BibTeX records: Danfeng Yao

download as .bib file

@article{DBLP:journals/cacm/Yao24,
  author       = {Danfeng (Daphne) Yao},
  title        = {Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research},
  journal      = {Commun. {ACM}},
  volume       = {67},
  number       = {1},
  pages        = {47--49},
  year         = {2024},
  url          = {https://doi.org/10.1145/3624722},
  doi          = {10.1145/3624722},
  timestamp    = {Sun, 28 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Yao24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/XiaoSAGVMY24,
  author       = {Ya Xiao and
                  Wenjia Song and
                  Salman Ahmed and
                  Xinyang Ge and
                  Bimal Viswanath and
                  Na Meng and
                  Danfeng (Daphne) Yao},
  title        = {Measurement of Embedding Choices on Cryptographic {API} Completion
                  Tasks},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {33},
  number       = {3},
  pages        = {56:1--56:30},
  year         = {2024},
  url          = {https://doi.org/10.1145/3625291},
  doi          = {10.1145/3625291},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/XiaoSAGVMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/JacobsCAYD23,
  author       = {Edward J. Jacobs and
                  Sabrina N. Campelo and
                  Kenneth N. Aycock and
                  Danfeng Yao and
                  Rafael V. Davalos},
  title        = {Spatiotemporal estimations of temperature rise during electroporation
                  treatments using a deep neural network},
  journal      = {Comput. Biol. Medicine},
  volume       = {161},
  pages        = {107019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compbiomed.2023.107019},
  doi          = {10.1016/J.COMPBIOMED.2023.107019},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/JacobsCAYD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhangKXYM23,
  author       = {Ying Zhang and
                  Md Mahir Asef Kabir and
                  Ya Xiao and
                  Danfeng Yao and
                  Na Meng},
  title        = {Automatic Detection of Java Cryptographic {API} Misuses: Are We There
                  Yet?},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {1},
  pages        = {288--303},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3150302},
  doi          = {10.1109/TSE.2022.3150302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhangKXYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AfroseXRMY23,
  author       = {Sharmin Afrose and
                  Ya Xiao and
                  Sazzadur Rahaman and
                  Barton P. Miller and
                  Danfeng Yao},
  title        = {Evaluation of Static Vulnerability Detection Tools With Java Cryptographic
                  {API} Benchmarks},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {2},
  pages        = {485--497},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3154717},
  doi          = {10.1109/TSE.2022.3154717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AfroseXRMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/XiaoSQVMY23,
  author       = {Ya Xiao and
                  Wenjia Song and
                  Jingyuan Qi and
                  Bimal Viswanath and
                  Patrick D. McDaniel and
                  Danfeng Yao},
  title        = {Specializing Neural Networks for Cryptographic Code Completion Applications},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {6},
  pages        = {3524--3535},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2023.3265362},
  doi          = {10.1109/TSE.2023.3265362},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/XiaoSQVMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RahamanFMY23,
  author       = {Sazzadur Rahaman and
                  Miles Frantz and
                  Barton P. Miller and
                  Danfeng (Daphne) Yao},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {SpanL: Creating Algorithms for Automatic {API} Misuse Detection with
                  Program Analysis Compositions},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {515--529},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_28},
  doi          = {10.1007/978-3-031-41181-6\_28},
  timestamp    = {Mon, 16 Oct 2023 19:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/RahamanFMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WeeksCAKYV23,
  author       = {Connor Weeks and
                  Aravind Cheruvu and
                  Sifat Muhammad Abdullah and
                  Shravya Kanchi and
                  Daphne Yao and
                  Bimal Viswanath},
  title        = {A First Look at Toxicity Injection Attacks on Open-domain Chatbots},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {521--534},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627122},
  doi          = {10.1145/3627106.3627122},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WeeksCAKYV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SweatY23,
  author       = {Wyatt Sweat and
                  Danfeng (Daphne) Yao},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Poster: Cybersecurity Usage in the Wild: {A} look at Deployment Challenges
                  in Intrusion Detection and Alert Handling},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {3606--3608},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3624375},
  doi          = {10.1145/3576915.3624375},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SweatY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/HajialigolKBYN023,
  author       = {Daniel Hajialigol and
                  Derek Kaknes and
                  Tanner Barbour and
                  Daphne Yao and
                  Chris North and
                  Jimeng Sun and
                  David Liem and
                  Xuan Wang},
  editor       = {Yansong Feng and
                  Els Lefever},
  title        = {DRGCoder: Explainable Clinical Coding for the Early Prediction of
                  Diagnostic-Related Groups},
  booktitle    = {Proceedings of the 2023 Conference on Empirical Methods in Natural
                  Language Processing, {EMNLP} 2023 - System Demonstrations, Singapore,
                  December 6-10, 2023},
  pages        = {373--380},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.emnlp-demo.34},
  doi          = {10.18653/V1/2023.EMNLP-DEMO.34},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/HajialigolKBYN023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0001LJHAY23,
  author       = {Salman Ahmed and
                  Hans Liljestrand and
                  Hani Jamjoom and
                  Matthew Hicks and
                  N. Asokan and
                  Danfeng Yao},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Not All Data are Created Equal: Data and Pointer Prioritization for
                  Scalable Protection Against Data-Oriented Attacks},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {1433--1450},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed-salman},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/0001LJHAY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-02270,
  author       = {Wenjia Song and
                  Sanjula Karanam and
                  Ya Xiao and
                  Jingyuan Qi and
                  Nathan Dautenhahn and
                  Na Meng and
                  Danfeng Yao},
  title        = {Crypto-ransomware Detection through Quantitative API-based Behavioral
                  Profiling},
  journal      = {CoRR},
  volume       = {abs/2306.02270},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.02270},
  doi          = {10.48550/ARXIV.2306.02270},
  eprinttype    = {arXiv},
  eprint       = {2306.02270},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-02270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-00710,
  author       = {Ying Zhang and
                  Wenjia Song and
                  Zhengjie Ji and
                  Danfeng Yao and
                  Na Meng},
  title        = {How well does {LLM} generate security tests?},
  journal      = {CoRR},
  volume       = {abs/2310.00710},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.00710},
  doi          = {10.48550/ARXIV.2310.00710},
  eprinttype    = {arXiv},
  eprint       = {2310.00710},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-00710.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-08428,
  author       = {Tahmina Sultana Priya and
                  Fan Leng and
                  Anthony C. Luehrs and
                  Eric W. Klee and
                  Alina M. Allen and
                  Konstantinos N. Lazaridis and
                  Danfeng Yao and
                  Shulan Tian},
  title        = {Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with
                  Genetic Factors for Insights into the Complex Disease},
  journal      = {CoRR},
  volume       = {abs/2311.08428},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.08428},
  doi          = {10.48550/ARXIV.2311.08428},
  eprinttype    = {arXiv},
  eprint       = {2311.08428},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-08428.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/AhmedXCFYY22,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng Daphne Yao},
  title        = {Privacy Guarantees of Bluetooth Low Energy Contact Tracing: {A} Case
                  Study on {COVIDWISE}},
  journal      = {Computer},
  volume       = {55},
  number       = {2},
  pages        = {54--62},
  year         = {2022},
  url          = {https://doi.org/10.1109/MC.2021.3125611},
  doi          = {10.1109/MC.2021.3125611},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/AhmedXCFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LuoXCPY21,
  author       = {Yuan Luo and
                  Ya Xiao and
                  Long Cheng and
                  Guojun Peng and
                  Danfeng (Daphne) Yao},
  title        = {Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress
                  and Opportunities},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {5},
  pages        = {106:1--106:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3453155},
  doi          = {10.1145/3453155},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/LuoXCPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YaoRXAFTMCZAKMH22,
  author       = {Danfeng Daphne Yao and
                  Sazzadur Rahaman and
                  Ya Xiao and
                  Sharmin Afrose and
                  Miles Frantz and
                  Ke Tian and
                  Na Meng and
                  Cristina Cifuentes and
                  Yang Zhao and
                  Nicholas Allen and
                  Nathan Keynes and
                  Barton P. Miller and
                  Elisa Heymann and
                  Murat Kantarcioglu and
                  Fahad Shaon},
  title        = {Being the Developers' Friend: Our Experience Developing a High-Precision
                  Tool for Secure Coding},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {6},
  pages        = {43--52},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3159481},
  doi          = {10.1109/MSEC.2022.3159481},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YaoRXAFTMCZAKMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahamanCCY22,
  author       = {Sazzadur Rahaman and
                  Haipeng Cai and
                  Omar Chowdhury and
                  Danfeng Yao},
  title        = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations
                  in {C/C++}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {3790--3803},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3108031},
  doi          = {10.1109/TDSC.2021.3108031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahamanCCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AhmedXCFYY22,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong (Tijay) Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng (Daphne) Yao},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Privacy Guarantees of {BLE} Contact Tracing for {COVID-19} and Beyond:
                  {A} Case Study on {COVIDWISE}},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1210--1212},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527279},
  doi          = {10.1145/3488932.3527279},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AhmedXCFYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/XiaoAGVMY22,
  author       = {Ya Xiao and
                  Salman Ahmed and
                  Xinyang Ge and
                  Bimal Viswanath and
                  Na Meng and
                  Danfeng Daphne Yao},
  title        = {Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic
                  {API} Completion},
  booktitle    = {44th {IEEE/ACM} International Conference on Software Engineering:
                  Companion Proceedings, {ICSE} Companion 2022, Pittsburgh, PA, USA,
                  May 22-24, 2022},
  pages        = {360--361},
  publisher    = {{ACM/IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510454.3528645},
  doi          = {10.1145/3510454.3528645},
  timestamp    = {Thu, 27 Oct 2022 16:07:05 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/XiaoAGVMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpc/ZhangXKY022,
  author       = {Ying Zhang and
                  Ya Xiao and
                  Md Mahir Asef Kabir and
                  Danfeng (Daphne) Yao and
                  Na Meng},
  editor       = {Ayushi Rastogi and
                  Rosalia Tufano and
                  Gabriele Bavota and
                  Venera Arnaoudova and
                  Sonia Haiduc},
  title        = {Example-based vulnerability detection and repair in Java code},
  booktitle    = {Proceedings of the 30th {IEEE/ACM} International Conference on Program
                  Comprehension, {ICPC} 2022, Virtual Event, May 16-17, 2022},
  pages        = {190--201},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3524610.3527895},
  doi          = {10.1145/3524610.3527895},
  timestamp    = {Wed, 26 Oct 2022 14:48:55 +0200},
  biburl       = {https://dblp.org/rec/conf/iwpc/ZhangXKY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/XiaoZAKYC22,
  author       = {Ya Xiao and
                  Yang Zhao and
                  Nicholas Allen and
                  Nathan Keynes and
                  Danfeng Yao and
                  Cristina Cifuentes},
  title        = {Industrial Strength Static Detection for Cryptographic {API} Misuses},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {61--62},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00022},
  doi          = {10.1109/SECDEV53368.2022.00022},
  timestamp    = {Tue, 20 Dec 2022 15:29:05 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/XiaoZAKYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/KabirWY022,
  author       = {Md Mahir Asef Kabir and
                  Ying Wang and
                  Danfeng Yao and
                  Na Meng},
  title        = {How Do Developers Follow Security-Relevant Best Practices When Using
                  {NPM} Packages?},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA,
                  October 18-20, 2022},
  pages        = {77--83},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SecDev53368.2022.00027},
  doi          = {10.1109/SECDEV53368.2022.00027},
  timestamp    = {Sat, 15 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/KabirWY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-09009,
  author       = {Ying Zhang and
                  Ya Xiao and
                  Md Mahir Asef Kabir and
                  Danfeng Yao and
                  Na Meng},
  title        = {Example-Based Vulnerability Detection and Repair in Java Code},
  journal      = {CoRR},
  volume       = {abs/2203.09009},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.09009},
  doi          = {10.48550/ARXIV.2203.09009},
  eprinttype    = {arXiv},
  eprint       = {2203.09009},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-09009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Yao21,
  author       = {Danfeng (Daphne) Yao},
  title        = {Depth and persistence: what researchers need to know about impostor
                  syndrome},
  journal      = {Commun. {ACM}},
  volume       = {64},
  number       = {6},
  pages        = {39--42},
  year         = {2021},
  url          = {https://doi.org/10.1145/3437255},
  doi          = {10.1145/3437255},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/Yao21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/YaoB21,
  author       = {Danfeng Daphne Yao and
                  Terry Benzel},
  title        = {{ACSAC} 2020: Furthering the Quest to Tackle Hard Problems and Find
                  Practical Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {19},
  number       = {6},
  pages        = {23--24},
  year         = {2021},
  url          = {https://doi.org/10.1109/MSEC.2021.3106595},
  doi          = {10.1109/MSEC.2021.3106595},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/YaoB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LuoCHPY21,
  author       = {Yuan Luo and
                  Long Cheng and
                  Hongxin Hu and
                  Guojun Peng and
                  Danfeng Yao},
  title        = {Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart
                  Home IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {4},
  pages        = {2736--2750},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3019812},
  doi          = {10.1109/JIOT.2020.3019812},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LuoCHPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0005TYSB21,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng Daphne Yao and
                  Lui Sha and
                  Raheem A. Beyah},
  title        = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {825--842},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2906161},
  doi          = {10.1109/TDSC.2019.2906161},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChengALNCJAY21,
  author       = {Long Cheng and
                  Salman Ahmed and
                  Hans Liljestrand and
                  Thomas Nyman and
                  Haipeng Cai and
                  Trent Jaeger and
                  N. Asokan and
                  Danfeng (Daphne) Yao},
  title        = {Exploitation Techniques for Data-oriented Attacks with Existing and
                  Potential Defense Approaches},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {4},
  pages        = {26:1--26:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3462699},
  doi          = {10.1145/3462699},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChengALNCJAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Yao21,
  author       = {Danfeng (Daphne) Yao},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Measurable and Deployable Security: Gaps, Successes, and Opportunities},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450328},
  doi          = {10.1145/3422337.3450328},
  timestamp    = {Wed, 21 Apr 2021 10:54:09 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Yao21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AfroseYK21,
  author       = {Sharmin Afrose and
                  Danfeng Daphne Yao and
                  Olivera Kotevska},
  title        = {Measurement of Local Differential Privacy Techniques for IoT-based
                  Streaming Data},
  booktitle    = {18th International Conference on Privacy, Security and Trust, {PST}
                  2021, Auckland, New Zealand, December 13-15, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PST52912.2021.9647839},
  doi          = {10.1109/PST52912.2021.9647839},
  timestamp    = {Tue, 28 Dec 2021 14:39:32 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AfroseYK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Ahmed0LAY21,
  author       = {Salman Ahmed and
                  Long Cheng and
                  Hans Liljestrand and
                  N. Asokan and
                  Danfeng Daphne Yao},
  title        = {Tutorial: Investigating Advanced Exploits for System Security Assurance},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA,
                  October 18-20, 2021},
  pages        = {3--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SecDev51306.2021.00013},
  doi          = {10.1109/SECDEV51306.2021.00013},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/Ahmed0LAY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-06994,
  author       = {Ying Zhang and
                  Mahir Kabir and
                  Ya Xiao and
                  Danfeng Yao and
                  Na Meng},
  title        = {Data-Driven Vulnerability Detection and Repair in Java Code},
  journal      = {CoRR},
  volume       = {abs/2102.06994},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.06994},
  eprinttype    = {arXiv},
  eprint       = {2102.06994},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-06994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08747,
  author       = {Ya Xiao and
                  Salman Ahmed and
                  Wenjia Song and
                  Xinyang Ge and
                  Bimal Viswanath and
                  Danfeng Yao},
  title        = {Embedding Code Contexts for Cryptographic {API} Suggestion: New Methodologies
                  and Comparisons},
  journal      = {CoRR},
  volume       = {abs/2103.08747},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08747},
  eprinttype    = {arXiv},
  eprint       = {2103.08747},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08842,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Taejoong Chung and
                  Carol J. Fung and
                  Moti Yung and
                  Danfeng Yao},
  title        = {Privacy Guarantees of {BLE} Contact Tracing: {A} Case Study on {COVIDWISE}},
  journal      = {CoRR},
  volume       = {abs/2111.08842},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08842},
  eprinttype    = {arXiv},
  eprint       = {2111.08842},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-04037,
  author       = {Sharmin Afrose and
                  Ya Xiao and
                  Sazzadur Rahaman and
                  Barton P. Miller and
                  Danfeng Yao},
  title        = {Evaluation of Static Vulnerability Detection Tools with Java Cryptographic
                  {API} Benchmarks},
  journal      = {CoRR},
  volume       = {abs/2112.04037},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.04037},
  eprinttype    = {arXiv},
  eprint       = {2112.04037},
  timestamp    = {Mon, 13 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-04037.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianTRY20,
  author       = {Ke Tian and
                  Gang Tan and
                  Barbara G. Ryder and
                  Danfeng (Daphne) Yao},
  title        = {Prioritizing data flows and sinks for app security transformation},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101750},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101750},
  doi          = {10.1016/J.COSE.2020.101750},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TianTRY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TianYRTP20,
  author       = {Ke Tian and
                  Danfeng Yao and
                  Barbara G. Ryder and
                  Gang Tan and
                  Guojun Peng},
  title        = {Detection of Repackaged Android Malware with Code-Heterogeneity Features},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {64--77},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2745575},
  doi          = {10.1109/TDSC.2017.2745575},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ElishCBYR20,
  author       = {Karim O. Elish and
                  Haipeng Cai and
                  Daniel Barton and
                  Danfeng Yao and
                  Barbara G. Ryder},
  title        = {Identifying Mobile Inter-App Communication Risks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {90--102},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2018.2889495},
  doi          = {10.1109/TMC.2018.2889495},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ElishCBYR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AhmedXSTMY20,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Kevin Z. Snow and
                  Gang Tan and
                  Fabian Monrose and
                  Danfeng (Daphne) Yao},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Methodologies for Quantifying (Re-)randomization Security and Timing
