Yong Guan - Academia.edu (original) (raw)

Uploads

Papers by Yong Guan

Research paper thumbnail of Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

The conventional information leakage metrics assume that an adversary has complete knowledge of t... more The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system. The only uncertainty arises from the specific realizations that are drawn from this distribution. This assumption does not hold in various practical scenarios where an adversary usually lacks complete information about the joint statistics of the private, utility, and the disclosed data. As a result, the typical information leakage metrics fail to measure the leakage appropriately. In this paper, we introduce multiple new versions of the traditional information-theoretic leakage metrics, that aptly represent information leakage for an adversary who lacks complete knowledge of the joint data statistics, and we provide insights into the potential uses of each. We experiment on a real-world dataset to further demonstrate how the introduced leakage metrics compare with the conv...

Research paper thumbnail of Forensic Analysis of Android Steganography Apps

Advances in Digital Forensics XIV, 2018

Research paper thumbnail of An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications

Fourth IEEE International Symposium on Network Computing and Applications, 2005

Research paper thumbnail of A Framework for Email Investigations

IFIP — The International Federation for Information Processing

Research paper thumbnail of Detecting hidden communities in online auction networks

2012 46th Annual Conference on Information Sciences and Systems (CISS), 2012

Research paper thumbnail of A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks

IEEE/ACM Transactions on Networking, 2010

Research paper thumbnail of An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks

IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2008

Research paper thumbnail of From Offline Towards Real-Time Verification for Robot Systems

IEEE Transactions on Industrial Informatics, 2018

Research paper thumbnail of Dependable Model-driven Development of CPS

ACM Transactions on Cyber-Physical Systems, 2019

Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, ... more Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, the Simulink-based development starts with Stateflow modeling, followed by simulation, validation, and code generation mapped to physical execution platforms. However, recent trends have raised the demands of rigorous verification on safety-critical applications to prevent intrinsic development faults and improve the system dependability, which is unfortunately challenging. Even though the constructed Stateflow model and the generated code pass the validation of Simulink Design Verifier and Simulink Polyspace, respectively, the system may still fail due to some implicit defects contained in the design model (design defect) and the generated code (implementation defects). In this article, we bridge the Stateflow-based MDD and a well-defined rigorous verification to reduce development faults. First, we develop a self-contained toolkit to translate a Stateflow model into timed automata, whe...

Research paper thumbnail of Wireless and Sensor Networks Security (WSNS) A Retrospection

2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007

Research paper thumbnail of Detection of stepping stone attack under delay and chaff perturbations

2006 IEEE International Performance Computing and Communications Conference, 2006

Research paper thumbnail of Customizing GPSR for wireless sensor networks

2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)

Research paper thumbnail of On TCP Performance in Flow-Based Mix Networks

Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), 2007

Research paper thumbnail of A Novel Architecture for Secure and Scalable Multicast over IP Network

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

Research paper thumbnail of Evidence Collection in Peer-to-Peer Network Investigations

IFIP Advances in Information and Communication Technology, 2012

Research paper thumbnail of Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection

2010 IEEE 30th International Conference on Distributed Computing Systems, 2010

Research paper thumbnail of Spectrum decision for efficient routing in cognitive radio network

2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 2012

Research paper thumbnail of A cross-layer routing protocol (CLRP) for cognitive radio network

2013 IEEE Global Communications Conference (GLOBECOM), 2013

Research paper thumbnail of An optimal strategy for anonymous communication protocols

Proceedings 22nd International Conference on Distributed Computing Systems

Research paper thumbnail of TOPO: A Topology-aware Single Packet Attack Traceback Scheme

2006 Securecomm and Workshops, 2006

Research paper thumbnail of Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

The conventional information leakage metrics assume that an adversary has complete knowledge of t... more The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system. The only uncertainty arises from the specific realizations that are drawn from this distribution. This assumption does not hold in various practical scenarios where an adversary usually lacks complete information about the joint statistics of the private, utility, and the disclosed data. As a result, the typical information leakage metrics fail to measure the leakage appropriately. In this paper, we introduce multiple new versions of the traditional information-theoretic leakage metrics, that aptly represent information leakage for an adversary who lacks complete knowledge of the joint data statistics, and we provide insights into the potential uses of each. We experiment on a real-world dataset to further demonstrate how the introduced leakage metrics compare with the conv...

Research paper thumbnail of Forensic Analysis of Android Steganography Apps

Advances in Digital Forensics XIV, 2018

Research paper thumbnail of An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications

Fourth IEEE International Symposium on Network Computing and Applications, 2005

Research paper thumbnail of A Framework for Email Investigations

IFIP — The International Federation for Information Processing

Research paper thumbnail of Detecting hidden communities in online auction networks

2012 46th Annual Conference on Information Sciences and Systems (CISS), 2012

Research paper thumbnail of A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks

IEEE/ACM Transactions on Networking, 2010

Research paper thumbnail of An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks

IEEE INFOCOM 2008 - The 27th Conference on Computer Communications, 2008

Research paper thumbnail of From Offline Towards Real-Time Verification for Robot Systems

IEEE Transactions on Industrial Informatics, 2018

Research paper thumbnail of Dependable Model-driven Development of CPS

ACM Transactions on Cyber-Physical Systems, 2019

Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, ... more Simulink is widely used for model-driven development (MDD) of cyber-physical systems. Typically, the Simulink-based development starts with Stateflow modeling, followed by simulation, validation, and code generation mapped to physical execution platforms. However, recent trends have raised the demands of rigorous verification on safety-critical applications to prevent intrinsic development faults and improve the system dependability, which is unfortunately challenging. Even though the constructed Stateflow model and the generated code pass the validation of Simulink Design Verifier and Simulink Polyspace, respectively, the system may still fail due to some implicit defects contained in the design model (design defect) and the generated code (implementation defects). In this article, we bridge the Stateflow-based MDD and a well-defined rigorous verification to reduce development faults. First, we develop a self-contained toolkit to translate a Stateflow model into timed automata, whe...

Research paper thumbnail of Wireless and Sensor Networks Security (WSNS) A Retrospection

2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007

Research paper thumbnail of Detection of stepping stone attack under delay and chaff perturbations

2006 IEEE International Performance Computing and Communications Conference, 2006

Research paper thumbnail of Customizing GPSR for wireless sensor networks

2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975)

Research paper thumbnail of On TCP Performance in Flow-Based Mix Networks

Third IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC 2007), 2007

Research paper thumbnail of A Novel Architecture for Secure and Scalable Multicast over IP Network

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

Research paper thumbnail of Evidence Collection in Peer-to-Peer Network Investigations

IFIP Advances in Information and Communication Technology, 2012

Research paper thumbnail of Sketch-Based Streaming PCA Algorithm for Network-Wide Traffic Anomaly Detection

2010 IEEE 30th International Conference on Distributed Computing Systems, 2010

Research paper thumbnail of Spectrum decision for efficient routing in cognitive radio network

2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 2012

Research paper thumbnail of A cross-layer routing protocol (CLRP) for cognitive radio network

2013 IEEE Global Communications Conference (GLOBECOM), 2013

Research paper thumbnail of An optimal strategy for anonymous communication protocols

Proceedings 22nd International Conference on Distributed Computing Systems

Research paper thumbnail of TOPO: A Topology-aware Single Packet Attack Traceback Scheme

2006 Securecomm and Workshops, 2006

Log In