sanitization for Browser-based Cloud Storage," in Proc. of ICCCN, 2019.

  6. P. Han, C. Liu, Y. Dong, H. Pan, and B. Fang, “FileCrypt: Protecting Sensitive Files in Untrusted Cloud Storage,” in Proc. of IEEE CNS 2019 - IEEE Conference on Computer Communications and Network Security.

  7. W. Chen, Y. Dong, and Z. Duan. “Manipulating Drone Position Control,” in Proc. of IEEE CNS 2019 - IEEE Conference on Computer Communications and Network Security.

  8. W. Chen, Y. Dong, and Z. Duan. “Attacking Altitude Estimation in Drone Navigation,” INFOCOM workshop WiSARN 2018: Wireless Sensor, Robot and UAV Networks.”, April 2018.

  9. W. Chen, Y. Dong, and Z. Duan, “Manipulating Drone Dynamic State Estimation to Compromise Navigation,” in Proc. of IEEE Conference on Communications and Network Security (CNS), May, 2018.

  10. J. Yang, N. Zhou, Y. Li, X, Xue, Y. Dong, Y. Xue, and J. Li “Homophily and Controversy: On the Role of Public Opinion in Online Viral Diffusion,” INFOCOM18 Poster and Demo, April 2018.

  11. G. Wang*, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, “SafeBox: A Scheme for Searching and Sharing Encrypted Data in Cloud Applications,” in Proc. of IEEE SPAC 2017.

  12. G. Wang, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, "Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems," IEEE Access (Vol.6), pp.21828 – 21839, Electronic ISSN: 2169-3536. INSPEC Accession Number: 17763825. DOI: 10.1109/ACCESS.2018.2800684. Feb. 2018.

  13. G. Wang, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, "IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications", IEEE Access (Vol.6), pp.2908 – 2921. Electronic ISSN: 2169-3536. INSPEC Accession Number: 17542776. DOI: 10.1109/ACCESS.2017.2786026. Dec. 2017.

  14. D. Wang*, Y. Xue, Y. Dong, “Identifying Influential Factors of CDN Performance with Large-scale Data Analysis,” in Proc. of IEEE International Conference on Computing, Networking and Communications (ICNC), March 2018.

  15. G. Wang*, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, “SafeBox: An Efficient Approach for Searching and Sharing Encrypted Data in Cloud Applications,” submitted to Information Security Conference (ISC), 2017.

  16. J. Zhang* and Y. Dong, “Cyber Attacks on Remote Relays in Smart Grid,” in Proc. of IEEE Conference on Communications and Network Security (CNS), Oct 2017.

  17. G. Wang*, C. Liu, Y. Dong, P. Han, H. Pan, B. Fang, “Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge,” in Proc. of EAI International Conference on Security and Privacy in Communication Networks (SecureComm), Nov. 2017.

  18. H. Li*, J, Garrett*, M. Jennings*, Y. Dong, “Drone profiling through wireless fingerprinting,” in Proc. of 7th Annual IEEE Int. Conf. on CYBER Technology in Automation, Control, and Intelligent Systems, Aug 2017.

  19. W. Chen*, Z. Duan, and Y. Dong, “False Data Injection on EKF-Based Navigation Control,” Invited paper. in Proc. of IEEE International Conference on Unmanned Aircraft Systems (ICUAS), 2017.

  20. D. Wang*, Q. He, L. Qian, Y. Xue, and Y. Dong, “Understanding IP Address Multiplexing with Large-scale SSL/TLS Flow Analysis,” in Proc. of IEEE International Conference on Computing, Networking and Communications (ICNC), 2017.

  21. Z. Wang*, C. Li, Y. Guan, Y. Xue, Y. Dong “ActivityHijacker: Hijacking the Android Activity Component for Sensitive Data,” in Proc. of IEEE Inter. Conference on Computer Communication and Networks (ICCCN), Aug. 1-4, 2016.

  22. J. Zhang*, Y Dong, “Power-Aware Communication Management for Reliable Remote Relay Protection in Smart Grid,” in Proc. of IEEE Power Systems Conference at Clemson University, Mar. 8-11th, 2016.

  23. Y. Bao*, C. Yi*, J. Jiang, Y. Xue, Y. Dong, “Implementation of Chaotic Analysis on Retweet Time Series,” in Proc of IEEE/ACM international conference on Advances in Social Network Analysis and Mining (ASONAM), 2015: 1225-1231.

  24. X. Cao*, Y. Dong, D. Du, “Synchronized Multi-Hop Scheduling for Real-Time Traffic on SDNs,” Invited paper, in Proc. of IEEE Inter. Conference on Computer Communication and Networks (ICCCN), 2015: 1-8.

  25. Y. Bao*, W. Huang, C. Yi*, J. Jiang, Y. Xue, Y. Dong, “Effective deployment of monitoring points on social networks,” in Proc. of IEEE International Conference on Computing, Networking and Communications (ICNC), 2015: 62-66.

  26. C. Yi*, Y. Bao, J. Jiang, Y. Xue, Y. Dong, “Cascading failures of social networks under attacks,” in Proc of IEEE/ACM international conference on Advances in Social Network Analysis and Mining (ASONAM), 2014: 679-686.

  27. J. Zhang*, Y. Dong, D. Du, “Utilizing path dynamics for delay assurance in synchronized multihop scheduling,” in Proc. of IEEE Inter. Conference on Computer Communication and Networks (ICCCN), 2014: 1-6.

  28. G. Tian*, Z. Duan, T. Baumeister*, and Y. Dong, “Reroute on Loop in Anonymous Peer-to-Peer Content Sharing Networks,” in Proc. of 2014 IEEE Conference on Communications and Network Security (CNS), 2014.

  29. D. Wang*, L. Zhang, Z. Yuan*, Y. Xue, Y. Dong, “Characterizing Application Behaviors for Classifying P2P Traffic,” in Proc. of IEEE International Conference on Computing, Networking and Communications (ICNC), 2014.

  30. Yingfei Dong, Zhenhai Duan, ``Towards Private Cloud Storage in Public Clouds,'' NSFCloud Workshop on Experimental Support for Cloud Computing, Arlington, VA, December 11-12, 2014.

  31. Z. Yuan*, X. Chen, Y. Xue, Y. Dong, “Cloud-Entry: Elusive Tor Entry Points in Cloud,” poster, IEEE Symposium on Security and Privacy, 2014.

  32. T. Baumeister*, Y. Dong, Z. Duan, and G. Tian, “Using Randomized Routing to Counter Routing Table Insertion Attack on Freenet,” in Proc. of IEEE Globecom, Dec. 2013.

  33. G. Tian, Z. Duan, T. Baumeister*, Y. Dong, “Thwarting Traceback Attack on Freenet,” in Proc. of IEEE Globecom, Dec. 2013.

  34. C. Wang, C. Liu, X. Wang*, B. Liu*, Y. Dong, “Effectively Auditing IaaS Cloud Servers,” in Proc. of IEEE Globecom, Dec. 2013.

  35. Z. Yuan*, Y. Xue, Y. Dong, “Automated Signature Construction for Traffic Classification,” in Proc. of IEEE 1st Conference on Network Security (CNS), Oct. 2013.

  36. Y. Bao*, Y. Xue, Y. Dong, “A New Rumor Propagation Model and Control Strategy on Social Networks,” In Proc of IEEE/ACM international conference on Advances in Social Network Analysis and Mining (ASONAM), Oct. 2013.

  37. G. Tian, Z. Duan, T. Baumeister, Y. Dong, “A Traceback Attack on Freenet,” in Proc. of IEEE International Conference on Computer Communications (INFOCOM), April 2013.

  38. T. Baumeister*, Y. Dong, Z. Duan, and G. Tian, “A Routing Table Insertion Attack on Freenet,” in Proc. of 1st ASE Cyber Security Conference, Dec 2012.

  39. C. Li*, Y, Xue, Y. Dong, “Relay Recommendation System (RRS) and Selective Anonymity for Tor,” in Proc. of IEEE Globecom’12, CA, USA, Dec. 2012.

  40. D. Wang*, L. He, Y. Xue, Y. Dong, “Exploiting Artificial Immune Systems to Detect Unknown DoS attack in real-time,” in Proc. of 2nd IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS 2012), Oct. 2012.

  41. C. Li*, Y, Xue, Y. Dong, “Super Nodes in Tor: Existence and Security Implication,” in Proc. Annual Computer Security Applications Conference (ACSAC), Orlando, FL, Dec. 2011.

  42. D. Wang*, Y. Xue, Y. Dong, “Memory-Efficient Hypercube Flow Table for Packet Processing on Multi-Cores,” in Proc. of IEEE Globecom’11, Houston, USA, Dec. 2011.

  43. F. Sanchez, Z. Duan, Y. Dong, “Blocking Spam By Separating End-User Machines from Legitimate Mail Server Machines,” in Proc. 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Perth, Australia, Sept., 2011.

  44. Y. Wang, C. Wang, and Y. Dong, “A Novel Comprehensive Network Security Assessment Approach,” in Proc. of IEEE ICC’11, June 2011, Kyoto, Japan.

  45. D. Wang, Y. Xue, Y. Dong, “NNSA Novel Neighborhood Negative Selection Algorithm,” in Proc. of 2010 Conference on Dependable Computing (CDC’2010), Nov. 20-22, 2010.

  46. G. Sun, Y. Xue, Y. Dong, “A Novel Hybrid Method for Effectively Classifying Encrypted Traffic,” in Proc. of IEEE Globecom’10, Miami, Florida, Dec. 2010.

  47. C. Li, Y. Xue, Y. Dong, “HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic,” in Proc. of IEEE Globecom’10, Miami, Florida, Dec. 2010.

  48. F. Sanchez, Z. Duan, Y. Dong, “Understanding Forgery Properties of Spam Delivery Paths,” in Proc. 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS), Redmond, WA, July 13-14, 2010.

  49. Y. Dong, D. Du, “Towards Predictable Real-Time Delivery,” in Proc. of ICST Chinacom, Aug. 2009.

  50. Z. Duan, Y. Dong, “An Accurate and Efficient Email Traceback Framework for E-Crime Investigation,” ARO Workshop on Digital Forensics, Arlington, VA, USA, Sept.10-11, 2009.

  51. Z. Duan, H. Chen, Y. Dong, et al, “Detecting Spam Zombies by Monitoring Outgoing Messages,” in Proc. IEEE INFOCOM 2009, Rio de Janeiro, Brazil, April 19-25, 2009.

  52. E. Biagioni, Y. Dong. W. Peterson, and K. Sugihara, “Practical Distributed Voter-Verifiable Secret Ballot System,” in Proc. ACM SAC09, 2009.

  53. E. Biagioni, Y. Dong. W. Peterson, and K. Sugihara, “A Protocol for Secure Electronic Remote Voting,” in Proc. of Network and Service Security, 2009.

  54. Y. Dong, D. Du, and Feng Cao, “Better Services for More Secure Clients,” in Proc. of IEEE International Workshop on Mission Critical Networks (MCN), 2008.

  55. X. Liu*, and Y. Dong, “Intelligently Balancing Per-Hop Delay Allocation to Improve Network Utilization,” in Proc. of IEEE International Conference on Communications (ICC), 2008.

  56. V. Zeng*, Y. Dong, “Efficient Placement Schemes to Fully Utilize Peer Upstream Bandwidth,” in Proc. of IEEE International Conference on Communications (ICC), June 2007.

  57. A. Raghuveer*, Y. Dong, D. H.C. Du, “Reliable Live Video Streaming with Collaborative Clients,” in Proc. of ACM/SPIE Conference on Electronic Image/Multimedia Computing and Networking (MMCN), Jan 2007.

  58. Y. Dong, “Distributed Active Filtering for Protecting Critical Servers,” in Proc. of IEEE International Conference on Computer Communication Networks (ICCCN), Oct. 2006.

  59. Z. Duan, Y. Dong, K. Gopalan, “DMTP: Controlling Spam through Message Delivery Differentiation,” IFIP International Conference on Networking, May 2006.

  60. Y. Dong, E. Kusmierek, D. Du, Z. Duan, “Exploiting Limited Upstream Bandwidth in Peer-to-Peer Streaming,” IEEE International Conference on Multimedia and Expo (ICME), July 6-8, 2005.

  61. Z. Duan, Y. Dong, K. Gopalan, “DiffMail: A Differentiated Message Delivery Architecture to Control Spam,” in Proc. of the First International Workshop on Security in Networks and Distributed Systems (SNDS05), Fukuoka, Japan, July 2005.

  62. Z. Duan, K. Gopalan, Y. Dong, “Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic,” in Proc. of USENIX SRUTI 2005 Workshop, MIT, Cambridge, MA, July 2005.

  63. C. Choi, Y. Dong, Z. Zhang, “LIPS: Lightweight Internet Permit System Stopping Unwanted Traffic,” IFIP International Conference of Networking'05, May 2005.

  64. E. Kusmierek, Y. Dong, D. Du, “Loopback: Exploiting Collaborative Clients for Large-Scale Streaming,” in Proc. of ACM/SPIE Conference on Electronic Image/Multimedia Computing and Networking, Jan. 2005.

  65. Y. Dong, E. Kusmierek, D. Du, “A Hybrid Peer-Assisted Streaming Architecture: Modeling and Analysis,” International Conference on Internet Multimedia Systems and App., Aug. 2004.

  66. Y. Dong, C. Choi, Z. Zhang “Secure Name Service: A Framework for Protecting Critical Internet Resources,” in Proc. of IFIP Networking 2004, Athens, Greece, May 2004.

  67. Y. Dong, Z. Zhang, D. Du, “Maximizing the Profits of VOD service on Broadband Cable Networks,” in Proc. of IEEE Globecom, San Francisco, Dec. 2003.

  68. Y. Dong, Z.-L. Zhang, and D. H.-C. Du, “Optimal Scheduling and Adaptation for VOD Service on Broadband Cable Networks,” Packet Video 2003, Nantes, France, Apr. 2003.

  69. Y. Dong, Z.-L. Zhang, and D. H.-C. Du, “Analysis of Allocation Map Scheduling in DOCSIS,” IEEE International Symposium of High Performance Interconnects (Hot Interconnects 10), Stanford, CA, Aug. 2002.

  70. Y. Dong, and Z.-L. Zhang, “Assured Multimedia Distribution on Overlay Networks,” IEEE International Conference on Telecommunications, Beijing, June 2002.

  71. Y. Dong, R. Rakshe, and Z.-L. Zhang, “Providing Quality Assurance in Video Streaming across Best-Effort Wide-Area Network,” IEEE Packet Video International Workshop, Pittsburgh, PA, Apr. 2002.

  72. Y. Dong, Z.-L. Zhang and Y. Hou, “Server-Based Dynamic Server Selection Algorithms for Enterprise Networks,” in Proc of IEEE 16th International Conference on Information Networking (ICOIN-16), Jan. 2002.

  73. Z.-L. Zhang and Y. Dong, “Coordinated TCP/UDP Rate Control for Proxy-Assisted Video Streaming,” Workshop on the Modeling of Flow and Congestion Control Mechanisms, INRIA, France, Sept.4-6, 2000.

  74. Y. Dong, Y. Hou and Z.-L. Zhang, “A Server-based Performance Measurement tool within Enterprise Networks,” in Proc. of IFIP Performance'99, Istanbul, Turkey, 1999.

  75. X. Du, Y. Dong and X. Zhang, “Efficient Local Scheduling of Parallel Tasks and Communications on Heterogeneous Network of Workstations,” in Proc. of Annual European Conference on Parallel Processing (EurPar'97) 1997.

  76. X. Du, Y. Dong and X. Zhang, “Characterizing Communication Interactions of Parallel and Sequential Jobs on ATM Networks of Workstations,” in Proc. of IEEE International Conference on Communications (ICC), Canada, 1997.

  77. Y. Dong, et al., “Exact Computing the mean Minimal Path Length of 2-D Mesh,” Proc. of the Second Chinese Young Scientists Conference, pp.140-145, Beijing, July 1995.

  78. Y. Dong, et al., “The Design of A T9000-based Parallel Accelerator,” Proc. of Chinese National Computer Architecture Conference'93, Guangzhou, 1993.

US Patents

    • E. Biagioni, Y. Dong. W. Peterson, and K. Sugihara, “A framework for Secure Electronic Remote Voting”, filed for patent, Feb. 2014.

    • Z. Duan, Y. Dong, “An Accurate Method to Identify End-user Machines for Blocking Spam,” filed for provisional patent, 2011

    • Z. Duan, Y. Dong, “Detecting Spam Bots”, filed for provisional patent, April, 2009.

    • E. Biagioni, Y. Dong. W. Peterson, and K. Sugihara, “A framework for Secure Electronic Remote Voting”, filed for provisional patent, Mar. 2008.

    • US Patent 6,901,051, Y. Thomas Hou, Yingfei Dong, Tomohiko Taniguchi, “Server-based network performance metrics generation system and method,” issued on May 31, 2005

IETF Internet Draft

  • Zhenhai Duan, Yingfei Dong, Kartik Gopalan, Receiver-Driven Extensions to SMTP [I-D], draft-duan-smtp-receiver-driven-00.txt, IETF Internet Draft. May 2005.

Recent student Dissertations and Thesis

  • Wenxin Chen, SECURITY INVESTIGATION OF DRONE CONTROL ALGORITHMS, PhD Dissertation, July 2021

  • Jianqiu Cao, PRACTICAL GPS SPOOFING ATTACKS ON CONSUMER DRONES, Master Thesis, University of Hawaii, Dec. 2020.