Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Danfeng Yao
@article{DBLP:journals/cacm/Yao24, author = {Danfeng (Daphne) Yao}, title = {Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research}, journal = {Commun. {ACM}}, volume = {67}, number = {1}, pages = {47--49}, year = {2024}, url = {https://doi.org/10.1145/3624722}, doi = {10.1145/3624722}, timestamp = {Sun, 28 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Yao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/XiaoSAGVMY24, author = {Ya Xiao and Wenjia Song and Salman Ahmed and Xinyang Ge and Bimal Viswanath and Na Meng and Danfeng (Daphne) Yao}, title = {Measurement of Embedding Choices on Cryptographic {API} Completion Tasks}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {33}, number = {3}, pages = {56:1--56:30}, year = {2024}, url = {https://doi.org/10.1145/3625291}, doi = {10.1145/3625291}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/XiaoSAGVMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/JacobsCAYD23, author = {Edward J. Jacobs and Sabrina N. Campelo and Kenneth N. Aycock and Danfeng Yao and Rafael V. Davalos}, title = {Spatiotemporal estimations of temperature rise during electroporation treatments using a deep neural network}, journal = {Comput. Biol. Medicine}, volume = {161}, pages = {107019}, year = {2023}, url = {https://doi.org/10.1016/j.compbiomed.2023.107019}, doi = {10.1016/J.COMPBIOMED.2023.107019}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/JacobsCAYD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhangKXYM23, author = {Ying Zhang and Md Mahir Asef Kabir and Ya Xiao and Danfeng Yao and Na Meng}, title = {Automatic Detection of Java Cryptographic {API} Misuses: Are We There Yet?}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {1}, pages = {288--303}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3150302}, doi = {10.1109/TSE.2022.3150302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ZhangKXYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AfroseXRMY23, author = {Sharmin Afrose and Ya Xiao and Sazzadur Rahaman and Barton P. Miller and Danfeng Yao}, title = {Evaluation of Static Vulnerability Detection Tools With Java Cryptographic {API} Benchmarks}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {2}, pages = {485--497}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3154717}, doi = {10.1109/TSE.2022.3154717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AfroseXRMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/XiaoSQVMY23, author = {Ya Xiao and Wenjia Song and Jingyuan Qi and Bimal Viswanath and Patrick D. McDaniel and Danfeng Yao}, title = {Specializing Neural Networks for Cryptographic Code Completion Applications}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {6}, pages = {3524--3535}, year = {2023}, url = {https://doi.org/10.1109/TSE.2023.3265362}, doi = {10.1109/TSE.2023.3265362}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/XiaoSQVMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/RahamanFMY23, author = {Sazzadur Rahaman and Miles Frantz and Barton P. Miller and Danfeng (Daphne) Yao}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {SpanL: Creating Algorithms for Automatic {API} Misuse Detection with Program Analysis Compositions}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {515--529}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_28}, doi = {10.1007/978-3-031-41181-6\_28}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/RahamanFMY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeeksCAKYV23, author = {Connor Weeks and Aravind Cheruvu and Sifat Muhammad Abdullah and Shravya Kanchi and Daphne Yao and Bimal Viswanath}, title = {A First Look at Toxicity Injection Attacks on Open-domain Chatbots}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {521--534}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627122}, doi = {10.1145/3627106.3627122}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeeksCAKYV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SweatY23, author = {Wyatt Sweat and Danfeng (Daphne) Yao}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Poster: Cybersecurity Usage in the Wild: {A} look at Deployment Challenges in Intrusion Detection and Alert Handling}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {3606--3608}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3624375}, doi = {10.1145/3576915.3624375}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SweatY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/HajialigolKBYN023, author = {Daniel Hajialigol and Derek Kaknes and Tanner Barbour and Daphne Yao and Chris North and Jimeng Sun and David Liem and Xuan Wang}, editor = {Yansong Feng and Els Lefever}, title = {DRGCoder: Explainable Clinical Coding for the Early Prediction of Diagnostic-Related Groups}, booktitle = {Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, {EMNLP} 2023 - System Demonstrations, Singapore, December 6-10, 2023}, pages = {373--380}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.emnlp-demo.34}, doi = {10.18653/V1/2023.EMNLP-DEMO.34}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/HajialigolKBYN023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0001LJHAY23, author = {Salman Ahmed and Hans Liljestrand and Hani Jamjoom and Matthew Hicks and N. Asokan and Danfeng Yao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {1433--1450}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/ahmed-salman}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0001LJHAY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-02270, author = {Wenjia Song and Sanjula Karanam and Ya Xiao and Jingyuan Qi and Nathan Dautenhahn and Na Meng and Danfeng Yao}, title = {Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling}, journal = {CoRR}, volume = {abs/2306.02270}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.02270}, doi = {10.48550/ARXIV.2306.02270}, eprinttype = {arXiv}, eprint = {2306.02270}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-02270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-00710, author = {Ying Zhang and Wenjia Song and Zhengjie Ji and Danfeng Yao and Na Meng}, title = {How well does {LLM} generate security tests?}, journal = {CoRR}, volume = {abs/2310.00710}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.00710}, doi = {10.48550/ARXIV.2310.00710}, eprinttype = {arXiv}, eprint = {2310.00710}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-00710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-08428, author = {Tahmina Sultana Priya and Fan Leng and Anthony C. Luehrs and Eric W. Klee and Alina M. Allen and Konstantinos N. Lazaridis and Danfeng Yao and Shulan Tian}, title = {Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease}, journal = {CoRR}, volume = {abs/2311.08428}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.08428}, doi = {10.48550/ARXIV.2311.08428}, eprinttype = {arXiv}, eprint = {2311.08428}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-08428.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/AhmedXCFYY22, author = {Salman Ahmed and Ya Xiao and Taejoong Chung and Carol J. Fung and Moti Yung and Danfeng Daphne Yao}, title = {Privacy Guarantees of Bluetooth Low Energy Contact Tracing: {A} Case Study on {COVIDWISE}}, journal = {Computer}, volume = {55}, number = {2}, pages = {54--62}, year = {2022}, url = {https://doi.org/10.1109/MC.2021.3125611}, doi = {10.1109/MC.2021.3125611}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/AhmedXCFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LuoXCPY21, author = {Yuan Luo and Ya Xiao and Long Cheng and Guojun Peng and Danfeng (Daphne) Yao}, title = {Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {5}, pages = {106:1--106:36}, year = {2022}, url = {https://doi.org/10.1145/3453155}, doi = {10.1145/3453155}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LuoXCPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YaoRXAFTMCZAKMH22, author = {Danfeng Daphne Yao and Sazzadur Rahaman and Ya Xiao and Sharmin Afrose and Miles Frantz and Ke Tian and Na Meng and Cristina Cifuentes and Yang Zhao and Nicholas Allen and Nathan Keynes and Barton P. Miller and Elisa Heymann and Murat Kantarcioglu and Fahad Shaon}, title = {Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {6}, pages = {43--52}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3159481}, doi = {10.1109/MSEC.2022.3159481}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/YaoRXAFTMCZAKMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahamanCCY22, author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao}, title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {3790--3803}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3108031}, doi = {10.1109/TDSC.2021.3108031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahamanCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AhmedXCFYY22, author = {Salman Ahmed and Ya Xiao and Taejoong (Tijay) Chung and Carol J. Fung and Moti Yung and Danfeng (Daphne) Yao}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Privacy Guarantees of {BLE} Contact Tracing for {COVID-19} and Beyond: {A} Case Study on {COVIDWISE}}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1210--1212}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527279}, doi = {10.1145/3488932.3527279}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AhmedXCFYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/XiaoAGVMY22, author = {Ya Xiao and Salman Ahmed and Xinyang Ge and Bimal Viswanath and Na Meng and Danfeng Daphne Yao}, title = {Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic {API} Completion}, booktitle = {44th {IEEE/ACM} International Conference on Software Engineering: Companion Proceedings, {ICSE} Companion 2022, Pittsburgh, PA, USA, May 22-24, 2022}, pages = {360--361}, publisher = {{ACM/IEEE}}, year = {2022}, url = {https://doi.org/10.1145/3510454.3528645}, doi = {10.1145/3510454.3528645}, timestamp = {Thu, 27 Oct 2022 16:07:05 +0200}, biburl = {https://dblp.org/rec/conf/icse/XiaoAGVMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/ZhangXKY022, author = {Ying Zhang and Ya Xiao and Md Mahir Asef Kabir and Danfeng (Daphne) Yao and Na Meng}, editor = {Ayushi Rastogi and Rosalia Tufano and Gabriele Bavota and Venera Arnaoudova and Sonia Haiduc}, title = {Example-based vulnerability detection and repair in Java code}, booktitle = {Proceedings of the 30th {IEEE/ACM} International Conference on Program Comprehension, {ICPC} 2022, Virtual Event, May 16-17, 2022}, pages = {190--201}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3524610.3527895}, doi = {10.1145/3524610.3527895}, timestamp = {Wed, 26 Oct 2022 14:48:55 +0200}, biburl = {https://dblp.org/rec/conf/iwpc/ZhangXKY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/XiaoZAKYC22, author = {Ya Xiao and Yang Zhao and Nicholas Allen and Nathan Keynes and Danfeng Yao and Cristina Cifuentes}, title = {Industrial Strength Static Detection for Cryptographic {API} Misuses}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {61--62}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00022}, doi = {10.1109/SECDEV53368.2022.00022}, timestamp = {Tue, 20 Dec 2022 15:29:05 +0100}, biburl = {https://dblp.org/rec/conf/secdev/XiaoZAKYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/KabirWY022, author = {Md Mahir Asef Kabir and Ying Wang and Danfeng Yao and Na Meng}, title = {How Do Developers Follow Security-Relevant Best Practices When Using {NPM} Packages?}, booktitle = {{IEEE} Secure Development Conference, SecDev 2022, Atlanta, GA, USA, October 18-20, 2022}, pages = {77--83}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SecDev53368.2022.00027}, doi = {10.1109/SECDEV53368.2022.00027}, timestamp = {Sat, 15 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/KabirWY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-09009, author = {Ying Zhang and Ya Xiao and Md Mahir Asef Kabir and Danfeng Yao and Na Meng}, title = {Example-Based Vulnerability Detection and Repair in Java Code}, journal = {CoRR}, volume = {abs/2203.09009}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.09009}, doi = {10.48550/ARXIV.2203.09009}, eprinttype = {arXiv}, eprint = {2203.09009}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-09009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Yao21, author = {Danfeng (Daphne) Yao}, title = {Depth and persistence: what researchers need to know about impostor syndrome}, journal = {Commun. {ACM}}, volume = {64}, number = {6}, pages = {39--42}, year = {2021}, url = {https://doi.org/10.1145/3437255}, doi = {10.1145/3437255}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/Yao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/YaoB21, author = {Danfeng Daphne Yao and Terry Benzel}, title = {{ACSAC} 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {23--24}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3106595}, doi = {10.1109/MSEC.2021.3106595}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/YaoB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LuoCHPY21, author = {Yuan Luo and Long Cheng and Hongxin Hu and Guojun Peng and Danfeng Yao}, title = {Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {4}, pages = {2736--2750}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3019812}, doi = {10.1109/JIOT.2020.3019812}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LuoCHPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0005TYSB21, author = {Long Cheng and Ke Tian and Danfeng Daphne Yao and Lui Sha and Raheem A. Beyah}, title = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {825--842}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2906161}, doi = {10.1109/TDSC.2019.2906161}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0005TYSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChengALNCJAY21, author = {Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and N. Asokan and Danfeng (Daphne) Yao}, title = {Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {4}, pages = {26:1--26:36}, year = {2021}, url = {https://doi.org/10.1145/3462699}, doi = {10.1145/3462699}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChengALNCJAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Yao21, author = {Danfeng (Daphne) Yao}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Measurable and Deployable Security: Gaps, Successes, and Opportunities}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {3}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450328}, doi = {10.1145/3422337.3450328}, timestamp = {Wed, 21 Apr 2021 10:54:09 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Yao21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AfroseYK21, author = {Sharmin Afrose and Danfeng Daphne Yao and Olivera Kotevska}, title = {Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data}, booktitle = {18th International Conference on Privacy, Security and Trust, {PST} 2021, Auckland, New Zealand, December 13-15, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PST52912.2021.9647839}, doi = {10.1109/PST52912.2021.9647839}, timestamp = {Tue, 28 Dec 2021 14:39:32 +0100}, biburl = {https://dblp.org/rec/conf/pst/AfroseYK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Ahmed0LAY21, author = {Salman Ahmed and Long Cheng and Hans Liljestrand and N. Asokan and Danfeng Daphne Yao}, title = {Tutorial: Investigating Advanced Exploits for System Security Assurance}, booktitle = {{IEEE} Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021}, pages = {3--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SecDev51306.2021.00013}, doi = {10.1109/SECDEV51306.2021.00013}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/Ahmed0LAY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-06994, author = {Ying Zhang and Mahir Kabir and Ya Xiao and Danfeng Yao and Na Meng}, title = {Data-Driven Vulnerability Detection and Repair in Java Code}, journal = {CoRR}, volume = {abs/2102.06994}, year = {2021}, url = {https://arxiv.org/abs/2102.06994}, eprinttype = {arXiv}, eprint = {2102.06994}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-06994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08747, author = {Ya Xiao and Salman Ahmed and Wenjia Song and Xinyang Ge and Bimal Viswanath and Danfeng Yao}, title = {Embedding Code Contexts for Cryptographic {API} Suggestion: New Methodologies and Comparisons}, journal = {CoRR}, volume = {abs/2103.08747}, year = {2021}, url = {https://arxiv.org/abs/2103.08747}, eprinttype = {arXiv}, eprint = {2103.08747}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08842, author = {Salman Ahmed and Ya Xiao and Taejoong Chung and Carol J. Fung and Moti Yung and Danfeng Yao}, title = {Privacy Guarantees of {BLE} Contact Tracing: {A} Case Study on {COVIDWISE}}, journal = {CoRR}, volume = {abs/2111.08842}, year = {2021}, url = {https://arxiv.org/abs/2111.08842}, eprinttype = {arXiv}, eprint = {2111.08842}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-04037, author = {Sharmin Afrose and Ya Xiao and Sazzadur Rahaman and Barton P. Miller and Danfeng Yao}, title = {Evaluation of Static Vulnerability Detection Tools with Java Cryptographic {API} Benchmarks}, journal = {CoRR}, volume = {abs/2112.04037}, year = {2021}, url = {https://arxiv.org/abs/2112.04037}, eprinttype = {arXiv}, eprint = {2112.04037}, timestamp = {Mon, 13 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-04037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianTRY20, author = {Ke Tian and Gang Tan and Barbara G. Ryder and Danfeng (Daphne) Yao}, title = {Prioritizing data flows and sinks for app security transformation}, journal = {Comput. Secur.}, volume = {92}, pages = {101750}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101750}, doi = {10.1016/J.COSE.2020.101750}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TianTRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TianYRTP20, author = {Ke Tian and Danfeng Yao and Barbara G. Ryder and Gang Tan and Guojun Peng}, title = {Detection of Repackaged Android Malware with Code-Heterogeneity Features}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {64--77}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2745575}, doi = {10.1109/TDSC.2017.2745575}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TianYRTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ElishCBYR20, author = {Karim O. Elish and Haipeng Cai and Daniel Barton and Danfeng Yao and Barbara G. Ryder}, title = {Identifying Mobile Inter-App Communication Risks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {1}, pages = {90--102}, year = {2020}, url = {https://doi.org/10.1109/TMC.2018.2889495}, doi = {10.1109/TMC.2018.2889495}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ElishCBYR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhmedXSTMY20, author = {Salman Ahmed and Ya Xiao and Kevin Z. Snow and Gang Tan and Fabian Monrose and Danfeng (Daphne) Yao}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Methodologies for Quantifying (Re-)randomization Security and Timing under {JIT-ROP}}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1803--1820}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417248}, doi = {10.1145/3372297.3417248}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhmedXSTMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/RahamanXATFMMSK20, author = {Sazzadur Rahaman and Ya Xiao and Sharmin Afrose and Ke Tian and Miles Frantz and Na Meng and Barton P. Miller and Fahad Shaon and Murat Kantarcioglu and Danfeng (Daphne) Yao}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {Deployment-quality and Accessible Solutions for Cryptography Code Development}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {174--176}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3379536}, doi = {10.1145/3374664.3379536}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/RahamanXATFMMSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AfroseRY20, author = {Sharmin Afrose and Sazzadur Rahaman and Danfeng (Daphne) Yao}, editor = {Vassil Roussev and Bhavani Thuraisingham and Barbara Carminati and Murat Kantarcioglu}, title = {A Comprehensive Benchmark on Java Cryptographic {API} Misuses}, booktitle = {{CODASPY} '20: Tenth {ACM} Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020}, pages = {177--178}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3374664.3379537}, doi = {10.1145/3374664.3379537}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AfroseRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsm/GoswamiGLMY20, author = {Pronnoy Goswami and Saksham Gupta and Zhiyuan Li and Na Meng and Danfeng Daphne Yao}, title = {Investigating The Reproducibility of {NPM} Packages}, booktitle = {{IEEE} International Conference on Software Maintenance and Evolution, {ICSME} 2020, Adelaide, Australia, September 28 - October 2, 2020}, pages = {677--681}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICSME46990.2020.00071}, doi = {10.1109/ICSME46990.2020.00071}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsm/GoswamiGLMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/YuWOBBY20, author = {Xiaodong Yu and Fengguo Wei and Xinming Ou and Michela Becchi and Tekin Bicer and Danfeng Daphne Yao}, title = {GPU-Based Static Data-Flow Analysis for Fast and Scalable Android App Vetting}, booktitle = {2020 {IEEE} International Parallel and Distributed Processing Symposium (IPDPS), New Orleans, LA, USA, May 18-22, 2020}, pages = {274--284}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IPDPS47924.2020.00037}, doi = {10.1109/IPDPS47924.2020.00037}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipps/YuWOBBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/XiaoFARY20, author = {Ya Xiao and Miles Frantz and Sharmin Afrose and Sazzadur Rahaman and Danfeng Daphne Yao}, title = {Tutorial: Principles and Practices of Secure Cryptographic Coding in Java}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {5--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00016}, doi = {10.1109/SECDEV45635.2020.00016}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/XiaoFARY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/IslamRMHKY20, author = {Mazharul Islam and Sazzadur Rahaman and Na Meng and Behnaz Hassanshahi and Padmanabhan Krishnan and Danfeng Daphne Yao}, title = {Coding Practices and Recommendations of Spring Security for Enterprise Applications}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {49--57}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00024}, doi = {10.1109/SECDEV45635.2020.00024}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/IslamRMHKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-02855, author = {Sazzadur Rahaman and Gang Wang and Danfeng Yao}, title = {Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations}, journal = {CoRR}, volume = {abs/2002.02855}, year = {2020}, url = {https://arxiv.org/abs/2002.02855}, eprinttype = {arXiv}, eprint = {2002.02855}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-02855.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13213, author = {Yuan Luo and Ya Xiao and Long Cheng and Guojun Peng and Danfeng Daphne Yao}, title = {Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities}, journal = {CoRR}, volume = {abs/2003.13213}, year = {2020}, url = {https://arxiv.org/abs/2003.13213}, eprinttype = {arXiv}, eprint = {2003.13213}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13213.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06122, author = {Ya Xiao and Yang Zhao and Nicholas Allen and Nathan Keynes and Danfeng Yao and Cristina Cifuentes}, title = {Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases}, journal = {CoRR}, volume = {abs/2007.06122}, year = {2020}, url = {https://arxiv.org/abs/2007.06122}, eprinttype = {arXiv}, eprint = {2007.06122}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-14319, author = {Mazharul Islam and Sazzadur Rahaman and Na Meng and Behnaz Hassanshahi and Padmanabhan Krishnan and Danfeng Yao}, title = {Coding Practices and Recommendations of Spring Security for Enterprise Applications}, journal = {CoRR}, volume = {abs/2007.14319}, year = {2020}, url = {https://arxiv.org/abs/2007.14319}, eprinttype = {arXiv}, eprint = {2007.14319}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-14319.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-07915, author = {Li Xu and Thomas Lux and Tyler H. Chang and Bo Li and Yili Hong and Layne T. Watson and Ali Raza Butt and Danfeng Yao and Kirk W. Cameron}, title = {Prediction of High-Performance Computing Input/Output Variability and Its Application to Optimization for System Configurations}, journal = {CoRR}, volume = {abs/2012.07915}, year = {2020}, url = {https://arxiv.org/abs/2012.07915}, eprinttype = {arXiv}, eprint = {2012.07915}, timestamp = {Sun, 03 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-07915.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaiMRY19, author = {Haipeng Cai and Na Meng and Barbara G. Ryder and Danfeng Yao}, title = {DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {6}, pages = {1455--1470}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2879302}, doi = {10.1109/TIFS.2018.2879302}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaiMRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahamanWY19, author = {Sazzadur Rahaman and Gang Wang and Danfeng Daphne Yao}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {481--498}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363195}, doi = {10.1145/3319535.3363195}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RahamanWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahamanXASTFKY19, author = {Sazzadur Rahaman and Ya Xiao and Sharmin Afrose and Fahad Shaon and Ke Tian and Miles Frantz and Murat Kantarcioglu and Danfeng (Daphne) Yao}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2455--2472}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345659}, doi = {10.1145/3319535.3345659}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RahamanXASTFKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahamanXATFMMSK19, author = {Sazzadur Rahaman and Ya Xiao and Sharmin Afrose and Ke Tian and Miles Frantz and Na Meng and Barton P. Miller and Fahad Shaon and Murat Kantarcioglu and Danfeng (Daphne) Yao}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2545--2547}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363252}, doi = {10.1145/3319535.3363252}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RahamanXATFMMSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/XiaoHY19, author = {Ya Xiao and Qingying Hao and Danfeng Daphne Yao}, title = {Neural Cryptanalysis: Metrics, Methodology, and Applications in {CPS} Ciphers}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937659}, doi = {10.1109/DSC47296.2019.8937659}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/XiaoHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/AfroseRY19, author = {Sharmin Afrose and Sazzadur Rahaman and Danfeng Yao}, title = {CryptoAPI-Bench: {A} Comprehensive Benchmark on Java Cryptographic {API} Misuses}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {49--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00017}, doi = {10.1109/SECDEV.2019.00017}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/AfroseRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/0005LANJAY19, author = {Long Cheng and Hans Liljestrand and Md. Salman Ahmed and Thomas Nyman and Trent Jaeger and N. Asokan and Danfeng Yao}, title = {Exploitation Techniques and Defenses for Data-Oriented Attacks}, booktitle = {2019 {IEEE} Cybersecurity Development, SecDev 2019, Tysons Corner, VA, USA, September 23-25, 2019}, pages = {114--128}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SecDev.2019.00022}, doi = {10.1109/SECDEV.2019.00022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secdev/0005LANJAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YuXCY19, author = {Xiaodong Yu and Ya Xiao and Kirk W. Cameron and Danfeng (Daphne) Yao}, editor = {Rob Jansen and Peter A. H. Peterson}, title = {Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks}, booktitle = {12th {USENIX} Workshop on Cyber Security Experimentation and Test, {CSET} 2019, Santa Clara, CA, USA, August 12, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/cset19/presentation/yu}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/YuXCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-08359, author = {Long Cheng and Hans Liljestrand and Thomas Nyman and Yu Tsung Lee and Danfeng Yao and Trent Jaeger and N. Asokan}, title = {Exploitation Techniques and Defenses for Data-Oriented Attacks}, journal = {CoRR}, volume = {abs/1902.08359}, year = {2019}, url = {http://arxiv.org/abs/1902.08359}, eprinttype = {arXiv}, eprint = {1902.08359}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-08359.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-03034, author = {Salman Ahmed and Ya Xiao and Gang Tan and Kevin Z. Snow and Fabian Monrose and Danfeng Yao}, title = {Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization}, journal = {CoRR}, volume = {abs/1910.03034}, year = {2019}, url = {http://arxiv.org/abs/1910.03034}, eprinttype = {arXiv}, eprint = {1910.03034}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-03034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-04020, author = {Ya Xiao and Qingying Hao and Danfeng Yao}, title = {Neural Cryptanalysis: Metrics, Methodology, and Applications in {CPS} Ciphers}, journal = {CoRR}, volume = {abs/1911.04020}, year = {2019}, url = {http://arxiv.org/abs/1911.04020}, eprinttype = {arXiv}, eprint = {1911.04020}, timestamp = {Sun, 01 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-04020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/LuxWCBLYXBBCY018, author = {Thomas C. H. Lux and Layne T. Watson and Tyler H. Chang and Jon Bernard and Bo Li and Xiaodong Yu and Li Xu and Godmar Back and Ali Raza Butt and Kirk W. Cameron and Danfeng Yao and Yili Hong}, editor = {Ka{-}Wing Wong and Chi Shen and Dana Brown}, title = {Novel meshes for multivariate interpolation and approximation}, booktitle = {Proceedings of the {ACMSE} 2018 Conference, Richmond, KY, USA, March 29-31, 2018}, pages = {13:1--13:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3190645.3190687}, doi = {10.1145/3190645.3190687}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/LuxWCBLYXBBCY018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MengNYZA18, author = {Na Meng and Stefan Nagy and Danfeng (Daphne) Yao and Wenjie Zhuang and Gustavo A. Arango{-}Argoty}, editor = {Michel Chaudron and Ivica Crnkovic and Marsha Chechik and Mark Harman}, title = {Secure coding practices in Java: challenges and vulnerabilities}, booktitle = {Proceedings of the 40th International Conference on Software Engineering, {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {372--383}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180155.3180201}, doi = {10.1145/3180155.3180201}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/MengNYZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imc/TianJ0Y018, author = {Ke Tian and Steve T. K. Jan and Hang Hu and Danfeng Yao and Gang Wang}, title = {Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild}, booktitle = {Proceedings of the Internet Measurement Conference 2018, {IMC} 2018, Boston, MA, USA, October 31 - November 02, 2018}, pages = {429--442}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3278569}, timestamp = {Fri, 25 Oct 2019 09:51:49 +0200}, biburl = {https://dblp.org/rec/conf/imc/TianJ0Y018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Yao18, author = {Danfeng (Daphne) Yao}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Data Breach and Multiple Points to Stop It}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3206001}, doi = {10.1145/3205977.3206001}, timestamp = {Wed, 21 Nov 2018 12:44:16 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Yao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahamanMY18, author = {Sazzadur Rahaman and Na Meng and Danfeng Yao}, title = {Tutorial: Principles and Practices of Secure Crypto Coding in Java}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {122--123}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00024}, doi = {10.1109/SECDEV.2018.00024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RahamanMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TianLBY18, author = {Ke Tian and Zhou Li and Kevin D. Bowers and Danfeng (Daphne) Yao}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {311--331}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_17}, doi = {10.1007/978-3-030-01704-0\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/TianLBY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-00074, author = {Long Cheng and Ke Tian and Danfeng Yao and Lui Sha and Raheem A. Beyah}, title = {Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/1805.00074}, year = {2018}, url = {http://arxiv.org/abs/1805.00074}, eprinttype = {arXiv}, eprint = {1805.00074}, timestamp = {Mon, 06 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-00074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-06881, author = {Sazzadur Rahaman and Ya Xiao and Ke Tian and Fahad Shaon and Murat Kantarcioglu and Danfeng Yao}, title = {{CHIRON:} Deployment-quality Detection of Java Cryptographic Vulnerabilities}, journal = {CoRR}, volume = {abs/1806.06881}, year = {2018}, url = {http://arxiv.org/abs/1806.06881}, eprinttype = {arXiv}, eprint = {1806.06881}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-06881.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2017Yao, author = {Danfeng (Daphne) Yao and Xiaokui Shu and Long Cheng and Salvatore J. Stolfo}, title = {Anomaly Detection as a Service: Challenges, Advances, and Opportunities}, series = {Synthesis Lectures on Information Security, Privacy, and Trust}, publisher = {Morgan {\&} Claypool Publishers}, year = {2017}, url = {https://doi.org/10.2200/S00800ED1V01Y201709SPT022}, doi = {10.2200/S00800ED1V01Y201709SPT022}, isbn = {978-3-031-01226-6}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/synthesis/2017Yao.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RahamanCYLP17, author = {Sazzadur Rahaman and Long Cheng and Danfeng Daphne Yao and He Li and Jung{-}Min "Jerry" Park}, title = {Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {4}, pages = {384--403}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0055}, doi = {10.1515/POPETS-2017-0055}, timestamp = {Sat, 26 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/RahamanCYLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ShuYRJ17, author = {Xiaokui Shu and Danfeng (Daphne) Yao and Naren Ramakrishnan and Trent Jaeger}, title = {Long-Span Program Behavior Modeling and Attack Detection}, journal = {{ACM} Trans. Priv. Secur.}, volume = {20}, number = {4}, pages = {12:1--12:28}, year = {2017}, url = {https://doi.org/10.1145/3105761}, doi = {10.1145/3105761}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/ShuYRJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/widm/ChengLY17, author = {Long Cheng and Fang Liu and Danfeng (Daphne) Yao}, title = {Enterprise data breach: causes, challenges, prevention, and future directions}, journal = {WIREs Data Mining Knowl. Discov.}, volume = {7}, number = {5}, year = {2017}, url = {https://doi.org/10.1002/widm.1211}, doi = {10.1002/WIDM.1211}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/widm/ChengLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChengTY17, author = {Long Cheng and Ke Tian and Danfeng (Daphne) Yao}, title = {Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {315--326}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134640}, doi = {10.1145/3134600.3134640}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChengTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Yao17, author = {Danfeng (Daphne) Yao}, editor = {Cong Wang and Murat Kantarcioglu}, title = {Cloud Data Analytics for Security: Applications, Challenges, and Opportunities}, booktitle = {Proceedings of the Fifth {ACM} International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {1}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055259.3055266}, doi = {10.1145/3055259.3055266}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Yao17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TianTYR17, author = {Ke Tian and Gang Tan and Danfeng Daphne Yao and Barbara G. Ryder}, editor = {Taesoo Kim and Cliff Wang and Dinghao Wu}, title = {ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation}, booktitle = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {35--41}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3141235.3141239}, doi = {10.1145/3141235.3141239}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/TianTYR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BosuLYW17, author = {Amiangshu Bosu and Fang Liu and Danfeng (Daphne) Yao and Gang Wang}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {71--85}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053004}, doi = {10.1145/3052973.3053004}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BosuLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChengTY17, author = {Long Cheng and Ke Tian and Danfeng (Daphne) Yao}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{POSTER:} Detection of {CPS} Program Anomalies by Enforcing Cyber-Physical Execution Semantics}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2483--2485}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3138839}, doi = {10.1145/3133956.3138839}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChengTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoB17, author = {Danfeng (Daphne) Yao and Elisa Bertino}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{CCS} 2017: Women in Cyber Security (CyberW) Workshop}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2631--2632}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3137041}, doi = {10.1145/3133956.3137041}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chase/AlmohriCYA17, author = {Hussain M. J. Almohri and Long Cheng and Danfeng Yao and Homa Alemzadeh}, editor = {Paolo Bonato and Honggang Wang}, title = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems}, booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected Health: Applications, Systems and Engineering Technologies, {CHASE} 2017, Philadelphia, PA, USA, July 17-19, 2017}, pages = {114--119}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CHASE.2017.69}, doi = {10.1109/CHASE.2017.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chase/AlmohriCYA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhangZYLHY17, author = {Ning Zhang and Ruide Zhang and Qiben Yan and Wenjing Lou and Y. Thomas Hou and Danfeng Yao}, title = {Black penguin: On the feasibility of detecting intrusion with homogeneous memory}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {586--594}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228671}, doi = {10.1109/CNS.2017.8228671}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ZhangZYLHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiuCWYER17, author = {Fang Liu and Haipeng Cai and Gang Wang and Danfeng (Daphne) Yao and Karim O. Elish and Barbara G. Ryder}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Prioritized Analysis of Inter-App Communication Risks}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {159--161}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029843}, doi = {10.1145/3029806.3029843}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiuCWYER17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KedrowitschYWC17, author = {Alexander Kedrowitsch and Danfeng (Daphne) Yao and Gang Wang and Kirk W. Cameron}, editor = {Nicholas J. Multari and Anoop Singhal and Erin Miller}, title = {A First Look: Using Linux Containers for Deceptive Honeypots}, booktitle = {Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {15--22}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140368.3140371}, doi = {10.1145/3140368.3140371}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/KedrowitschYWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/RahamanY17, author = {Sazzadur Rahaman and Danfeng Yao}, title = {Program Analysis of Cryptographic Implementations for Security}, booktitle = {{IEEE} Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SecDev.2017.23}, doi = {10.1109/SECDEV.2017.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/RahamanY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuCWYER17, author = {Fang Liu and Haipeng Cai and Gang Wang and Danfeng Yao and Karim O. Elish and Barbara G. Ryder}, title = {MR-Droid: {A} Scalable and Prioritized Analysis of Inter-App Communication Risks}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {189--198}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.12}, doi = {10.1109/SPW.2017.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LiuCWYER17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LiuWPYW17, author = {Fang Liu and Chun Wang and Andres Pico and Danfeng Yao and Gang Wang}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Measuring the Insecurity of Mobile Deep Links of Android}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {953--969}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/liu}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/LiuWPYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ShuTCY17, author = {Xiaokui Shu and Ke Tian and Andrew Ciambrone and Danfeng Yao}, title = {Breaking the Target: An Analysis of Target Data Breach and Lessons Learned}, journal = {CoRR}, volume = {abs/1701.04940}, year = {2017}, url = {http://arxiv.org/abs/1701.04940}, eprinttype = {arXiv}, eprint = {1701.04940}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ShuTCY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-09970, author = {Na Meng and Stefan Nagy and Danfeng Daphne Yao and Wenjie Zhuang and Gustavo A. Arango{-}Argoty}, title = {Secure Coding Practices in Java: Challenges and Vulnerabilities}, journal = {CoRR}, volume = {abs/1709.09970}, year = {2017}, url = {http://arxiv.org/abs/1709.09970}, eprinttype = {arXiv}, eprint = {1709.09970}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-09970.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/0023YRZ16, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan and Zhibin Zhang}, title = {Causality reasoning about network events for detecting stealthy malware activities}, journal = {Comput. Secur.}, volume = {58}, pages = {180--198}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.01.002}, doi = {10.1016/J.COSE.2016.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0023YRZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriWYO16, author = {Hussain M. J. Almohri and Layne T. Watson and Danfeng Yao and Xinming Ou}, title = {Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {474--487}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411264}, doi = {10.1109/TDSC.2015.2411264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShuZYF16, author = {Xiaokui Shu and Jing Zhang and Danfeng (Daphne) Yao and Wu{-}chun Feng}, title = {Fast Detection of Transformed Data Leaks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {3}, pages = {528--542}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2503271}, doi = {10.1109/TIFS.2015.2503271}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShuZYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/ShuLY16, author = {Xiaokui Shu and Nikolay Laptev and Danfeng (Daphne) Yao}, editor = {Dale Schuurmans and Michael P. Wellman}, title = {{DECT:} Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution}, booktitle = {Proceedings of the Thirtieth {AAAI} Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, {USA}}, pages = {4395--4396}, publisher = {{AAAI} Press}, year = {2016}, url = {https://doi.org/10.1609/aaai.v30i1.9835}, doi = {10.1609/AAAI.V30I1.9835}, timestamp = {Mon, 04 Sep 2023 15:08:28 +0200}, biburl = {https://dblp.org/rec/conf/aaai/ShuLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/YuFYB16, author = {Xiaodong Yu and Wu{-}chun Feng and Danfeng (Daphne) Yao and Michela Becchi}, editor = {Patrick Crowley and Luigi Rizzo and Laurent Mathy}, title = {{O3FA:} {A} Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection}, booktitle = {Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, {ANCS} 2016, Santa Clara, CA, USA, March 17-18, 2016}, pages = {1--11}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2881025.2881034}, doi = {10.1145/2881025.2881034}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/YuFYB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0023YR16, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Causality-based Sensemaking of Network Traffic for Android Application Security}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {47--58}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996760}, doi = {10.1145/2996758.2996760}, timestamp = {Mon, 26 Jun 2023 20:41:47 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0023YR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuY16, author = {Xiaokui Shu and Danfeng Yao}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Program Anomaly Detection: Methodology and Practices}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1853--1854}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2976750}, doi = {10.1145/2976749.2976750}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShuY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/XuTYR16, author = {Kui Xu and Ke Tian and Danfeng Yao and Barbara G. Ryder}, title = {A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {467--478}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.49}, doi = {10.1109/DSN.2016.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/XuTYR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/ShuLY16, author = {Xiaokui Shu and Nikolay Laptev and Danfeng Yao}, editor = {Evaggelia Pitoura and Sofian Maabout and Georgia Koutrika and Am{\'{e}}lie Marian and Letizia Tanca and Ioana Manolescu and Kostas Stefanidis}, title = {{DECT:} Distributed Evolving Context Tree for Mining Web Behavior Evolution}, booktitle = {Proceedings of the 19th International Conference on Extending Database Technology, {EDBT} 2016, Bordeaux, France, March 15-16, 2016, Bordeaux, France, March 15-16, 2016}, pages = {573--579}, publisher = {OpenProceedings.org}, year = {2016}, url = {https://doi.org/10.5441/002/edbt.2016.54}, doi = {10.5441/002/EDBT.2016.54}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edbt/ShuLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/FereidooniCYS16, author = {Hossein Fereidooni and Mauro Conti and Danfeng Yao and Alessandro Sperduti}, editor = {Mohamad Badra and Giovanni Pau and Vasos Vassiliou}, title = {{ANASTASIA:} ANdroid mAlware detection using STatic analySIs of Applications}, booktitle = {8th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2016, Larnaca, Cyprus, November 21-23, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NTMS.2016.7792435}, doi = {10.1109/NTMS.2016.7792435}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/FereidooniCYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TianYRT16, author = {Ke Tian and Danfeng Yao and Barbara G. Ryder and Gang Tan}, title = {Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware}, booktitle = {2016 {IEEE} Security and Privacy Workshops, {SP} Workshops 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {262--271}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SPW.2016.33}, doi = {10.1109/SPW.2016.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TianYRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ElishSYRJ15, author = {Karim O. Elish and Xiaokui Shu and Danfeng (Daphne) Yao and Barbara G. Ryder and Xuxian Jiang}, title = {Profiling user-trigger dependence for Android malware detection}, journal = {Comput. Secur.}, volume = {49}, pages = {255--273}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.11.001}, doi = {10.1016/J.COSE.2014.11.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ElishSYRJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShuYB15, author = {Xiaokui Shu and Danfeng Yao and Elisa Bertino}, title = {Privacy-Preserving Detection of Sensitive Data Exposure}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {5}, pages = {1092--1103}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2398363}, doi = {10.1109/TIFS.2015.2398363}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShuYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShuYR15, author = {Xiaokui Shu and Danfeng Yao and Naren Ramakrishnan}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {401--413}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813654}, doi = {10.1145/2810103.2813654}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ShuYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhangSYN15, author = {Hao Zhang and Maoyuan Sun and Danfeng (Daphne) Yao and Chris North}, editor = {Stephen Huang and Rakesh M. Verma}, title = {Visualizing Traffic Causality for Analyzing Network Anomalies}, booktitle = {Proceedings of the 2015 {ACM} International Workshop on International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2015, San Antonio, TX, USA, March 4, 2015}, pages = {37--42}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2713579.2713583}, doi = {10.1145/2713579.2713583}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhangSYN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ShuZYF15, author = {Xiaokui Shu and Jing Zhang and Danfeng Yao and Wu{-}chun Feng}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {147--149}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699130}, doi = {10.1145/2699026.2699130}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ShuZYF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiuSYB15, author = {Fang Liu and Xiaokui Shu and Danfeng Yao and Ali Raza Butt}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {195--206}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699106}, doi = {10.1145/2699026.2699106}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiuSYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/XuYRT15, author = {Kui Xu and Danfeng (Daphne) Yao and Barbara G. Ryder and Ke Tian}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Probabilistic Program Modeling for High-Precision Anomaly Classification}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {497--511}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.37}, doi = {10.1109/CSF.2015.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/XuYRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShuZYF15, author = {Xiaokui Shu and Jing Zhang and Danfeng Yao and Wu{-}chun Feng}, title = {Rapid and parallel content screening for detecting transformed data exposure}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {191--196}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179383}, doi = {10.1109/INFCOMW.2015.7179383}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShuZYF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DouZYY15, author = {Yanzhi Dou and Kexiong Curtis Zeng and Yaling Yang and Danfeng (Daphne) Yao}, title = {MadeCR: Correlation-based malware detection for cognitive radio}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {639--647}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218432}, doi = {10.1109/INFOCOM.2015.7218432}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/DouZYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShuYR15, author = {Xiaokui Shu and Danfeng (Daphne) Yao and Barbara G. Ryder}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {A Formal Framework for Program Anomaly Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {270--292}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_13}, doi = {10.1007/978-3-319-26362-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShuYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015scc, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516}, doi = {10.1145/2732516}, isbn = {978-1-4503-3447-1}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2015scc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng Yao and Dennis G. Kafura}, title = {Process Authentication for High System Assurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {168--180}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.29}, doi = {10.1109/TDSC.2013.29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYR14, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {39--50}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590309}, doi = {10.1145/2590296.2590309}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {DroidBarrier: know what is executing on your android}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {257--264}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557571}, doi = {10.1145/2557547.2557571}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/XuYPLG14, author = {Kui Xu and Danfeng Yao and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and Casey Link and E. Scott Geller}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {Role-playing game for studying user behaviors in security: {A} case study on email secrecy}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {18--26}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257242}, doi = {10.4108/ICST.COLLABORATECOM.2014.257242}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/XuYPLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmla/WolfeEY14, author = {Britton Wolfe and Karim O. Elish and Danfeng Yao}, title = {High Precision Screening for Android Malware with Dimensionality Reduction}, booktitle = {13th International Conference on Machine Learning and Applications, {ICMLA} 2014, Detroit, MI, USA, December 3-6, 2014}, pages = {21--28}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICMLA.2014.10}, doi = {10.1109/ICMLA.2014.10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmla/WolfeEY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WolfeEY14, author = {Britton Wolfe and Karim O. Elish and Danfeng (Daphne) Yao}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Comprehensive Behavior Profiling for Proactive Android Malware Detection}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {328--344}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_19}, doi = {10.1007/978-3-319-13257-0\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/WolfeEY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuBSY13, author = {Kui Xu and Patrick Butler and Sudip Saha and Danfeng (Daphne) Yao}, title = {{DNS} for Massive-Scale Command and Control}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {10}, number = {3}, pages = {143--153}, year = {2013}, url = {https://doi.org/10.1109/TDSC.2013.10}, doi = {10.1109/TDSC.2013.10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuBSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/ElishDYK13, author = {Karim O. Elish and Yipan Deng and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elhadi M. Shakshuki and Karim Djouani and Michael Sheng and Mohamed F. Younis and Eduardo Vaz and Wayne Groszko}, title = {Device-based Isolation for Securing Cryptographic Keys}, booktitle = {Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013), Halifax, Nova Scotia, Canada, June 25-28, 2013}, series = {Procedia Computer Science}, volume = {19}, pages = {1130--1135}, publisher = {Elsevier}, year = {2013}, url = {https://doi.org/10.1016/j.procs.2013.06.160}, doi = {10.1016/J.PROCS.2013.06.160}, timestamp = {Fri, 28 Jan 2022 08:58:39 +0100}, biburl = {https://dblp.org/rec/conf/ant/ElishDYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangYR13, author = {Hao Zhang and Danfeng (Daphne) Yao and Naren Ramakrishnan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {A semantic-aware approach to reasoning about network traffic relations}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1375--1378}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512504}, doi = {10.1145/2508859.2512504}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangYR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/XiongZZY13, author = {Huijun Xiong and Qingji Zheng and Xinwen Zhang and Danfeng Yao}, title = {CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {172--180}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682705}, doi = {10.1109/CNS.2013.6682705}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/XiongZZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ShuSYL13, author = {Xiaokui Shu and John Smiy and Danfeng (Daphne) Yao and Heshan Lin}, title = {Massive distributed and parallel log analysis for organizational security}, booktitle = {Workshops Proceedings of the Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {194--199}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOMW.2013.6824985}, doi = {10.1109/GLOCOMW.2013.6824985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ShuSYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StefanSY12, author = {Deian Stefan and Xiaokui Shu and Danfeng (Daphne) Yao}, title = {Robustness of keystroke-dynamics based biometrics against synthetic forgeries}, journal = {Comput. Secur.}, volume = {31}, number = {1}, pages = {109--121}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2011.10.001}, doi = {10.1016/J.COSE.2011.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StefanSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuXWSY12, author = {Kui Xu and Huijun Xiong and Chehai Wu and Deian Stefan and Danfeng Yao}, title = {Data-Provenance Verification For Secure Hosts}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {2}, pages = {173--183}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.50}, doi = {10.1109/TDSC.2011.50}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuXWSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/XiongZYWW12, author = {Huijun Xiong and Xinwen Zhang and Danfeng Yao and Xiaoxin Wu and Yonggang Wen}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Towards end-to-end secure content storage and delivery with public cloud}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {257--266}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133633}, doi = {10.1145/2133601.2133633}, timestamp = {Wed, 06 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/XiongZYWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlmohriYK12, author = {Hussain M. J. Almohri and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Identifying native applications with high assurance}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {275--282}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133635}, doi = {10.1145/2133601.2133635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/WangYSWLZY0G12, author = {Yipeng Wang and Xiao{-}chun Yun and Muhammad Zubair Shafiq and Liyan Wang and Alex X. Liu and Zhibin Zhang and Danfeng Yao and Yongzheng Zhang and Li Guo}, title = {A semantics aware approach to automated reverse engineering unknown protocols}, booktitle = {20th {IEEE} International Conference on Network Protocols, {ICNP} 2012, Austin, TX, USA, October 30 - Nov. 2, 2012}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICNP.2012.6459963}, doi = {10.1109/ICNP.2012.6459963}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/WangYSWLZY0G12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ShuY12, author = {Xiaokui Shu and Danfeng (Daphne) Yao}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {Data Leak Detection as a Service}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {222--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_14}, doi = {10.1007/978-3-642-36883-7\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ShuY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangBYR12, author = {Hao Zhang and William Banick and Danfeng Yao and Naren Ramakrishnan}, title = {User Intention-Based Traffic Dependence Analysis for Anomaly Detection}, booktitle = {2012 {IEEE} Symposium on Security and Privacy Workshops, San Francisco, CA, USA, May 24-25, 2012}, pages = {104--112}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SPW.2012.15}, doi = {10.1109/SPW.2012.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangBYR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangYF12, author = {Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng}, title = {Adaptive Key Protection in Complex Cryptosystems with Attributes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {136}, year = {2012}, url = {http://eprint.iacr.org/2012/136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangYF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/WangZYQG11, author = {Yipeng Wang and Zhibin Zhang and Danfeng (Daphne) Yao and Buyun Qu and Li Guo}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Inferring Protocol State Machine from Network Traces: {A} Probabilistic Approach}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {1--18}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_1}, doi = {10.1007/978-3-642-21554-4\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/WangZYQG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ButlerXY11, author = {Patrick Butler and Kui Xu and Danfeng (Daphne) Yao}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Quantitatively Analyzing Stealthy Communication Channels}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {238--254}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_14}, doi = {10.1007/978-3-642-21554-4\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ButlerXY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XuYMC11, author = {Kui Xu and Danfeng Yao and Qiang Ma and Alexander Crowell}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Detecting infection onset with behavior-based policies}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {57--64}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6059960}, doi = {10.1109/ICNSS.2011.6059960}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/XuYMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ZarandioonYG11, author = {Saman Zarandioon and Danfeng (Daphne) Yao and Vinod Ganapathy}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {{K2C:} Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {59--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_4}, doi = {10.1007/978-3-642-31909-9\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ZarandioonYG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/XiongZZY11, author = {Huijun Xiong and Xinwen Zhang and Wei Zhu and Danfeng Yao}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {491--500}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_30}, doi = {10.1007/978-3-642-31909-9\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/XiongZZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/RamstetterYY10, author = {Jerry Rick Ramstetter and Yaling Yang and Danfeng Yao}, title = {Applications and Security of Next-Generation, User-Centric Wireless Systems}, journal = {Future Internet}, volume = {2}, number = {3}, pages = {190--211}, year = {2010}, url = {https://doi.org/10.3390/fi2030190}, doi = {10.3390/FI2030190}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/RamstetterYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/TamassiaYW10, author = {Roberto Tamassia and Danfeng Yao and William H. Winsborough}, title = {Independently Verifiable Decentralized Role-Based Delegation}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {40}, number = {6}, pages = {1206--1219}, year = {2010}, url = {https://doi.org/10.1109/TSMCA.2010.2045118}, doi = {10.1109/TSMCA.2010.2045118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/TamassiaYW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangTWY10, author = {Chih{-}Cheng Chang and Brian Thompson and Wendy Hui Wang and Danfeng Yao}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Towards publishing recommendation data with predictive anonymization}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {24--35}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755693}, doi = {10.1145/1755688.1755693}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChangTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/StefanY10, author = {Deian Stefan and Danfeng Yao}, editor = {Karl Aberer and James Joshi}, title = {Keystroke-dynamics authentication against synthetic forgeries}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--8}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.16}, doi = {10.4108/ICST.COLLABORATECOM.2010.16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/StefanY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuMY10, author = {Kui Xu and Qiang Ma and Danfeng (Daphne) Yao}, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Detecting the Onset of Infection for Secure Hosts}, booktitle = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, pages = {492--493}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3\_29}, doi = {10.1007/978-3-642-15512-3\_29}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoT09, author = {Danfeng Yao and Roberto Tamassia}, title = {Compact and Anonymous Role-Based Authorization Chain}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {15:1--15:27}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455528}, doi = {10.1145/1455526.1455528}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThompsonY09, author = {Brian Thompson and Danfeng Yao}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {The union-split algorithm and cluster-based anonymization of social networks}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {218--227}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533088}, doi = {10.1145/1533057.1533088}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThompsonY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/VyasSCY09, author = {Nitya Vyas and Anna Cinzia Squicciarini and Chih{-}Cheng Chang and Danfeng Yao}, editor = {James B. D. Joshi and Tao Zhang}, title = {Towards automatic privacy management in Web 2.0 with semantic analysis on annotations}, booktitle = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8340}, doi = {10.4108/ICST.COLLABORATECOM2009.8340}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/VyasSCY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/ZarandioonYG09, author = {Saman Zarandioon and Danfeng Yao and Vinod Ganapathy}, editor = {Elisa Bertino and Thomas Gro{\ss} and Kenji Takahashi}, title = {Privacy-aware identity management for client-side mashup applications}, booktitle = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009}, pages = {21--30}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655028.1655036}, doi = {10.1145/1655028.1655036}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/ZarandioonYG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XiongMSWY09, author = {Huijun Xiong and Prateek Malhotra and Deian Stefan and Chehai Wu and Danfeng Yao}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {User-Assisted Host-Based Detection of Outbound Malware Traffic}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {293--307}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_23}, doi = {10.1007/978-3-642-11145-7\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/XiongMSWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/ChumashY09, author = {Tzvi Chumash and Danfeng Yao}, editor = {Elena Ferrari and Ninghui Li and Elisa Bertino and Y{\"{u}}cel Karabulut}, title = {Detection and Prevention of Insider Threats in Database Driven Web Services}, booktitle = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {300}, pages = {117--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02056-8\_8}, doi = {10.1007/978-3-642-02056-8\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/ChumashY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ThompsonHHSY09, author = {Brian Thompson and Stuart Haber and William G. Horne and Tomas Sander and Danfeng Yao}, editor = {Ian Goldberg and Mikhail J. Atallah}, title = {Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases}, booktitle = {Privacy Enhancing Technologies, 9th International Symposium, {PETS} 2009, Seattle, WA, USA, August 5-7, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5672}, pages = {185--201}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03168-7\_11}, doi = {10.1007/978-3-642-03168-7\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/ThompsonHHSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/BabicXYI09, author = {Anitra Babic and Huijun Xiong and Danfeng Yao and Liviu Iftode}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Building robust authentication systems with activity-based personal questions}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {19--24}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655067}, doi = {10.1145/1655062.1655067}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/BabicXYI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/YaoFDL09, author = {Danfeng (Daphne) Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, editor = {Marc Joye and Gregory Neven}, title = {Forward-Secure Hierarchical {IBE} with Applications to Broadcast Encryption}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {100--118}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-100}, doi = {10.3233/978-1-58603-947-9-100}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/YaoFDL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Yao08, author = {Danfeng Yao}, title = {Privacy-Aware Authentication and Authorization in Trust Management}, school = {Brown University, {USA}}, year = {2008}, url = {https://cs.brown.edu/research/pubs/theses/phd/2008/yao.pdf}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Yao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GoodrichTY08, author = {Michael T. Goodrich and Roberto Tamassia and Danfeng (Daphne) Yao}, title = {Notarized federated {ID} management and authentication}, journal = {J. Comput. Secur.}, volume = {16}, number = {4}, pages = {399--418}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0324}, doi = {10.3233/JCS-2008-0324}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GoodrichTY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/YaoFAT08, author = {Danfeng Yao and Keith B. Frikken and Mikhail J. Atallah and Roberto Tamassia}, title = {Private Information: To Reveal or not to Reveal}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {6:1--6:27}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410240}, doi = {10.1145/1410234.1410240}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/YaoFAT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/KoglinYB08, author = {Yunhua Koglin and Danfeng Yao and Elisa Bertino}, title = {Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {5}, pages = {615--626}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2007.70758}, doi = {10.1109/TPDS.2007.70758}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/KoglinYB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZarandioonYG08, author = {Saman Zarandioon and Danfeng Yao and Vinod Ganapathy}, title = {{OMOS:} {A} Framework for Secure Communication in Mashup Applications}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {355--364}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.25}, doi = {10.1109/ACSAC.2008.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZarandioonYG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaberHHHMSTY08, author = {Stuart Haber and Yasuo Hatano and Yoshinori Honda and William G. Horne and Kunihiko Miyazaki and Tomas Sander and Satoru Tezoku and Danfeng Yao}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {Efficient signature schemes supporting redaction, pseudonymization, and data deidentification}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {353--362}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368362}, doi = {10.1145/1368310.1368362}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaberHHHMSTY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceas/PathakIY08, author = {Vivek Pathak and Liviu Iftode and Danfeng Yao}, title = {Improving Email Trustworthiness through Social-Group Key Authentication}, booktitle = {{CEAS} 2008 - The Fifth Conference on Email and Anti-Spam, 21-22 August 2008, Mountain View, California, {USA}}, year = {2008}, url = {http://www.ceas.cc/2008/papers/ceas2008-paper-26.pdf}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceas/PathakIY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/PhanY08, author = {Tuan Phan and Danfeng (Daphne) Yao}, editor = {Elisa Bertino and James B. D. Joshi}, title = {SelectAudit: {A} Secure and Efficient Audit Framework for Networked Virtual Environments}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {207--216}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_16}, doi = {10.1007/978-3-642-03354-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/PhanY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Yao08, author = {Danfeng Yao}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {555--561}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 12:46:27 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Yao08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icves/PathakYI08, author = {Vivek Pathak and Danfeng Yao and Liviu Iftode}, title = {Securing location aware services over {VANET} using geographical secure path routing}, booktitle = {{IEEE} International Conference on Vehicular Electronics and Safety, {ICVES} 2008, Columbus, OH, USA, 22-24 September, 2008}, pages = {346--353}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICVES.2008.4640905}, doi = {10.1109/ICVES.2008.4640905}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icves/PathakYI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CruzTY07, author = {Isabel F. Cruz and Roberto Tamassia and Danfeng Yao}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Privacy-Preserving Schema Matching Using Mutual Information}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {93--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_7}, doi = {10.1007/978-3-540-73538-0\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CruzTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/YaoTP07, author = {Danfeng Yao and Roberto Tamassia and Seth Proctor}, editor = {Sandro Etalle and Stephen Marsh}, title = {Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust}, booktitle = {Trust Management - Proceedings of {IFIPTM} 2007: Joint iTrust and {PST} Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada}, series = {{IFIP}}, volume = {238}, pages = {1--16}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-73655-6\_1}, doi = {10.1007/978-0-387-73655-6\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/YaoTP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YaoKBT07, author = {Danfeng Yao and Yunhua Koglin and Elisa Bertino and Roberto Tamassia}, editor = {Yookun Cho and Roger L. Wainwright and Hisham Haddad and Sung Y. Shin and Yong Wan Koo}, title = {Decentralized authorization and data security in web content delivery}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007}, pages = {1654--1661}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1244002.1244353}, doi = {10.1145/1244002.1244353}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/YaoKBT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GoodrichTY06, author = {Michael T. Goodrich and Roberto Tamassia and Danfeng Yao}, editor = {Ernesto Damiani and Peng Liu}, title = {Notarized Federated Identity Management for Web Services}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {133--147}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_10}, doi = {10.1007/11805588\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/GoodrichTY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YaoFAT06, author = {Danfeng Yao and Keith B. Frikken and Mikhail J. Atallah and Roberto Tamassia}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Point-Based Trust: Define How Much Privacy Is Worth}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {190--209}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_14}, doi = {10.1007/11935308\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YaoFAT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceas/GoodrichTY05, author = {Michael T. Goodrich and Roberto Tamassia and Danfeng Yao}, title = {Accredited DomainKeys: {A} Service Architecture for Improved Email Validation}, booktitle = {{CEAS} 2005 - Second Conference on Email and Anti-Spam, July 21-22, 2005, Stanford University, California, {USA}}, year = {2005}, url = {http://www.ceas.cc/papers-2005/127.pdf}, timestamp = {Mon, 01 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceas/GoodrichTY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/YaoTP05, author = {Danfeng Yao and Roberto Tamassia and Seth Proctor}, title = {On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {157--170}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.28}, doi = {10.1109/SECURECOMM.2005.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/YaoTP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/YaoSTW05, author = {Danfeng Yao and Michael Shin and Roberto Tamassia and William H. Winsborough}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Visualization of Automated Trust Negotiation}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {8}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.21}, doi = {10.1109/VIZSEC.2005.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/YaoSTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YaoFDL04, author = {Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {354--363}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030130}, doi = {10.1145/1030083.1030130}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YaoFDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TamassiaYW04, author = {Roberto Tamassia and Danfeng Yao and William H. Winsborough}, editor = {Trent Jaeger and Elena Ferrari}, title = {Role-based cascaded delegation}, booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings}, pages = {146--155}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/990036.990061}, doi = {10.1145/990036.990061}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/TamassiaYW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoFDL04, author = {Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, title = {ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2004}, url = {http://eprint.iacr.org/2004/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoFDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.