                  under {JIT-ROP}},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1803--1820},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417248},
  doi          = {10.1145/3372297.3417248},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AhmedXSTMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/RahamanXATFMMSK20,
  author       = {Sazzadur Rahaman and
                  Ya Xiao and
                  Sharmin Afrose and
                  Ke Tian and
                  Miles Frantz and
                  Na Meng and
                  Barton P. Miller and
                  Fahad Shaon and
                  Murat Kantarcioglu and
                  Danfeng (Daphne) Yao},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {Deployment-quality and Accessible Solutions for Cryptography Code
                  Development},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {174--176},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3379536},
  doi          = {10.1145/3374664.3379536},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/RahamanXATFMMSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AfroseRY20,
  author       = {Sharmin Afrose and
                  Sazzadur Rahaman and
                  Danfeng (Daphne) Yao},
  editor       = {Vassil Roussev and
                  Bhavani Thuraisingham and
                  Barbara Carminati and
                  Murat Kantarcioglu},
  title        = {A Comprehensive Benchmark on Java Cryptographic {API} Misuses},
  booktitle    = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security
                  and Privacy, New Orleans, LA, USA, March 16-18, 2020},
  pages        = {177--178},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374664.3379537},
  doi          = {10.1145/3374664.3379537},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AfroseRY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/GoswamiGLMY20,
  author       = {Pronnoy Goswami and
                  Saksham Gupta and
                  Zhiyuan Li and
                  Na Meng and
                  Danfeng Daphne Yao},
  title        = {Investigating The Reproducibility of {NPM} Packages},
  booktitle    = {{IEEE} International Conference on Software Maintenance and Evolution,
                  {ICSME} 2020, Adelaide, Australia, September 28 - October 2, 2020},
  pages        = {677--681},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICSME46990.2020.00071},
  doi          = {10.1109/ICSME46990.2020.00071},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsm/GoswamiGLMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/YuWOBBY20,
  author       = {Xiaodong Yu and
                  Fengguo Wei and
                  Xinming Ou and
                  Michela Becchi and
                  Tekin Bicer and
                  Danfeng Daphne Yao},
  title        = {GPU-Based Static Data-Flow Analysis for Fast and Scalable Android
                  App Vetting},
  booktitle    = {2020 {IEEE} International Parallel and Distributed Processing Symposium
                  (IPDPS), New Orleans, LA, USA, May 18-22, 2020},
  pages        = {274--284},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IPDPS47924.2020.00037},
  doi          = {10.1109/IPDPS47924.2020.00037},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipps/YuWOBBY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/XiaoFARY20,
  author       = {Ya Xiao and
                  Miles Frantz and
                  Sharmin Afrose and
                  Sazzadur Rahaman and
                  Danfeng Daphne Yao},
  title        = {Tutorial: Principles and Practices of Secure Cryptographic Coding
                  in Java},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {5--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00016},
  doi          = {10.1109/SECDEV45635.2020.00016},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/XiaoFARY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/IslamRMHKY20,
  author       = {Mazharul Islam and
                  Sazzadur Rahaman and
                  Na Meng and
                  Behnaz Hassanshahi and
                  Padmanabhan Krishnan and
                  Danfeng Daphne Yao},
  title        = {Coding Practices and Recommendations of Spring Security for Enterprise
                  Applications},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {49--57},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00024},
  doi          = {10.1109/SECDEV45635.2020.00024},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/IslamRMHKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-02855,
  author       = {Sazzadur Rahaman and
                  Gang Wang and
                  Danfeng Yao},
  title        = {Security Certification in Payment Card Industry: Testbeds, Measurements,
                  and Recommendations},
  journal      = {CoRR},
  volume       = {abs/2002.02855},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.02855},
  eprinttype    = {arXiv},
  eprint       = {2002.02855},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-02855.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13213,
  author       = {Yuan Luo and
                  Ya Xiao and
                  Long Cheng and
                  Guojun Peng and
                  Danfeng Daphne Yao},
  title        = {Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress
                  and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2003.13213},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13213},
  eprinttype    = {arXiv},
  eprint       = {2003.13213},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13213.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06122,
  author       = {Ya Xiao and
                  Yang Zhao and
                  Nicholas Allen and
                  Nathan Keynes and
                  Danfeng Yao and
                  Cristina Cifuentes},
  title        = {Industrial Experience of Finding Cryptographic Vulnerabilities in
                  Large-scale Codebases},
  journal      = {CoRR},
  volume       = {abs/2007.06122},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06122},
  eprinttype    = {arXiv},
  eprint       = {2007.06122},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-14319,
  author       = {Mazharul Islam and
                  Sazzadur Rahaman and
                  Na Meng and
                  Behnaz Hassanshahi and
                  Padmanabhan Krishnan and
                  Danfeng Yao},
  title        = {Coding Practices and Recommendations of Spring Security for Enterprise
                  Applications},
  journal      = {CoRR},
  volume       = {abs/2007.14319},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.14319},
  eprinttype    = {arXiv},
  eprint       = {2007.14319},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-14319.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-07915,
  author       = {Li Xu and
                  Thomas Lux and
                  Tyler H. Chang and
                  Bo Li and
                  Yili Hong and
                  Layne T. Watson and
                  Ali Raza Butt and
                  Danfeng Yao and
                  Kirk W. Cameron},
  title        = {Prediction of High-Performance Computing Input/Output Variability
                  and Its Application to Optimization for System Configurations},
  journal      = {CoRR},
  volume       = {abs/2012.07915},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.07915},
  eprinttype    = {arXiv},
  eprint       = {2012.07915},
  timestamp    = {Sun, 03 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-07915.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiMRY19,
  author       = {Haipeng Cai and
                  Na Meng and
                  Barbara G. Ryder and
                  Danfeng Yao},
  title        = {DroidCat: Effective Android Malware Detection and Categorization via
                  App-Level Profiling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {6},
  pages        = {1455--1470},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2879302},
  doi          = {10.1109/TIFS.2018.2879302},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaiMRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahamanWY19,
  author       = {Sazzadur Rahaman and
                  Gang Wang and
                  Danfeng Daphne Yao},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Security Certification in Payment Card Industry: Testbeds, Measurements,
                  and Recommendations},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {481--498},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363195},
  doi          = {10.1145/3319535.3363195},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RahamanWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahamanXASTFKY19,
  author       = {Sazzadur Rahaman and
                  Ya Xiao and
                  Sharmin Afrose and
                  Fahad Shaon and
                  Ke Tian and
                  Miles Frantz and
                  Murat Kantarcioglu and
                  Danfeng (Daphne) Yao},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities
                  in Massive-sized Java Projects},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2455--2472},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345659},
  doi          = {10.1145/3319535.3345659},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RahamanXASTFKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahamanXATFMMSK19,
  author       = {Sazzadur Rahaman and
                  Ya Xiao and
                  Sharmin Afrose and
                  Ke Tian and
                  Miles Frantz and
                  Na Meng and
                  Barton P. Miller and
                  Fahad Shaon and
                  Murat Kantarcioglu and
                  Danfeng (Daphne) Yao},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Poster: Deployment-quality and Accessible Solutions for Cryptography
                  Code Development},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2545--2547},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363252},
  doi          = {10.1145/3319535.3363252},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RahamanXATFMMSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/XiaoHY19,
  author       = {Ya Xiao and
                  Qingying Hao and
                  Danfeng Daphne Yao},
  title        = {Neural Cryptanalysis: Metrics, Methodology, and Applications in {CPS}
                  Ciphers},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937659},
  doi          = {10.1109/DSC47296.2019.8937659},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/XiaoHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/AfroseRY19,
  author       = {Sharmin Afrose and
                  Sazzadur Rahaman and
                  Danfeng Yao},
  title        = {CryptoAPI-Bench: {A} Comprehensive Benchmark on Java Cryptographic
                  {API} Misuses},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {49--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00017},
  doi          = {10.1109/SECDEV.2019.00017},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/AfroseRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/0005LANJAY19,
  author       = {Long Cheng and
                  Hans Liljestrand and
                  Md. Salman Ahmed and
                  Thomas Nyman and
                  Trent Jaeger and
                  N. Asokan and
                  Danfeng Yao},
  title        = {Exploitation Techniques and Defenses for Data-Oriented Attacks},
  booktitle    = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner,
                  VA, USA, September 23-25, 2019},
  pages        = {114--128},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SecDev.2019.00022},
  doi          = {10.1109/SECDEV.2019.00022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secdev/0005LANJAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YuXCY19,
  author       = {Xiaodong Yu and
                  Ya Xiao and
                  Kirk W. Cameron and
                  Danfeng (Daphne) Yao},
  editor       = {Rob Jansen and
                  Peter A. H. Peterson},
  title        = {Comparative Measurement of Cache Configurations' Impacts on Cache
                  Timing Side-Channel Attacks},
  booktitle    = {12th {USENIX} Workshop on Cyber Security Experimentation and Test,
                  {CSET} 2019, Santa Clara, CA, USA, August 12, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/cset19/presentation/yu},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/YuXCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-08359,
  author       = {Long Cheng and
                  Hans Liljestrand and
                  Thomas Nyman and
                  Yu Tsung Lee and
                  Danfeng Yao and
                  Trent Jaeger and
                  N. Asokan},
  title        = {Exploitation Techniques and Defenses for Data-Oriented Attacks},
  journal      = {CoRR},
  volume       = {abs/1902.08359},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.08359},
  eprinttype    = {arXiv},
  eprint       = {1902.08359},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-08359.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-03034,
  author       = {Salman Ahmed and
                  Ya Xiao and
                  Gang Tan and
                  Kevin Z. Snow and
                  Fabian Monrose and
                  Danfeng Yao},
  title        = {Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization},
  journal      = {CoRR},
  volume       = {abs/1910.03034},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.03034},
  eprinttype    = {arXiv},
  eprint       = {1910.03034},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-03034.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-04020,
  author       = {Ya Xiao and
                  Qingying Hao and
                  Danfeng Yao},
  title        = {Neural Cryptanalysis: Metrics, Methodology, and Applications in {CPS}
                  Ciphers},
  journal      = {CoRR},
  volume       = {abs/1911.04020},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.04020},
  eprinttype    = {arXiv},
  eprint       = {1911.04020},
  timestamp    = {Sun, 01 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-04020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/LuxWCBLYXBBCY018,
  author       = {Thomas C. H. Lux and
                  Layne T. Watson and
                  Tyler H. Chang and
                  Jon Bernard and
                  Bo Li and
                  Xiaodong Yu and
                  Li Xu and
                  Godmar Back and
                  Ali Raza Butt and
                  Kirk W. Cameron and
                  Danfeng Yao and
                  Yili Hong},
  editor       = {Ka{-}Wing Wong and
                  Chi Shen and
                  Dana Brown},
  title        = {Novel meshes for multivariate interpolation and approximation},
  booktitle    = {Proceedings of the {ACMSE} 2018 Conference, Richmond, KY, USA, March
                  29-31, 2018},
  pages        = {13:1--13:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3190645.3190687},
  doi          = {10.1145/3190645.3190687},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/LuxWCBLYXBBCY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MengNYZA18,
  author       = {Na Meng and
                  Stefan Nagy and
                  Danfeng (Daphne) Yao and
                  Wenjie Zhuang and
                  Gustavo A. Arango{-}Argoty},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {Secure coding practices in Java: challenges and vulnerabilities},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering,
                  {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018},
  pages        = {372--383},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180155.3180201},
  doi          = {10.1145/3180155.3180201},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/MengNYZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imc/TianJ0Y018,
  author       = {Ke Tian and
                  Steve T. K. Jan and
                  Hang Hu and
                  Danfeng Yao and
                  Gang Wang},
  title        = {Needle in a Haystack: Tracking Down Elite Phishing Domains in the
                  Wild},
  booktitle    = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018,
                  Boston, MA, USA, October 31 - November 02, 2018},
  pages        = {429--442},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3278569},
  timestamp    = {Fri, 25 Oct 2019 09:51:49 +0200},
  biburl       = {https://dblp.org/rec/conf/imc/TianJ0Y018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Yao18,
  author       = {Danfeng (Daphne) Yao},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {Data Breach and Multiple Points to Stop It},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3206001},
  doi          = {10.1145/3205977.3206001},
  timestamp    = {Wed, 21 Nov 2018 12:44:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Yao18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahamanMY18,
  author       = {Sazzadur Rahaman and
                  Na Meng and
                  Danfeng Yao},
  title        = {Tutorial: Principles and Practices of Secure Crypto Coding in Java},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {122--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00024},
  doi          = {10.1109/SECDEV.2018.00024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahamanMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TianLBY18,
  author       = {Ke Tian and
                  Zhou Li and
                  Kevin D. Bowers and
                  Danfeng (Daphne) Yao},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {FrameHanger: Evaluating and Classifying Iframe Injection at Large
                  Scale},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {311--331},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_17},
  doi          = {10.1007/978-3-030-01704-0\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TianLBY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-00074,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng Yao and
                  Lui Sha and
                  Raheem A. Beyah},
  title        = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1805.00074},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.00074},
  eprinttype    = {arXiv},
  eprint       = {1805.00074},
  timestamp    = {Mon, 06 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-00074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-06881,
  author       = {Sazzadur Rahaman and
                  Ya Xiao and
                  Ke Tian and
                  Fahad Shaon and
                  Murat Kantarcioglu and
                  Danfeng Yao},
  title        = {{CHIRON:} Deployment-quality Detection of Java Cryptographic Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1806.06881},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.06881},
  eprinttype    = {arXiv},
  eprint       = {1806.06881},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-06881.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2017Yao,
  author       = {Danfeng (Daphne) Yao and
                  Xiaokui Shu and
                  Long Cheng and
                  Salvatore J. Stolfo},
  title        = {Anomaly Detection as a Service: Challenges, Advances, and Opportunities},
  series       = {Synthesis Lectures on Information Security, Privacy, and Trust},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2017},
  url          = {https://doi.org/10.2200/S00800ED1V01Y201709SPT022},
  doi          = {10.2200/S00800ED1V01Y201709SPT022},
  isbn         = {978-3-031-01226-6},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/synthesis/2017Yao.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RahamanCYLP17,
  author       = {Sazzadur Rahaman and
                  Long Cheng and
                  Danfeng Daphne Yao and
                  He Li and
                  Jung{-}Min "Jerry" Park},
  title        = {Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable
                  Sublinear Revocation},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {4},
  pages        = {384--403},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0055},
  doi          = {10.1515/POPETS-2017-0055},
  timestamp    = {Sat, 26 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/RahamanCYLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShuYRJ17,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan and
                  Trent Jaeger},
  title        = {Long-Span Program Behavior Modeling and Attack Detection},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {20},
  number       = {4},
  pages        = {12:1--12:28},
  year         = {2017},
  url          = {https://doi.org/10.1145/3105761},
  doi          = {10.1145/3105761},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ShuYRJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/widm/ChengLY17,
  author       = {Long Cheng and
                  Fang Liu and
                  Danfeng (Daphne) Yao},
  title        = {Enterprise data breach: causes, challenges, prevention, and future
                  directions},
  journal      = {WIREs Data Mining Knowl. Discov.},
  volume       = {7},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/widm.1211},
  doi          = {10.1002/WIDM.1211},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/widm/ChengLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChengTY17,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng (Daphne) Yao},
  title        = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against
                  Data-Oriented Attacks},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {315--326},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134640},
  doi          = {10.1145/3134600.3134640},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChengTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Yao17,
  author       = {Danfeng (Daphne) Yao},
  editor       = {Cong Wang and
                  Murat Kantarcioglu},
  title        = {Cloud Data Analytics for Security: Applications, Challenges, and Opportunities},
  booktitle    = {Proceedings of the Fifth {ACM} International Workshop on Security
                  in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates,
                  April 2, 2017},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055259.3055266},
  doi          = {10.1145/3055259.3055266},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Yao17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TianTYR17,
  author       = {Ke Tian and
                  Gang Tan and
                  Danfeng Daphne Yao and
                  Barbara G. Ryder},
  editor       = {Taesoo Kim and
                  Cliff Wang and
                  Dinghao Wu},
  title        = {ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation},
  booktitle    = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software
                  Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {35--41},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3141235.3141239},
  doi          = {10.1145/3141235.3141239},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/TianTYR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BosuLYW17,
  author       = {Amiangshu Bosu and
                  Fang Liu and
                  Danfeng (Daphne) Yao and
                  Gang Wang},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app
                  Communications},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {71--85},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053004},
  doi          = {10.1145/3052973.3053004},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BosuLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChengTY17,
  author       = {Long Cheng and
                  Ke Tian and
                  Danfeng (Daphne) Yao},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{POSTER:} Detection of {CPS} Program Anomalies by Enforcing Cyber-Physical
                  Execution Semantics},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2483--2485},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3138839},
  doi          = {10.1145/3133956.3138839},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChengTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YaoB17,
  author       = {Danfeng (Daphne) Yao and
                  Elisa Bertino},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{CCS} 2017: Women in Cyber Security (CyberW) Workshop},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2631--2632},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3137041},
  doi          = {10.1145/3133956.3137041},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YaoB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/AlmohriCYA17,
  author       = {Hussain M. J. Almohri and
                  Long Cheng and
                  Danfeng Yao and
                  Homa Alemzadeh},
  editor       = {Paolo Bonato and
                  Honggang Wang},
  title        = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems},
  booktitle    = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
                  Health: Applications, Systems and Engineering Technologies, {CHASE}
                  2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages        = {114--119},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CHASE.2017.69},
  doi          = {10.1109/CHASE.2017.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chase/AlmohriCYA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhangZYLHY17,
  author       = {Ning Zhang and
                  Ruide Zhang and
                  Qiben Yan and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Danfeng Yao},
  title        = {Black penguin: On the feasibility of detecting intrusion with homogeneous
                  memory},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {586--594},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228671},
  doi          = {10.1109/CNS.2017.8228671},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ZhangZYLHY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuCWYER17,
  author       = {Fang Liu and
                  Haipeng Cai and
                  Gang Wang and
                  Danfeng (Daphne) Yao and
                  Karim O. Elish and
                  Barbara G. Ryder},
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Prioritized Analysis of Inter-App Communication Risks},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {159--161},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3029806.3029843},
  doi          = {10.1145/3029806.3029843},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiuCWYER17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KedrowitschYWC17,
  author       = {Alexander Kedrowitsch and
                  Danfeng (Daphne) Yao and
                  Gang Wang and
                  Kirk W. Cameron},
  editor       = {Nicholas J. Multari and
                  Anoop Singhal and
                  Erin Miller},
  title        = {A First Look: Using Linux Containers for Deceptive Honeypots},
  booktitle    = {Proceedings of the 2017 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
                  30 - November 03, 2017},
  pages        = {15--22},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140368.3140371},
  doi          = {10.1145/3140368.3140371},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KedrowitschYWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/RahamanY17,
  author       = {Sazzadur Rahaman and
                  Danfeng Yao},
  title        = {Program Analysis of Cryptographic Implementations for Security},
  booktitle    = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA,
                  September 24-26, 2017},
  pages        = {61--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SecDev.2017.23},
  doi          = {10.1109/SECDEV.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/RahamanY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuCWYER17,
  author       = {Fang Liu and
                  Haipeng Cai and
                  Gang Wang and
                  Danfeng Yao and
                  Karim O. Elish and
                  Barbara G. Ryder},
  title        = {MR-Droid: {A} Scalable and Prioritized Analysis of Inter-App Communication
                  Risks},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {189--198},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.12},
  doi          = {10.1109/SPW.2017.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LiuCWYER17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LiuWPYW17,
  author       = {Fang Liu and
                  Chun Wang and
                  Andres Pico and
                  Danfeng Yao and
                  Gang Wang},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Measuring the Insecurity of Mobile Deep Links of Android},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {953--969},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LiuWPYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ShuTCY17,
  author       = {Xiaokui Shu and
                  Ke Tian and
                  Andrew Ciambrone and
                  Danfeng Yao},
  title        = {Breaking the Target: An Analysis of Target Data Breach and Lessons
                  Learned},
  journal      = {CoRR},
  volume       = {abs/1701.04940},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.04940},
  eprinttype    = {arXiv},
  eprint       = {1701.04940},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ShuTCY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-09970,
  author       = {Na Meng and
                  Stefan Nagy and
                  Danfeng Daphne Yao and
                  Wenjie Zhuang and
                  Gustavo A. Arango{-}Argoty},
  title        = {Secure Coding Practices in Java: Challenges and Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/1709.09970},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.09970},
  eprinttype    = {arXiv},
  eprint       = {1709.09970},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-09970.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/0023YRZ16,
  author       = {Hao Zhang and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan and
                  Zhibin Zhang},
  title        = {Causality reasoning about network events for detecting stealthy malware
                  activities},
  journal      = {Comput. Secur.},
  volume       = {58},
  pages        = {180--198},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.01.002},
  doi          = {10.1016/J.COSE.2016.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0023YRZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  Danfeng Yao and
                  Xinming Ou},
  title        = {Security Optimization of Dynamic Networks with Probabilistic Graph
                  Modeling and Linear Programming},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {474--487},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi          = {10.1109/TDSC.2015.2411264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShuZYF16,
  author       = {Xiaokui Shu and
                  Jing Zhang and
                  Danfeng (Daphne) Yao and
                  Wu{-}chun Feng},
  title        = {Fast Detection of Transformed Data Leaks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {3},
  pages        = {528--542},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2503271},
  doi          = {10.1109/TIFS.2015.2503271},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShuZYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/ShuLY16,
  author       = {Xiaokui Shu and
                  Nikolay Laptev and
                  Danfeng (Daphne) Yao},
  editor       = {Dale Schuurmans and
                  Michael P. Wellman},
  title        = {{DECT:} Distributed Evolving Context Tree for Understanding User Behavior
                  Pattern Evolution},
  booktitle    = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence,
                  February 12-17, 2016, Phoenix, Arizona, {USA}},
  pages        = {4395--4396},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {https://doi.org/10.1609/aaai.v30i1.9835},
  doi          = {10.1609/AAAI.V30I1.9835},
  timestamp    = {Mon, 04 Sep 2023 15:08:28 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/ShuLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/YuFYB16,
  author       = {Xiaodong Yu and
                  Wu{-}chun Feng and
                  Danfeng (Daphne) Yao and
                  Michela Becchi},
  editor       = {Patrick Crowley and
                  Luigi Rizzo and
                  Laurent Mathy},
  title        = {{O3FA:} {A} Scalable Finite Automata-based Pattern-Matching Engine
                  for Out-of-Order Deep Packet Inspection},
  booktitle    = {Proceedings of the 2016 Symposium on Architectures for Networking
                  and Communications Systems, {ANCS} 2016, Santa Clara, CA, USA, March
                  17-18, 2016},
  pages        = {1--11},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2881025.2881034},
  doi          = {10.1145/2881025.2881034},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ancs/YuFYB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0023YR16,
  author       = {Hao Zhang and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Causality-based Sensemaking of Network Traffic for Android Application
                  Security},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996760},
  doi          = {10.1145/2996758.2996760},
  timestamp    = {Mon, 26 Jun 2023 20:41:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0023YR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShuY16,
  author       = {Xiaokui Shu and
                  Danfeng Yao},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Program Anomaly Detection: Methodology and Practices},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1853--1854},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2976750},
  doi          = {10.1145/2976749.2976750},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShuY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/XuTYR16,
  author       = {Kui Xu and
                  Ke Tian and
                  Danfeng Yao and
                  Barbara G. Ryder},
  title        = {A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors
                  for Anomaly Detection with Context Sensitivity},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {467--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.49},
  doi          = {10.1109/DSN.2016.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/XuTYR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/ShuLY16,
  author       = {Xiaokui Shu and
                  Nikolay Laptev and
                  Danfeng Yao},
  editor       = {Evaggelia Pitoura and
                  Sofian Maabout and
                  Georgia Koutrika and
                  Am{\'{e}}lie Marian and
                  Letizia Tanca and
                  Ioana Manolescu and
                  Kostas Stefanidis},
  title        = {{DECT:} Distributed Evolving Context Tree for Mining Web Behavior
                  Evolution},
  booktitle    = {Proceedings of the 19th International Conference on Extending Database
                  Technology, {EDBT} 2016, Bordeaux, France, March 15-16, 2016, Bordeaux,
                  France, March 15-16, 2016},
  pages        = {573--579},
  publisher    = {OpenProceedings.org},
  year         = {2016},
  url          = {https://doi.org/10.5441/002/edbt.2016.54},
  doi          = {10.5441/002/EDBT.2016.54},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/ShuLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/FereidooniCYS16,
  author       = {Hossein Fereidooni and
                  Mauro Conti and
                  Danfeng Yao and
                  Alessandro Sperduti},
  editor       = {Mohamad Badra and
                  Giovanni Pau and
                  Vasos Vassiliou},
  title        = {{ANASTASIA:} ANdroid mAlware detection using STatic analySIs of Applications},
  booktitle    = {8th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NTMS.2016.7792435},
  doi          = {10.1109/NTMS.2016.7792435},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/FereidooniCYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/TianYRT16,
  author       = {Ke Tian and
                  Danfeng Yao and
                  Barbara G. Ryder and
                  Gang Tan},
  title        = {Analysis of Code Heterogeneity for High-Precision Classification of
                  Repackaged Malware},
  booktitle    = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San
                  Jose, CA, USA, May 22-26, 2016},
  pages        = {262--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPW.2016.33},
  doi          = {10.1109/SPW.2016.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/TianYRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ElishSYRJ15,
  author       = {Karim O. Elish and
                  Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder and
                  Xuxian Jiang},
  title        = {Profiling user-trigger dependence for Android malware detection},
  journal      = {Comput. Secur.},
  volume       = {49},
  pages        = {255--273},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.11.001},
  doi          = {10.1016/J.COSE.2014.11.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ElishSYRJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShuYB15,
  author       = {Xiaokui Shu and
                  Danfeng Yao and
                  Elisa Bertino},
  title        = {Privacy-Preserving Detection of Sensitive Data Exposure},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {5},
  pages        = {1092--1103},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2398363},
  doi          = {10.1109/TIFS.2015.2398363},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShuYB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShuYR15,
  author       = {Xiaokui Shu and
                  Danfeng Yao and
                  Naren Ramakrishnan},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Unearthing Stealthy Program Attacks Buried in Extremely Long Execution
                  Paths},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {401--413},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813654},
  doi          = {10.1145/2810103.2813654},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ShuYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhangSYN15,
  author       = {Hao Zhang and
                  Maoyuan Sun and
                  Danfeng (Daphne) Yao and
                  Chris North},
  editor       = {Stephen Huang and
                  Rakesh M. Verma},
  title        = {Visualizing Traffic Causality for Analyzing Network Anomalies},
  booktitle    = {Proceedings of the 2015 {ACM} International Workshop on International
                  Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San
                  Antonio, TX, USA, March 4, 2015},
  pages        = {37--42},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2713579.2713583},
  doi          = {10.1145/2713579.2713583},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhangSYN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ShuZYF15,
  author       = {Xiaokui Shu and
                  Jing Zhang and
                  Danfeng Yao and
                  Wu{-}chun Feng},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Rapid Screening of Transformed Data Leaks with Efficient Algorithms
                  and Parallel Computing},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {147--149},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699130},
  doi          = {10.1145/2699026.2699130},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ShuZYF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuSYB15,
  author       = {Fang Liu and
                  Xiaokui Shu and
                  Danfeng Yao and
                  Ali Raza Butt},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure
                  with MapReduce},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699106},
  doi          = {10.1145/2699026.2699106},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiuSYB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/XuYRT15,
  author       = {Kui Xu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder and
                  Ke Tian},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Probabilistic Program Modeling for High-Precision Anomaly Classification},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {497--511},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.37},
  doi          = {10.1109/CSF.2015.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/XuYRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShuZYF15,
  author       = {Xiaokui Shu and
                  Jing Zhang and
                  Danfeng Yao and
                  Wu{-}chun Feng},
  title        = {Rapid and parallel content screening for detecting transformed data
                  exposure},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179383},
  doi          = {10.1109/INFCOMW.2015.7179383},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShuZYF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DouZYY15,
  author       = {Yanzhi Dou and
                  Kexiong Curtis Zeng and
                  Yaling Yang and
                  Danfeng (Daphne) Yao},
  title        = {MadeCR: Correlation-based malware detection for cognitive radio},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {639--647},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218432},
  doi          = {10.1109/INFOCOM.2015.7218432},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/DouZYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShuYR15,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {A Formal Framework for Program Anomaly Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {270--292},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_13},
  doi          = {10.1007/978-3-319-26362-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShuYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015scc,
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516},
  doi          = {10.1145/2732516},
  isbn         = {978-1-4503-3447-1},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2015scc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriYK14,
  author       = {Hussain M. J. Almohri and
                  Danfeng Yao and
                  Dennis G. Kafura},
  title        = {Process Authentication for High System Assurance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {168--180},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.29},
  doi          = {10.1109/TDSC.2013.29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYR14,
  author       = {Hao Zhang and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Detection of stealthy malware activities with traffic causality and
                  scalable triggering relation discovery},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590309},
  doi          = {10.1145/2590296.2590309},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK14,
  author       = {Hussain M. J. Almohri and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {DroidBarrier: know what is executing on your android},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {257--264},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557571},
  doi          = {10.1145/2557547.2557571},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlmohriYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/XuYPLG14,
  author       = {Kui Xu and
                  Danfeng Yao and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and
                  Casey Link and
                  E. Scott Geller},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {Role-playing game for studying user behaviors in security: {A} case
                  study on email secrecy},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {18--26},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257242},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257242},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/XuYPLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmla/WolfeEY14,
  author       = {Britton Wolfe and
                  Karim O. Elish and
                  Danfeng Yao},
  title        = {High Precision Screening for Android Malware with Dimensionality Reduction},
  booktitle    = {13th International Conference on Machine Learning and Applications,
                  {ICMLA} 2014, Detroit, MI, USA, December 3-6, 2014},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICMLA.2014.10},
  doi          = {10.1109/ICMLA.2014.10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmla/WolfeEY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WolfeEY14,
  author       = {Britton Wolfe and
                  Karim O. Elish and
                  Danfeng (Daphne) Yao},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Comprehensive Behavior Profiling for Proactive Android Malware Detection},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {328--344},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_19},
  doi          = {10.1007/978-3-319-13257-0\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WolfeEY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuBSY13,
  author       = {Kui Xu and
                  Patrick Butler and
                  Sudip Saha and
                  Danfeng (Daphne) Yao},
  title        = {{DNS} for Massive-Scale Command and Control},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {143--153},
  year         = {2013},
  url          = {https://doi.org/10.1109/TDSC.2013.10},
  doi          = {10.1109/TDSC.2013.10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/ElishDYK13,
  author       = {Karim O. Elish and
                  Yipan Deng and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elhadi M. Shakshuki and
                  Karim Djouani and
                  Michael Sheng and
                  Mohamed F. Younis and
                  Eduardo Vaz and
                  Wayne Groszko},
  title        = {Device-based Isolation for Securing Cryptographic Keys},
  booktitle    = {Proceedings of the 4th International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2013), the 3rd International Conference
                  on Sustainable Energy Information Technology (SEIT-2013), Halifax,
                  Nova Scotia, Canada, June 25-28, 2013},
  series       = {Procedia Computer Science},
  volume       = {19},
  pages        = {1130--1135},
  publisher    = {Elsevier},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.procs.2013.06.160},
  doi          = {10.1016/J.PROCS.2013.06.160},
  timestamp    = {Fri, 28 Jan 2022 08:58:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ant/ElishDYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangYR13,
  author       = {Hao Zhang and
                  Danfeng (Daphne) Yao and
                  Naren Ramakrishnan},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {A semantic-aware approach to reasoning about network traffic relations},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1375--1378},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512504},
  doi          = {10.1145/2508859.2512504},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangYR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XiongZZY13,
  author       = {Huijun Xiong and
                  Qingji Zheng and
                  Xinwen Zhang and
                  Danfeng Yao},
  title        = {CloudSafe: Securing data processing within vulnerable virtualization
                  environments in the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {172--180},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682705},
  doi          = {10.1109/CNS.2013.6682705},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XiongZZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShuSYL13,
  author       = {Xiaokui Shu and
                  John Smiy and
                  Danfeng (Daphne) Yao and
                  Heshan Lin},
  title        = {Massive distributed and parallel log analysis for organizational security},
  booktitle    = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM}
                  2013, Atlanta, GA, USA, December 9-13, 2013},
  pages        = {194--199},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOMW.2013.6824985},
  doi          = {10.1109/GLOCOMW.2013.6824985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ShuSYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StefanSY12,
  author       = {Deian Stefan and
                  Xiaokui Shu and
                  Danfeng (Daphne) Yao},
  title        = {Robustness of keystroke-dynamics based biometrics against synthetic
                  forgeries},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {1},
  pages        = {109--121},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2011.10.001},
  doi          = {10.1016/J.COSE.2011.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StefanSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuXWSY12,
  author       = {Kui Xu and
                  Huijun Xiong and
                  Chehai Wu and
                  Deian Stefan and
                  Danfeng Yao},
  title        = {Data-Provenance Verification For Secure Hosts},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {173--183},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.50},
  doi          = {10.1109/TDSC.2011.50},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiongZYWW12,
  author       = {Huijun Xiong and
                  Xinwen Zhang and
                  Danfeng Yao and
                  Xiaoxin Wu and
                  Yonggang Wen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Towards end-to-end secure content storage and delivery with public
                  cloud},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133633},
  doi          = {10.1145/2133601.2133633},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/XiongZYWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK12,
  author       = {Hussain M. J. Almohri and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Identifying native applications with high assurance},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {275--282},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133635},
  doi          = {10.1145/2133601.2133635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/WangYSWLZY0G12,
  author       = {Yipeng Wang and
                  Xiao{-}chun Yun and
                  Muhammad Zubair Shafiq and
                  Liyan Wang and
                  Alex X. Liu and
                  Zhibin Zhang and
                  Danfeng Yao and
                  Yongzheng Zhang and
                  Li Guo},
  title        = {A semantics aware approach to automated reverse engineering unknown
                  protocols},
  booktitle    = {20th {IEEE} International Conference on Network Protocols, {ICNP}
                  2012, Austin, TX, USA, October 30 - Nov. 2, 2012},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICNP.2012.6459963},
  doi          = {10.1109/ICNP.2012.6459963},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/WangYSWLZY0G12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ShuY12,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {Data Leak Detection as a Service},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {222--240},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_14},
  doi          = {10.1007/978-3-642-36883-7\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ShuY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangBYR12,
  author       = {Hao Zhang and
                  William Banick and
                  Danfeng Yao and
                  Naren Ramakrishnan},
  title        = {User Intention-Based Traffic Dependence Analysis for Anomaly Detection},
  booktitle    = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco,
                  CA, USA, May 24-25, 2012},
  pages        = {104--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SPW.2012.15},
  doi          = {10.1109/SPW.2012.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangBYR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangYF12,
  author       = {Zilong Wang and
                  Danfeng (Daphne) Yao and
                  Rongquan Feng},
  title        = {Adaptive Key Protection in Complex Cryptosystems with Attributes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {136},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/WangZYQG11,
  author       = {Yipeng Wang and
                  Zhibin Zhang and
                  Danfeng (Daphne) Yao and
                  Buyun Qu and
                  Li Guo},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Inferring Protocol State Machine from Network Traces: {A} Probabilistic
                  Approach},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {1--18},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_1},
  doi          = {10.1007/978-3-642-21554-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/WangZYQG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ButlerXY11,
  author       = {Patrick Butler and
                  Kui Xu and
                  Danfeng (Daphne) Yao},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Quantitatively Analyzing Stealthy Communication Channels},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {238--254},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_14},
  doi          = {10.1007/978-3-642-21554-4\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ButlerXY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XuYMC11,
  author       = {Kui Xu and
                  Danfeng Yao and
                  Qiang Ma and
                  Alexander Crowell},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Detecting infection onset with behavior-based policies},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {57--64},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6059960},
  doi          = {10.1109/ICNSS.2011.6059960},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/XuYMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZarandioonYG11,
  author       = {Saman Zarandioon and
                  Danfeng (Daphne) Yao and
                  Vinod Ganapathy},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {{K2C:} Cryptographic Cloud Storage with Lazy Revocation and Anonymous
                  Access},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_4},
  doi          = {10.1007/978-3-642-31909-9\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZarandioonYG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiongZZY11,
  author       = {Huijun Xiong and
                  Xinwen Zhang and
                  Wei Zhu and
                  Danfeng Yao},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {CloudSeal: End-to-End Content Protection in Cloud-Based Storage and
                  Delivery Services},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {491--500},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_30},
  doi          = {10.1007/978-3-642-31909-9\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiongZZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/RamstetterYY10,
  author       = {Jerry Rick Ramstetter and
                  Yaling Yang and
                  Danfeng Yao},
  title        = {Applications and Security of Next-Generation, User-Centric Wireless
                  Systems},
  journal      = {Future Internet},
  volume       = {2},
  number       = {3},
  pages        = {190--211},
  year         = {2010},
  url          = {https://doi.org/10.3390/fi2030190},
  doi          = {10.3390/FI2030190},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/RamstetterYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/TamassiaYW10,
  author       = {Roberto Tamassia and
                  Danfeng Yao and
                  William H. Winsborough},
  title        = {Independently Verifiable Decentralized Role-Based Delegation},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {40},
  number       = {6},
  pages        = {1206--1219},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSMCA.2010.2045118},
  doi          = {10.1109/TSMCA.2010.2045118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/TamassiaYW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangTWY10,
  author       = {Chih{-}Cheng Chang and
                  Brian Thompson and
                  Wendy Hui Wang and
                  Danfeng Yao},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Towards publishing recommendation data with predictive anonymization},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {24--35},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755693},
  doi          = {10.1145/1755688.1755693},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/StefanY10,
  author       = {Deian Stefan and
                  Danfeng Yao},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {Keystroke-dynamics authentication against synthetic forgeries},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--8},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.16},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/StefanY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuMY10,
  author       = {Kui Xu and
                  Qiang Ma and
                  Danfeng (Daphne) Yao},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Detecting the Onset of Infection for Secure Hosts},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {492--493},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_29},
  doi          = {10.1007/978-3-642-15512-3\_29},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoT09,
  author       = {Danfeng Yao and
                  Roberto Tamassia},
  title        = {Compact and Anonymous Role-Based Authorization Chain},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {15:1--15:27},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455528},
  doi          = {10.1145/1455526.1455528},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThompsonY09,
  author       = {Brian Thompson and
                  Danfeng Yao},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {The union-split algorithm and cluster-based anonymization of social
                  networks},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {218--227},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533088},
  doi          = {10.1145/1533057.1533088},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThompsonY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/VyasSCY09,
  author       = {Nitya Vyas and
                  Anna Cinzia Squicciarini and
                  Chih{-}Cheng Chang and
                  Danfeng Yao},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {Towards automatic privacy management in Web 2.0 with semantic analysis
                  on annotations},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8340},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8340},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/VyasSCY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/ZarandioonYG09,
  author       = {Saman Zarandioon and
                  Danfeng Yao and
                  Vinod Ganapathy},
  editor       = {Elisa Bertino and
                  Thomas Gro{\ss} and
                  Kenji Takahashi},
  title        = {Privacy-aware identity management for client-side mashup applications},
  booktitle    = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago,
                  Illinois, USA, November 13, 2009},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655028.1655036},
  doi          = {10.1145/1655028.1655036},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/ZarandioonYG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XiongMSWY09,
  author       = {Huijun Xiong and
                  Prateek Malhotra and
                  Deian Stefan and
                  Chehai Wu and
                  Danfeng Yao},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {User-Assisted Host-Based Detection of Outbound Malware Traffic},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_23},
  doi          = {10.1007/978-3-642-11145-7\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/XiongMSWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/ChumashY09,
  author       = {Tzvi Chumash and
                  Danfeng Yao},
  editor       = {Elena Ferrari and
                  Ninghui Li and
                  Elisa Bertino and
                  Y{\"{u}}cel Karabulut},
  title        = {Detection and Prevention of Insider Threats in Database Driven Web
                  Services},
  booktitle    = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {300},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02056-8\_8},
  doi          = {10.1007/978-3-642-02056-8\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/ChumashY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ThompsonHHSY09,
  author       = {Brian Thompson and
                  Stuart Haber and
                  William G. Horne and
                  Tomas Sander and
                  Danfeng Yao},
  editor       = {Ian Goldberg and
                  Mikhail J. Atallah},
  title        = {Privacy-Preserving Computation and Verification of Aggregate Queries
                  on Outsourced Databases},
  booktitle    = {Privacy Enhancing Technologies, 9th International Symposium, {PETS}
                  2009, Seattle, WA, USA, August 5-7, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5672},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03168-7\_11},
  doi          = {10.1007/978-3-642-03168-7\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/ThompsonHHSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/BabicXYI09,
  author       = {Anitra Babic and
                  Huijun Xiong and
                  Danfeng Yao and
                  Liviu Iftode},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Building robust authentication systems with activity-based personal
                  questions},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655067},
  doi          = {10.1145/1655062.1655067},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/BabicXYI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/YaoFDL09,
  author       = {Danfeng (Daphne) Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Forward-Secure Hierarchical {IBE} with Applications to Broadcast Encryption},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {100--118},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-100},
  doi          = {10.3233/978-1-58603-947-9-100},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/YaoFDL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Yao08,
  author       = {Danfeng Yao},
  title        = {Privacy-Aware Authentication and Authorization in Trust Management},
  school       = {Brown University, {USA}},
  year         = {2008},
  url          = {https://cs.brown.edu/research/pubs/theses/phd/2008/yao.pdf},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Yao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GoodrichTY08,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Danfeng (Daphne) Yao},
  title        = {Notarized federated {ID} management and authentication},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {399--418},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0324},
  doi          = {10.3233/JCS-2008-0324},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GoodrichTY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/YaoFAT08,
  author       = {Danfeng Yao and
                  Keith B. Frikken and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  title        = {Private Information: To Reveal or not to Reveal},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {6:1--6:27},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410240},
  doi          = {10.1145/1410234.1410240},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/KoglinYB08,
  author       = {Yunhua Koglin and
                  Danfeng Yao and
                  Elisa Bertino},
  title        = {Efficient and Secure Content Processing and Distribution by Cooperative
                  Intermediaries},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {5},
  pages        = {615--626},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2007.70758},
  doi          = {10.1109/TPDS.2007.70758},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/KoglinYB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZarandioonYG08,
  author       = {Saman Zarandioon and
                  Danfeng Yao and
                  Vinod Ganapathy},
  title        = {{OMOS:} {A} Framework for Secure Communication in Mashup Applications},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {355--364},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.25},
  doi          = {10.1109/ACSAC.2008.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZarandioonYG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaberHHHMSTY08,
  author       = {Stuart Haber and
                  Yasuo Hatano and
                  Yoshinori Honda and
                  William G. Horne and
                  Kunihiko Miyazaki and
                  Tomas Sander and
                  Satoru Tezoku and
                  Danfeng Yao},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Efficient signature schemes supporting redaction, pseudonymization,
                  and data deidentification},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {353--362},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368362},
  doi          = {10.1145/1368310.1368362},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaberHHHMSTY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/PathakIY08,
  author       = {Vivek Pathak and
                  Liviu Iftode and
                  Danfeng Yao},
  title        = {Improving Email Trustworthiness through Social-Group Key Authentication},
  booktitle    = {{CEAS} 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August
                  2008, Mountain View, California, {USA}},
  year         = {2008},
  url          = {http://www.ceas.cc/2008/papers/ceas2008-paper-26.pdf},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceas/PathakIY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/PhanY08,
  author       = {Tuan Phan and
                  Danfeng (Daphne) Yao},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {SelectAudit: {A} Secure and Efficient Audit Framework for Networked
                  Virtual Environments},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {207--216},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_16},
  doi          = {10.1007/978-3-642-03354-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/PhanY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Yao08,
  author       = {Danfeng Yao},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {An Ad Hoc Trust Inference Model for Flexible and Controlled Information
                  Sharing},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {555--561},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 12:46:27 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Yao08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icves/PathakYI08,
  author       = {Vivek Pathak and
                  Danfeng Yao and
                  Liviu Iftode},
  title        = {Securing location aware services over {VANET} using geographical secure
                  path routing},
  booktitle    = {{IEEE} International Conference on Vehicular Electronics and Safety,
                  {ICVES} 2008, Columbus, OH, USA, 22-24 September, 2008},
  pages        = {346--353},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICVES.2008.4640905},
  doi          = {10.1109/ICVES.2008.4640905},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icves/PathakYI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CruzTY07,
  author       = {Isabel F. Cruz and
                  Roberto Tamassia and
                  Danfeng Yao},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Privacy-Preserving Schema Matching Using Mutual Information},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {93--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_7},
  doi          = {10.1007/978-3-540-73538-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CruzTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/YaoTP07,
  author       = {Danfeng Yao and
                  Roberto Tamassia and
                  Seth Proctor},
  editor       = {Sandro Etalle and
                  Stephen Marsh},
  title        = {Private Distributed Scalar Product Protocol With Application To Privacy-Preserving
                  Computation of Trust},
  booktitle    = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and
                  {PST} Conferences on Privacy, Trust Management and Security, July
                  30- August 2, 2007, Moncton, New Brunswick, Canada},
  series       = {{IFIP}},
  volume       = {238},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73655-6\_1},
  doi          = {10.1007/978-0-387-73655-6\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/YaoTP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YaoKBT07,
  author       = {Danfeng Yao and
                  Yunhua Koglin and
                  Elisa Bertino and
                  Roberto Tamassia},
  editor       = {Yookun Cho and
                  Roger L. Wainwright and
                  Hisham Haddad and
                  Sung Y. Shin and
                  Yong Wan Koo},
  title        = {Decentralized authorization and data security in web content delivery},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC),
                  Seoul, Korea, March 11-15, 2007},
  pages        = {1654--1661},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1244002.1244353},
  doi          = {10.1145/1244002.1244353},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/YaoKBT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GoodrichTY06,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Danfeng Yao},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Notarized Federated Identity Management for Web Services},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_10},
  doi          = {10.1007/11805588\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/GoodrichTY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YaoFAT06,
  author       = {Danfeng Yao and
                  Keith B. Frikken and
                  Mikhail J. Atallah and
                  Roberto Tamassia},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Point-Based Trust: Define How Much Privacy Is Worth},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_14},
  doi          = {10.1007/11935308\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YaoFAT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceas/GoodrichTY05,
  author       = {Michael T. Goodrich and
                  Roberto Tamassia and
                  Danfeng Yao},
  title        = {Accredited DomainKeys: {A} Service Architecture for Improved Email
                  Validation},
  booktitle    = {{CEAS} 2005 - Second Conference on Email and Anti-Spam, July 21-22,
                  2005, Stanford University, California, {USA}},
  year         = {2005},
  url          = {http://www.ceas.cc/papers-2005/127.pdf},
  timestamp    = {Mon, 01 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceas/GoodrichTY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/YaoTP05,
  author       = {Danfeng Yao and
                  Roberto Tamassia and
                  Seth Proctor},
  title        = {On Improving the Performance of Role-Based Cascaded Delegation in
                  Ubiquitous Computing},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {157--170},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.28},
  doi          = {10.1109/SECURECOMM.2005.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/YaoTP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YaoSTW05,
  author       = {Danfeng Yao and
                  Michael Shin and
                  Roberto Tamassia and
                  William H. Winsborough},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Visualization of Automated Trust Negotiation},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {8},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.21},
  doi          = {10.1109/VIZSEC.2005.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/YaoSTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YaoFDL04,
  author       = {Danfeng Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {ID-based encryption for complex hierarchies with applications to forward
                  security and broadcast encryption},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {354--363},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030130},
  doi          = {10.1145/1030083.1030130},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YaoFDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TamassiaYW04,
  author       = {Roberto Tamassia and
                  Danfeng Yao and
                  William H. Winsborough},
  editor       = {Trent Jaeger and
                  Elena Ferrari},
  title        = {Role-based cascaded delegation},
  booktitle    = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages        = {146--155},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/990036.990061},
  doi          = {10.1145/990036.990061},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/TamassiaYW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoFDL04,
  author       = {Danfeng Yao and
                  Nelly Fazio and
                  Yevgeniy Dodis and
                  Anna Lysyanskaya},
  title        = {ID-Based Encryption for Complex Hierarchies with Applications to Forward
                  Security and Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoFDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics