default search action
Danfeng Yao
Person information
- affiliation: Virginia Tech, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Danfeng (Daphne) Yao:
Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research. Commun. ACM 67(1): 47-49 (2024) - [j37]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [j36]Miles Frantz, Ya Xiao, Tanmoy Sarkar Pias, Na Meng, Danfeng Yao:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. IEEE Trans. Software Eng. 50(5): 1118-1129 (2024) - 2023
- [j35]Edward J. Jacobs, Sabrina N. Campelo, Kenneth N. Aycock, Danfeng Yao, Rafael V. Davalos:
Spatiotemporal estimations of temperature rise during electroporation treatments using a deep neural network. Comput. Biol. Medicine 161: 107019 (2023) - [j34]Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? IEEE Trans. Software Eng. 49(1): 288-303 (2023) - [j33]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [j32]Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [c107]Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529 - [c106]Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath:
A First Look at Toxicity Injection Attacks on Open-domain Chatbots. ACSAC 2023: 521-534 - [c105]Wyatt Sweat, Danfeng (Daphne) Yao:
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. CCS 2023: 3606-3608 - [c104]Daniel Hajialigol, Derek Kaknes, Tanner Barbour, Daphne Yao, Chris North, Jimeng Sun, David Liem, Xuan Wang:
DRGCoder: Explainable Clinical Coding for the Early Prediction of Diagnostic-Related Groups. EMNLP (Demos) 2023: 373-380 - [c103]Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao:
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450 - [i22]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - [i21]Ying Zhang, Wenjia Song, Zhengjie Ji, Danfeng Yao, Na Meng:
How well does LLM generate security tests? CoRR abs/2310.00710 (2023) - [i20]Tahmina Sultana Priya, Fan Leng, Anthony C. Luehrs, Eric W. Klee, Alina M. Allen, Konstantinos N. Lazaridis, Danfeng Yao, Shulan Tian:
Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease. CoRR abs/2311.08428 (2023) - 2022
- [j31]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j30]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j29]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j28]Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. IEEE Trans. Dependable Secur. Comput. 19(6): 3790-3803 (2022) - [c102]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c101]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c100]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:
Example-based vulnerability detection and repair in Java code. ICPC 2022: 190-201 - [c99]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - [c98]Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng:
How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages? SecDev 2022: 77-83 - [i19]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng Yao, Na Meng:
Example-Based Vulnerability Detection and Repair in Java Code. CoRR abs/2203.09009 (2022) - 2021
- [j27]Danfeng (Daphne) Yao:
Depth and persistence: what researchers need to know about impostor syndrome. Commun. ACM 64(6): 39-42 (2021) - [j26]Danfeng Daphne Yao, Terry Benzel:
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions. IEEE Secur. Priv. 19(6): 23-24 (2021) - [j25]Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao:
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT. IEEE Internet Things J. 8(4): 2736-2750 (2021) - [j24]Long Cheng, Ke Tian, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(2): 825-842 (2021) - [j23]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c97]Danfeng (Daphne) Yao:
Measurable and Deployable Security: Gaps, Successes, and Opportunities. CODASPY 2021: 3 - [c96]Sharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska:
Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. PST 2021: 1-10 - [c95]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [i18]Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Data-Driven Vulnerability Detection and Repair in Java Code. CoRR abs/2102.06994 (2021) - [i17]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - [i16]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - [i15]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - 2020
- [j22]Ke Tian, Gang Tan, Barbara G. Ryder, Danfeng (Daphne) Yao:
Prioritizing data flows and sinks for app security transformation. Comput. Secur. 92: 101750 (2020) - [j21]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. IEEE Trans. Dependable Secur. Comput. 17(1): 64-77 (2020) - [j20]Karim O. Elish, Haipeng Cai, Daniel Barton, Danfeng Yao, Barbara G. Ryder:
Identifying Mobile Inter-App Communication Risks. IEEE Trans. Mob. Comput. 19(1): 90-102 (2020) - [c94]Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao:
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. CCS 2020: 1803-1820 - [c93]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c92]Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao:
A Comprehensive Benchmark on Java Cryptographic API Misuses. CODASPY 2020: 177-178 - [c91]Pronnoy Goswami, Saksham Gupta, Zhiyuan Li, Na Meng, Danfeng Daphne Yao:
Investigating The Reproducibility of NPM Packages. ICSME 2020: 677-681 - [c90]Xiaodong Yu, Fengguo Wei, Xinming Ou, Michela Becchi, Tekin Bicer, Danfeng Daphne Yao:
GPU-Based Static Data-Flow Analysis for Fast and Scalable Android App Vetting. IPDPS 2020: 274-284 - [c89]Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. SecDev 2020: 5-6 - [c88]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. SecDev 2020: 49-57 - [i14]Sazzadur Rahaman, Gang Wang, Danfeng Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CoRR abs/2002.02855 (2020) - [i13]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020) - [i12]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020) - [i11]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. CoRR abs/2007.14319 (2020) - [i10]Li Xu, Thomas Lux, Tyler H. Chang, Bo Li, Yili Hong, Layne T. Watson, Ali Raza Butt, Danfeng Yao, Kirk W. Cameron:
Prediction of High-Performance Computing Input/Output Variability and Its Application to Optimization for System Configurations. CoRR abs/2012.07915 (2020)
2010 – 2019
- 2019
- [j19]Haipeng Cai, Na Meng, Barbara G. Ryder, Danfeng Yao:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. IEEE Trans. Inf. Forensics Secur. 14(6): 1455-1470 (2019) - [c87]Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CCS 2019: 481-498 - [c86]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c85]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c84]Ya Xiao, Qingying Hao, Danfeng Daphne Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. DSC 2019: 1-8 - [c83]Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. SecDev 2019: 49-61 - [c82]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c81]Xiaodong Yu, Ya Xiao, Kirk W. Cameron, Danfeng (Daphne) Yao:
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks. CSET @ USENIX Security Symposium 2019 - [i9]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - [i8]Salman Ahmed, Ya Xiao, Gang Tan, Kevin Z. Snow, Fabian Monrose, Danfeng Yao:
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization. CoRR abs/1910.03034 (2019) - [i7]Ya Xiao, Qingying Hao, Danfeng Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. CoRR abs/1911.04020 (2019) - 2018
- [c80]Thomas C. H. Lux, Layne T. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, Ali Raza Butt, Kirk W. Cameron, Danfeng Yao, Yili Hong:
Novel meshes for multivariate interpolation and approximation. ACM Southeast Regional Conference 2018: 13:1-13:7 - [c79]Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure coding practices in Java: challenges and vulnerabilities. ICSE 2018: 372-383 - [c78]Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. Internet Measurement Conference 2018: 429-442 - [c77]Danfeng (Daphne) Yao:
Data Breach and Multiple Points to Stop It. SACMAT 2018: 1 - [c76]Sazzadur Rahaman, Na Meng, Danfeng Yao:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. SecDev 2018: 122-123 - [c75]Ke Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao:
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale. SecureComm (2) 2018: 311-331 - [i6]Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. CoRR abs/1805.00074 (2018) - [i5]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018) - 2017
- [b2]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - [j18]Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. Proc. Priv. Enhancing Technol. 2017(4): 384-403 (2017) - [j17]Xiaokui Shu, Danfeng (Daphne) Yao, Naren Ramakrishnan, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. ACM Trans. Priv. Secur. 20(4): 12:1-12:28 (2017) - [j16]Long Cheng, Fang Liu, Danfeng (Daphne) Yao:
Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Mining Knowl. Discov. 7(5) (2017) - [c74]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ACSAC 2017: 315-326 - [c73]Danfeng (Daphne) Yao:
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities. SCC@AsiaCCS 2017: 1 - [c72]Ke Tian, Gang Tan, Danfeng Daphne Yao, Barbara G. Ryder:
ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation. FEAST@CCS 2017: 35-41 - [c71]Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang:
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. AsiaCCS 2017: 71-85 - [c70]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. CCS 2017: 2483-2485 - [c69]Danfeng (Daphne) Yao, Elisa Bertino:
CCS 2017: Women in Cyber Security (CyberW) Workshop. CCS 2017: 2631-2632 - [c68]Hussain M. J. Almohri, Long Cheng, Danfeng Yao, Homa Alemzadeh:
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems. CHASE 2017: 114-119 - [c67]Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c66]Fang Liu, Haipeng Cai, Gang Wang, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder:
Prioritized Analysis of Inter-App Communication Risks. CODASPY 2017: 159-161 - [c65]Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang, Kirk W. Cameron:
A First Look: Using Linux Containers for Deceptive Honeypots. SafeConfig@CCS 2017: 15-22 - [c64]Sazzadur Rahaman, Danfeng Yao:
Program Analysis of Cryptographic Implementations for Security. SecDev 2017: 61-68 - [c63]Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. IEEE Symposium on Security and Privacy Workshops 2017: 189-198 - [c62]Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang:
Measuring the Insecurity of Mobile Deep Links of Android. USENIX Security Symposium 2017: 953-969 - [i4]Xiaokui Shu, Ke Tian, Andrew Ciambrone, Danfeng Yao:
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned. CoRR abs/1701.04940 (2017) - [i3]Na Meng, Stefan Nagy, Danfeng Daphne Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure Coding Practices in Java: Challenges and Vulnerabilities. CoRR abs/1709.09970 (2017) - 2016
- [j15]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan, Zhibin Zhang:
Causality reasoning about network events for detecting stealthy malware activities. Comput. Secur. 58: 180-198 (2016) - [j14]Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. IEEE Trans. Dependable Secur. Comput. 13(4): 474-487 (2016) - [j13]Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-chun Feng:
Fast Detection of Transformed Data Leaks. IEEE Trans. Inf. Forensics Secur. 11(3): 528-542 (2016) - [c61]Xiaokui Shu, Nikolay Laptev, Danfeng (Daphne) Yao:
DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution. AAAI 2016: 4395-4396 - [c60]Xiaodong Yu, Wu-chun Feng, Danfeng (Daphne) Yao, Michela Becchi:
O3FA: A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection. ANCS 2016: 1-11 - [c59]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
Causality-based Sensemaking of Network Traffic for Android Application Security. AISec@CCS 2016: 47-58 - [c58]Xiaokui Shu, Danfeng Yao:
Program Anomaly Detection: Methodology and Practices. CCS 2016: 1853-1854 - [c57]Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder:
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. DSN 2016: 467-478 - [c56]Xiaokui Shu, Nikolay Laptev, Danfeng Yao:
DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution. EDBT 2016: 573-579 - [c55]Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti:
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. NTMS 2016: 1-5 - [c54]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan:
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. IEEE Symposium on Security and Privacy Workshops 2016: 262-271 - 2015
- [j12]Karim O. Elish, Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder, Xuxian Jiang:
Profiling user-trigger dependence for Android malware detection. Comput. Secur. 49: 255-273 (2015) - [j11]Xiaokui Shu, Danfeng Yao, Elisa Bertino:
Privacy-Preserving Detection of Sensitive Data Exposure. IEEE Trans. Inf. Forensics Secur. 10(5): 1092-1103 (2015) - [c53]Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan:
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. CCS 2015: 401-413 - [c52]Hao Zhang, Maoyuan Sun, Danfeng (Daphne) Yao, Chris North:
Visualizing Traffic Causality for Analyzing Network Anomalies. IWSPA@CODASPY 2015: 37-42 - [c51]Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng:
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. CODASPY 2015: 147-149 - [c50]Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt:
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. CODASPY 2015: 195-206 - [c49]Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian:
Probabilistic Program Modeling for High-Precision Anomaly Classification. CSF 2015: 497-511 - [c48]Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng:
Rapid and parallel content screening for detecting transformed data exposure. INFOCOM Workshops 2015: 191-196 - [c47]Yanzhi Dou, Kexiong Curtis Zeng, Yaling Yang, Danfeng (Daphne) Yao:
MadeCR: Correlation-based malware detection for cognitive radio. INFOCOM 2015: 639-647 - [c46]Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder:
A Formal Framework for Program Anomaly Detection. RAID 2015: 270-292 - [e1]Feng Bao, Steven Miller, Sherman S. M. Chow, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - 2014
- [j10]Hussain M. J. Almohri, Danfeng Yao, Dennis G. Kafura:
Process Authentication for High System Assurance. IEEE Trans. Dependable Secur. Comput. 11(2): 168-180 (2014) - [c45]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery. AsiaCCS 2014: 39-50 - [c44]Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura:
DroidBarrier: know what is executing on your android. CODASPY 2014: 257-264 - [c43]Kui Xu, Danfeng Yao, Manuel A. Pérez-Quiñones, Casey Link, E. Scott Geller:
Role-playing game for studying user behaviors in security: A case study on email secrecy. CollaborateCom 2014: 18-26 - [c42]Britton Wolfe, Karim O. Elish, Danfeng Yao:
High Precision Screening for Android Malware with Dimensionality Reduction. ICMLA 2014: 21-28 - [c41]Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao:
Comprehensive Behavior Profiling for Proactive Android Malware Detection. ISC 2014: 328-344 - 2013
- [j9]Kui Xu, Patrick Butler, Sudip Saha, Danfeng (Daphne) Yao:
DNS for Massive-Scale Command and Control. IEEE Trans. Dependable Secur. Comput. 10(3): 143-153 (2013) - [c40]Karim O. Elish, Yipan Deng, Danfeng (Daphne) Yao, Dennis G. Kafura:
Device-based Isolation for Securing Cryptographic Keys. ANT/SEIT 2013: 1130-1135 - [c39]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
A semantic-aware approach to reasoning about network traffic relations. CCS 2013: 1375-1378 - [c38]Huijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao:
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud. CNS 2013: 172-180 - [c37]Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, Heshan Lin:
Massive distributed and parallel log analysis for organizational security. GLOBECOM Workshops 2013: 194-199 - 2012
- [j8]Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao:
Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput. Secur. 31(1): 109-121 (2012) - [j7]Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao:
Data-Provenance Verification For Secure Hosts. IEEE Trans. Dependable Secur. Comput. 9(2): 173-183 (2012) - [c36]Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu, Yonggang Wen:
Towards end-to-end secure content storage and delivery with public cloud. CODASPY 2012: 257-266 - [c35]Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura:
Identifying native applications with high assurance. CODASPY 2012: 275-282 - [c34]Yipeng Wang, Xiao-chun Yun, Muhammad Zubair Shafiq, Liyan Wang, Alex X. Liu, Zhibin Zhang, Danfeng Yao, Yongzheng Zhang, Li Guo:
A semantics aware approach to automated reverse engineering unknown protocols. ICNP 2012: 1-10 - [c33]Xiaokui Shu, Danfeng (Daphne) Yao:
Data Leak Detection as a Service. SecureComm 2012: 222-240 - [c32]Hao Zhang, William Banick, Danfeng Yao, Naren Ramakrishnan:
User Intention-Based Traffic Dependence Analysis for Anomaly Detection. IEEE Symposium on Security and Privacy Workshops 2012: 104-112 - [i2]Zilong Wang, Danfeng (Daphne) Yao, Rongquan Feng:
Adaptive Key Protection in Complex Cryptosystems with Attributes. IACR Cryptol. ePrint Arch. 2012: 136 (2012) - 2011
- [c31]Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo:
Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. ACNS 2011: 1-18 - [c30]Patrick Butler, Kui Xu, Danfeng (Daphne) Yao:
Quantitatively Analyzing Stealthy Communication Channels. ACNS 2011: 238-254 - [c29]Kui Xu, Danfeng Yao, Qiang Ma, Alexander Crowell:
Detecting infection onset with behavior-based policies. NSS 2011: 57-64 - [c28]Saman Zarandioon, Danfeng (Daphne) Yao, Vinod Ganapathy:
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access. SecureComm 2011: 59-76 - [c27]Huijun Xiong, Xinwen Zhang, Wei Zhu, Danfeng Yao:
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services. SecureComm 2011: 491-500 - 2010
- [j6]Jerry Rick Ramstetter, Yaling Yang, Danfeng Yao:
Applications and Security of Next-Generation, User-Centric Wireless Systems. Future Internet 2(3): 190-211 (2010) - [j5]Roberto Tamassia, Danfeng Yao, William H. Winsborough:
Independently Verifiable Decentralized Role-Based Delegation. IEEE Trans. Syst. Man Cybern. Part A 40(6): 1206-1219 (2010) - [c26]Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao:
Towards publishing recommendation data with predictive anonymization. AsiaCCS 2010: 24-35 - [c25]Deian Stefan, Danfeng Yao:
Keystroke-dynamics authentication against synthetic forgeries. CollaborateCom 2010: 1-8 - [c24]Kui Xu, Qiang Ma, Danfeng (Daphne) Yao:
Detecting the Onset of Infection for Secure Hosts. RAID 2010: 492-493
2000 – 2009
- 2009
- [j4]Danfeng Yao, Roberto Tamassia:
Compact and Anonymous Role-Based Authorization Chain. ACM Trans. Inf. Syst. Secur. 12(3): 15:1-15:27 (2009) - [c23]Brian Thompson, Danfeng Yao:
The union-split algorithm and cluster-based anonymization of social networks. AsiaCCS 2009: 218-227 - [c22]Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng Chang, Danfeng Yao:
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations. CollaborateCom 2009: 1-10 - [c21]Saman Zarandioon, Danfeng Yao, Vinod Ganapathy:
Privacy-aware identity management for client-side mashup applications. Digital Identity Management 2009: 21-30 - [c20]Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, Danfeng Yao:
User-Assisted Host-Based Detection of Outbound Malware Traffic. ICICS 2009: 293-307 - [c19]Tzvi Chumash, Danfeng Yao:
Detection and Prevention of Insider Threats in Database Driven Web Services. IFIPTM 2009: 117-132 - [c18]Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao:
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. Privacy Enhancing Technologies 2009: 185-201 - [c17]Anitra Babic, Huijun Xiong, Danfeng Yao, Liviu Iftode:
Building robust authentication systems with activity-based personal questions. SafeConfig 2009: 19-24 - [p1]Danfeng (Daphne) Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption. Identity-Based Cryptography 2009: 100-118 - 2008
- [b1]Danfeng Yao:
Privacy-Aware Authentication and Authorization in Trust Management. Brown University, USA, 2008 - [j3]Michael T. Goodrich, Roberto Tamassia, Danfeng (Daphne) Yao:
Notarized federated ID management and authentication. J. Comput. Secur. 16(4): 399-418 (2008) - [j2]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Private Information: To Reveal or not to Reveal. ACM Trans. Inf. Syst. Secur. 12(1): 6:1-6:27 (2008) - [j1]Yunhua Koglin, Danfeng Yao, Elisa Bertino:
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. IEEE Trans. Parallel Distributed Syst. 19(5): 615-626 (2008) - [c16]Saman Zarandioon, Danfeng Yao, Vinod Ganapathy:
OMOS: A Framework for Secure Communication in Mashup Applications. ACSAC 2008: 355-364 - [c15]Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. AsiaCCS 2008: 353-362 - [c14]Vivek Pathak, Liviu Iftode, Danfeng Yao:
Improving Email Trustworthiness through Social-Group Key Authentication. CEAS 2008 - [c13]Tuan Phan, Danfeng (Daphne) Yao:
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. CollaborateCom 2008: 207-216 - [c12]Danfeng Yao:
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. Security and Management 2008: 555-561 - [c11]Vivek Pathak, Danfeng Yao, Liviu Iftode:
Securing location aware services over VANET using geographical secure path routing. ICVES 2008: 346-353 - 2007
- [c10]Isabel F. Cruz, Roberto Tamassia, Danfeng Yao:
Privacy-Preserving Schema Matching Using Mutual Information. DBSec 2007: 93-94 - [c9]Danfeng Yao, Roberto Tamassia, Seth Proctor:
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust. IFIPTM 2007: 1-16 - [c8]Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia:
Decentralized authorization and data security in web content delivery. SAC 2007: 1654-1661 - 2006
- [c7]Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Notarized Federated Identity Management for Web Services. DBSec 2006: 133-147 - [c6]Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia:
Point-Based Trust: Define How Much Privacy Is Worth. ICICS 2006: 190-209 - 2005
- [c5]Michael T. Goodrich, Roberto Tamassia, Danfeng Yao:
Accredited DomainKeys: A Service Architecture for Improved Email Validation. CEAS 2005 - [c4]Danfeng Yao, Roberto Tamassia, Seth Proctor:
On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. SecureComm 2005: 157-170 - [c3]Danfeng Yao, Michael Shin, Roberto Tamassia, William H. Winsborough:
Visualization of Automated Trust Negotiation. VizSEC 2005: 8 - 2004
- [c2]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. CCS 2004: 354-363 - [c1]Roberto Tamassia, Danfeng Yao, William H. Winsborough:
Role-based cascaded delegation. SACMAT 2004: 146-155 - [i1]Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya:
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. IACR Cryptol. ePrint Arch. 2004: 212 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint