I'm interested in all aspects of network and system security. To solve practical security problems, I use networking and system techniques, as well as applied cryptography, machine learning, probability/statistics, information theory, etc.
Yu, S., Gu, G., Barnawi, A., Guo, S., & Stojmenovic, I.
(2015).Malware Propagation in Large-Scale Networks. IEEE Transactions on Knowledge and Data Engineering.
27(1), 170-179.
Zhang, J., Notani, J., & Gu, G.
(2015).Characterizing Google Hacking: A First Large-Scale Quantitative Study. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.
International Conference on Security and Privacy in Communication Networks.
(pp. 602-622).
Springer Nature.
Gu, G.
(2011).Botnet Detection in Enterprise Networks. van Tilborg, H., & Jajodia, S. (Eds.),
Encyclopedia of Cryptography and Security.
(pp. 166-168).
Springer Nature.
Dagon, D., Gu, G., & Lee, C. P.
A Taxonomy of Botnet Structures. Lee, W., Wang, C., & Dagon, D. (Eds.),
Botnet Detection.
(pp. 143-164).
Springer US.
Mendoza, A., & Gu, G.
(2018).Mobile Application Web API Reconnaissance: Web-to-Mobile Inconsistencies & Vulnerabilities. Proceedings / IEEE Symposium on Security and Privacy; sponsored by IEEE Computer Society, IEEE Computer Society Technical Committee on Security and Privacy in cooperation with the International Association for Cryptologic Research (IARC....
756-769.
Xu, Z., Nappa, A., Baykov, R., Yang, G., Caballero, J., & Gu, G.
(2014).AUTOPROBE. Proceedings of the ACM Conference on Computer and Communications Security.
179-190.
Yang, Z., Yang, M., Zhang, Y., Gu, G., Ning, P., & Wang, X. S.
(2013).AppIntent. Proceedings of the ACM Conference on Computer and Communications Security.
1043-1054.
Amleshwaram, A. A., Reddy, N., Yadav, S., Gu, G., & Yang, C.
(2013).CATS: Characterizing Automation of Twitter Spammers. International Conference on Communication Systems and Networks : [proceedings]. International Conference on Communication Systems and Networks.
1-10.
Wang, T., Wei, T., Gu, G., & Zou, W.
(2010).TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. Proceedings / IEEE Symposium on Security and Privacy; sponsored by IEEE Computer Society, IEEE Computer Society Technical Committee on Security and Privacy in cooperation with the International Association for Cryptologic Research (IARC....
497-512.