


default search action
Ya Xiao 0002
Person information
- affiliation (PhD 2022): Virginia Tech, Department of Computer Science, Blacksburg, VA, USA
Other persons with the same name
- Ya Xiao — disambiguation page
- Ya Xiao 0001
— University of Hong Kong, Faculty of Education, Pok Fu Lam, Hong Kong
- Ya Xiao 0003
— Tongji University, Department of Computer Science and Technology, Shanghai, China
- Ya Xiao 0004
— Ocean University of China, College of Physics and Optoelectronic Engineering, Qingdao, China
- Ya Xiao 0005
— Xiangxi Academy of Agricultural Sciences, Biotechnology Research Center, Jishou, China (and 1 more)
- Ya Xiao 0006 — Meituan, China
2020 – today
- 2024
- [j9]Ya Xiao
, Wenjia Song
, Salman Ahmed
, Xinyang Ge
, Bimal Viswanath
, Na Meng
, Danfeng (Daphne) Yao
:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [j8]Miles Frantz
, Ya Xiao
, Tanmoy Sarkar Pias
, Na Meng, Danfeng Yao
:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. IEEE Trans. Software Eng. 50(5): 1118-1129 (2024) - 2023
- [j7]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao
, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. DTRAP 4(1): 4:1-4:18 (2023) - [j6]Ying Zhang
, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao
, Na Meng
:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? IEEE Trans. Software Eng. 49(1): 288-303 (2023) - [j5]Sharmin Afrose
, Ya Xiao, Sazzadur Rahaman, Barton P. Miller
, Danfeng Yao
:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [j4]Ya Xiao
, Wenjia Song
, Jingyuan Qi
, Bimal Viswanath
, Patrick D. McDaniel
, Danfeng Yao
:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [i11]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - 2022
- [b1]Ya Xiao:
Neural Network-based Methodologies for Securing Cryptographic Code. Virginia Tech, Blacksburg, VA, USA, 2022 - [j3]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao
:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j2]Yuan Luo
, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j1]Danfeng Daphne Yao
, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose
, Miles Frantz
, Ke Tian
, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller
, Elisa Heymann
, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [c12]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c11]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c10]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:
Example-based vulnerability detection and repair in Java code. ICPC 2022: 190-201 - [c9]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - [i10]Ying Zhang
, Ya Xiao, Md Mahir Asef Kabir, Danfeng Yao, Na Meng:
Example-Based Vulnerability Detection and Repair in Java Code. CoRR abs/2203.09009 (2022) - 2021
- [c8]Ya Xiao:
Multi-location cryptographic code repair with neural-network-based methodologies. ESEC/SIGSOFT FSE 2021: 1640-1644 - [i9]Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Data-Driven Vulnerability Detection and Repair in Java Code. CoRR abs/2102.06994 (2021) - [i8]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - [i7]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - [i6]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - 2020
- [c7]Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan
, Fabian Monrose, Danfeng (Daphne) Yao
:
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. CCS 2020: 1803-1820 - [c6]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c5]Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao
:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. SecDev 2020: 5-6 - [i5]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020) - [i4]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020)
2010 – 2019
- 2019
- [c4]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose
, Fahad Shaon, Ke Tian, Miles Frantz
, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c3]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz
, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao
:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c2]Ya Xiao, Qingying Hao, Danfeng Daphne Yao
:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. DSC 2019: 1-8 - [c1]Xiaodong Yu, Ya Xiao, Kirk W. Cameron, Danfeng (Daphne) Yao:
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks. CSET @ USENIX Security Symposium 2019 - [i3]Salman Ahmed, Ya Xiao, Gang Tan, Kevin Z. Snow, Fabian Monrose, Danfeng Yao:
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization. CoRR abs/1910.03034 (2019) - [i2]Ya Xiao, Qingying Hao, Danfeng Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. CoRR abs/1911.04020 (2019) - 2018
- [i1]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-18 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
