default search action
Peng Gao 0008
Person information
- affiliation: Virginia Tech, Department of Computer Science, Blacksburg, VA, USA
- affiliation (2019 - 2021): University of California Berkeley, CA, USA
- affiliation (PhD 2019): Princeton University, NJ, USA
Other persons with the same name
- Peng Gao — disambiguation page
- Peng Gao 0001 — China Mobile Group Design Institute Co., Ltd, Division of Research, China
- Peng Gao 0002 — University of South Carolina, Department of Geography, Columbia, SC, USA
- Peng Gao 0003 — University at Buffalo, Department of Geography, NY, USA
- Peng Gao 0004 — Jilin University, Institute of Mathematics, Changchun, China
- Peng Gao 0005 — Qufu Normal University, School of Cyber Science and Engineering, China (and 1 more)
- Peng Gao 0006 — Berlin Institute of Technology, Germany
- Peng Gao 0007 — Shanghai Artificial Intelligence Laboratory, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Peng Gao, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Dawn Song:
ThreatKG: An AI-Powered System for Automated Open-Source Cyber Threat Intelligence Gathering and Management. LAMPS@CCS 2024: 1-12 - 2023
- [c17]Myeongseob Ko, Xinyu Yang, Zhengjie Ji, Hoang Anh Just, Peng Gao, Anoop Kumar, Ruoxi Jia:
PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models. RAID 2023: 264-281 - [i16]Pengcheng Fang, Peng Gao, Yun Peng, Qingzhao Zhang, Tao Xie, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao:
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. CoRR abs/2307.08912 (2023) - 2022
- [j2]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [c16]Zhengjie Ji, Edward Choi, Peng Gao:
A Knowledge Base Question Answering System for Cyber Threat Knowledge Acquisition. ICDE 2022: 3158-3161 - [c15]Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:
Back-Propagating System Dependency Impact for Attack Investigation. USENIX Security Symposium 2022: 2461-2478 - [c14]Lun Wang, Usmann Khan, Joseph P. Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song:
PrivGuard: Privacy Regulation Compliance Made Easier. USENIX Security Symposium 2022: 3753-3770 - [i15]Xinyu Yang, Haoyuan Liu, Ziyu Wang, Peng Gao:
Zebra: Deeply Integrating System-Level Provenance Search and Tracking for Efficient Attack Investigation. CoRR abs/2211.05403 (2022) - [i14]Peng Gao, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song:
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management. CoRR abs/2212.10388 (2022) - 2021
- [c13]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - [c12]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - [c11]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c10]Peng Gao, Xiaoyuan Liu, Edward Choi, Bhavna Soman, Chinmaya Mishra, Kate Farris, Dawn Song:
A System for Automated Open-Source Threat Intelligence Gathering and Management. SIGMOD Conference 2021: 2716-2720 - [i13]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - [i12]Peng Gao, Xiaoyuan Liu, Edward Choi, Bhavna Soman, Chinmaya Mishra, Kate Farris, Dawn Song:
A System for Automated Open-Source Threat Intelligence Gathering and Management. CoRR abs/2101.07769 (2021) - [i11]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - 2020
- [c9]Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, Prateek Mittal:
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection. ICDE 2020: 1774-1777 - [i10]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. CoRR abs/2010.13637 (2020) - [i9]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [b1]Peng Gao:
Effective and Efficient Forensic Analysis via System Monitoring. Princeton University, USA, 2019 - [j1]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Proc. VLDB Endow. 12(12): 1802-1805 (2019) - [c8]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c7]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c6]Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, Peng Gao:
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. ICSE 2019: 257-268 - [c5]Lun Wang, Joseph P. Near, Neel Somani, Peng Gao, Andrew Low, David Dao, Dawn Song:
Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations. Poly/DMAH@VLDB 2019: 3-23 - [i8]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security. CoRR abs/1903.08159 (2019) - [i7]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - [i6]Lun Wang, Joseph P. Near, Neel Somani, Peng Gao, Andrew Low, David Dao, Dawn Song:
Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations. CoRR abs/1909.00077 (2019) - 2018
- [c4]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SYBILFUSE: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CNS 2018: 1-9 - [c3]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX ATC 2018: 113-126 - [c2]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. USENIX Security Symposium 2018: 639-656 - [i5]Peng Gao, Binghui Wang, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection. CoRR abs/1803.06772 (2018) - [i4]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i3]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. CoRR abs/1806.09339 (2018) - [i2]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - 2015
- [c1]Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal:
Exploiting Temporal Dynamics in Sybil Defenses. CCS 2015: 805-816 - [i1]Peng Gao, Neil Zhenqiang Gong, Sanjeev R. Kulkarni, Kurt Thomas, Prateek Mittal:
SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection. CoRR abs/1503.02985 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint