default search action
Danfeng Yao
Danfeng (Daphne) Yao – Danfeng Daphne Yao – Daphne Yao
Person information
- affiliation: Virginia Tech, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j39]Danfeng (Daphne) Yao:
Rebuttal How-To: Strategies, Tactics, and the Big Picture in Research. Commun. ACM 67(1): 47-49 (2024) - [j38]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [j37]Miles Frantz, Ya Xiao, Tanmoy Sarkar Pias, Na Meng, Danfeng Yao:
Methods and Benchmark for Detecting Cryptographic API Misuses in Python. IEEE Trans. Software Eng. 50(5): 1118-1129 (2024) - [c108]Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. CCS 2024: 1626-1640 - 2023
- [j36]Edward J. Jacobs, Sabrina N. Campelo, Kenneth N. Aycock, Danfeng Yao, Rafael V. Davalos:
Spatiotemporal estimations of temperature rise during electroporation treatments using a deep neural network. Comput. Biol. Medicine 161: 107019 (2023) - [j35]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. DTRAP 4(1): 4:1-4:18 (2023) - [j34]Ying Zhang, Md Mahir Asef Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet? IEEE Trans. Software Eng. 49(1): 288-303 (2023) - [j33]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks. IEEE Trans. Software Eng. 49(2): 485-497 (2023) - [j32]Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [c107]Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao:
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529 - [c106]Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath:
A First Look at Toxicity Injection Attacks on Open-domain Chatbots. ACSAC 2023: 521-534 - [c105]Wyatt Sweat, Danfeng (Daphne) Yao:
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling. CCS 2023: 3606-3608 - [c104]Daniel Hajialigol, Derek Kaknes, Tanner Barbour, Daphne Yao, Chris North, Jimeng Sun, David Liem, Xuan Wang:
DRGCoder: Explainable Clinical Coding for the Early Prediction of Diagnostic-Related Groups. EMNLP (Demos) 2023: 373-380 - [c103]Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao:
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450 - [i22]Wenjia Song, Sanjula Karanam, Ya Xiao, Jingyuan Qi, Nathan Dautenhahn, Na Meng, Danfeng Yao:
Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling. CoRR abs/2306.02270 (2023) - [i21]Ying Zhang, Wenjia Song, Zhengjie Ji, Danfeng Yao, Na Meng:
How well does LLM generate security tests? CoRR abs/2310.00710 (2023) - [i20]Tahmina Sultana Priya, Fan Leng, Anthony C. Luehrs, Eric W. Klee, Alina M. Allen, Konstantinos N. Lazaridis, Danfeng Yao, Shulan Tian:
Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease. CoRR abs/2311.08428 (2023) - 2022
- [j31]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Daphne Yao:
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE. Computer 55(2): 54-62 (2022) - [j30]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng (Daphne) Yao:
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities. ACM Comput. Surv. 54(5): 106:1-106:36 (2022) - [j29]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - [j28]Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, Danfeng Yao:
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++. IEEE Trans. Dependable Secur. Comput. 19(6): 3790-3803 (2022) - [c102]Salman Ahmed, Ya Xiao, Taejoong (Tijay) Chung, Carol J. Fung, Moti Yung, Danfeng (Daphne) Yao:
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE. AsiaCCS 2022: 1210-1212 - [c101]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [c100]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng (Daphne) Yao, Na Meng:
Example-based vulnerability detection and repair in Java code. ICPC 2022: 190-201 - [c99]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Strength Static Detection for Cryptographic API Misuses. SecDev 2022: 61-62 - [c98]Md Mahir Asef Kabir, Ying Wang, Danfeng Yao, Na Meng:
How Do Developers Follow Security-Relevant Best Practices When Using NPM Packages? SecDev 2022: 77-83 - [i19]Ying Zhang, Ya Xiao, Md Mahir Asef Kabir, Danfeng Yao, Na Meng:
Example-Based Vulnerability Detection and Repair in Java Code. CoRR abs/2203.09009 (2022) - 2021
- [j27]Danfeng (Daphne) Yao:
Depth and persistence: what researchers need to know about impostor syndrome. Commun. ACM 64(6): 39-42 (2021) - [j26]Danfeng Daphne Yao, Terry Benzel:
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions. IEEE Secur. Priv. 19(6): 23-24 (2021) - [j25]Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao:
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT. IEEE Internet Things J. 8(4): 2736-2750 (2021) - [j24]Long Cheng, Ke Tian, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(2): 825-842 (2021) - [j23]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [c97]Danfeng (Daphne) Yao:
Measurable and Deployable Security: Gaps, Successes, and Opportunities. CODASPY 2021: 3 - [c96]Sharmin Afrose, Danfeng Daphne Yao, Olivera Kotevska:
Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data. PST 2021: 1-10 - [c95]Salman Ahmed, Long Cheng, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao:
Tutorial: Investigating Advanced Exploits for System Security Assurance. SecDev 2021: 3-4 - [i18]Ying Zhang, Mahir Kabir, Ya Xiao, Danfeng Yao, Na Meng:
Data-Driven Vulnerability Detection and Repair in Java Code. CoRR abs/2102.06994 (2021) - [i17]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - [i16]Salman Ahmed, Ya Xiao, Taejoong Chung, Carol J. Fung, Moti Yung, Danfeng Yao:
Privacy Guarantees of BLE Contact Tracing: A Case Study on COVIDWISE. CoRR abs/2111.08842 (2021) - [i15]Sharmin Afrose, Ya Xiao, Sazzadur Rahaman, Barton P. Miller, Danfeng Yao:
Evaluation of Static Vulnerability Detection Tools with Java Cryptographic API Benchmarks. CoRR abs/2112.04037 (2021) - 2020
- [j22]Ke Tian, Gang Tan, Barbara G. Ryder, Danfeng (Daphne) Yao:
Prioritizing data flows and sinks for app security transformation. Comput. Secur. 92: 101750 (2020) - [j21]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. IEEE Trans. Dependable Secur. Comput. 17(1): 64-77 (2020) - [j20]Karim O. Elish, Haipeng Cai, Daniel Barton, Danfeng Yao, Barbara G. Ryder:
Identifying Mobile Inter-App Communication Risks. IEEE Trans. Mob. Comput. 19(1): 90-102 (2020) - [c94]Salman Ahmed, Ya Xiao, Kevin Z. Snow, Gang Tan, Fabian Monrose, Danfeng (Daphne) Yao:
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP. CCS 2020: 1803-1820 - [c93]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176 - [c92]Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao:
A Comprehensive Benchmark on Java Cryptographic API Misuses. CODASPY 2020: 177-178 - [c91]Pronnoy Goswami, Saksham Gupta, Zhiyuan Li, Na Meng, Danfeng Daphne Yao:
Investigating The Reproducibility of NPM Packages. ICSME 2020: 677-681 - [c90]Xiaodong Yu, Fengguo Wei, Xinming Ou, Michela Becchi, Tekin Bicer, Danfeng Daphne Yao:
GPU-Based Static Data-Flow Analysis for Fast and Scalable Android App Vetting. IPDPS 2020: 274-284 - [c89]Ya Xiao, Miles Frantz, Sharmin Afrose, Sazzadur Rahaman, Danfeng Daphne Yao:
Tutorial: Principles and Practices of Secure Cryptographic Coding in Java. SecDev 2020: 5-6 - [c88]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Daphne Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. SecDev 2020: 49-57 - [i14]Sazzadur Rahaman, Gang Wang, Danfeng Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CoRR abs/2002.02855 (2020) - [i13]Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, Danfeng Daphne Yao:
Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. CoRR abs/2003.13213 (2020) - [i12]Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng Yao, Cristina Cifuentes:
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases. CoRR abs/2007.06122 (2020) - [i11]Mazharul Islam, Sazzadur Rahaman, Na Meng, Behnaz Hassanshahi, Padmanabhan Krishnan, Danfeng Yao:
Coding Practices and Recommendations of Spring Security for Enterprise Applications. CoRR abs/2007.14319 (2020) - [i10]Li Xu, Thomas Lux, Tyler H. Chang, Bo Li, Yili Hong, Layne T. Watson, Ali Raza Butt, Danfeng Yao, Kirk W. Cameron:
Prediction of High-Performance Computing Input/Output Variability and Its Application to Optimization for System Configurations. CoRR abs/2012.07915 (2020)
2010 – 2019
- 2019
- [j19]Haipeng Cai, Na Meng, Barbara G. Ryder, Danfeng Yao:
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling. IEEE Trans. Inf. Forensics Secur. 14(6): 1455-1470 (2019) - [c87]Sazzadur Rahaman, Gang Wang, Danfeng Daphne Yao:
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations. CCS 2019: 481-498 - [c86]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c85]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - [c84]Ya Xiao, Qingying Hao, Danfeng Daphne Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. DSC 2019: 1-8 - [c83]Sharmin Afrose, Sazzadur Rahaman, Danfeng Yao:
CryptoAPI-Bench: A Comprehensive Benchmark on Java Cryptographic API Misuses. SecDev 2019: 49-61 - [c82]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c81]Xiaodong Yu, Ya Xiao, Kirk W. Cameron, Danfeng (Daphne) Yao:
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks. CSET @ USENIX Security Symposium 2019 - [i9]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - [i8]Salman Ahmed, Ya Xiao, Gang Tan, Kevin Z. Snow, Fabian Monrose, Danfeng Yao:
Measuring Attack Surface Reduction in the Presence of Code (Re-)Randomization. CoRR abs/1910.03034 (2019) - [i7]Ya Xiao, Qingying Hao, Danfeng Yao:
Neural Cryptanalysis: Metrics, Methodology, and Applications in CPS Ciphers. CoRR abs/1911.04020 (2019) - 2018
- [c80]Thomas C. H. Lux, Layne T. Watson, Tyler H. Chang, Jon Bernard, Bo Li, Xiaodong Yu, Li Xu, Godmar Back, Ali Raza Butt, Kirk W. Cameron, Danfeng Yao, Yili Hong:
Novel meshes for multivariate interpolation and approximation. ACM Southeast Regional Conference 2018: 13:1-13:7 - [c79]Na Meng, Stefan Nagy, Danfeng (Daphne) Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure coding practices in Java: challenges and vulnerabilities. ICSE 2018: 372-383 - [c78]Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. Internet Measurement Conference 2018: 429-442 - [c77]Danfeng (Daphne) Yao:
Data Breach and Multiple Points to Stop It. SACMAT 2018: 1 - [c76]Sazzadur Rahaman, Na Meng, Danfeng Yao:
Tutorial: Principles and Practices of Secure Crypto Coding in Java. SecDev 2018: 122-123 - [c75]Ke Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao:
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale. SecureComm (2) 2018: 311-331 - [i6]Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. CoRR abs/1805.00074 (2018) - [i5]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018) - 2017
- [b2]Danfeng (Daphne) Yao, Xiaokui Shu, Long Cheng, Salvatore J. Stolfo:
Anomaly Detection as a Service: Challenges, Advances, and Opportunities. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2017, ISBN 978-3-031-01226-6 - [j18]Sazzadur Rahaman, Long Cheng, Danfeng Daphne Yao, He Li, Jung-Min "Jerry" Park:
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation. Proc. Priv. Enhancing Technol. 2017(4): 384-403 (2017) - [j17]Xiaokui Shu, Danfeng (Daphne) Yao, Naren Ramakrishnan, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. ACM Trans. Priv. Secur. 20(4): 12:1-12:28 (2017) - [j16]Long Cheng, Fang Liu, Danfeng (Daphne) Yao:
Enterprise data breach: causes, challenges, prevention, and future directions. WIREs Data Mining Knowl. Discov. 7(5) (2017) - [c74]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ACSAC 2017: 315-326 - [c73]Danfeng (Daphne) Yao:
Cloud Data Analytics for Security: Applications, Challenges, and Opportunities. SCC@AsiaCCS 2017: 1 - [c72]Ke Tian, Gang Tan, Danfeng Daphne Yao, Barbara G. Ryder:
ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation. FEAST@CCS 2017: 35-41 - [c71]Amiangshu Bosu, Fang Liu, Danfeng (Daphne) Yao, Gang Wang:
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications. AsiaCCS 2017: 71-85 - [c70]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. CCS 2017: 2483-2485 - [c69]Danfeng (Daphne) Yao, Elisa Bertino:
CCS 2017: Women in Cyber Security (CyberW) Workshop. CCS 2017: 2631-2632 - [c68]Hussain M. J. Almohri, Long Cheng, Danfeng Yao, Homa Alemzadeh:
On Threat Modeling and Mitigation of Medical Cyber-Physical Systems. CHASE 2017: 114-119 - [c67]Ning Zhang, Ruide Zhang, Qiben Yan, Wenjing Lou, Y. Thomas Hou, Danfeng Yao:
Black penguin: On the feasibility of detecting intrusion with homogeneous memory. CNS 2017: 586-594 - [c66]Fang Liu, Haipeng Cai, Gang Wang, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder:
Prioritized Analysis of Inter-App Communication Risks. CODASPY 2017: 159-161 - [c65]Alexander Kedrowitsch, Danfeng (Daphne) Yao, Gang Wang, Kirk W. Cameron:
A First Look: Using Linux Containers for Deceptive Honeypots. SafeConfig@CCS 2017: 15-22 - [c64]Sazzadur Rahaman, Danfeng Yao:
Program Analysis of Cryptographic Implementations for Security. SecDev 2017: 61-68 - [c63]Fang Liu, Haipeng Cai, Gang Wang, Danfeng Yao, Karim O. Elish, Barbara G. Ryder:
MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks. IEEE Symposium on Security and Privacy Workshops 2017: 189-198 - [c62]Fang Liu, Chun Wang, Andres Pico, Danfeng Yao, Gang Wang:
Measuring the Insecurity of Mobile Deep Links of Android. USENIX Security Symposium 2017: 953-969 - [i4]Xiaokui Shu, Ke Tian, Andrew Ciambrone, Danfeng Yao:
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned. CoRR abs/1701.04940 (2017) - [i3]Na Meng, Stefan Nagy, Danfeng Daphne Yao, Wenjie Zhuang, Gustavo A. Arango-Argoty:
Secure Coding Practices in Java: Challenges and Vulnerabilities. CoRR abs/1709.09970 (2017) - 2016
- [j15]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan, Zhibin Zhang:
Causality reasoning about network events for detecting stealthy malware activities. Comput. Secur. 58: 180-198 (2016) - [j14]Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou:
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. IEEE Trans. Dependable Secur. Comput. 13(4): 474-487 (2016) - [j13]Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Wu-chun Feng:
Fast Detection of Transformed Data Leaks. IEEE Trans. Inf. Forensics Secur. 11(3): 528-542 (2016) - [c61]Xiaokui Shu, Nikolay Laptev, Danfeng (Daphne) Yao:
DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution. AAAI 2016: 4395-4396 - [c60]Xiaodong Yu, Wu-chun Feng, Danfeng (Daphne) Yao, Michela Becchi:
O3FA: A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection. ANCS 2016: 1-11 - [c59]Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan:
Causality-based Sensemaking of Network Traffic for Android Application Security. AISec@CCS 2016: 47-58 - [c58]Xiaokui Shu, Danfeng Yao:
Program Anomaly Detection: Methodology and Practices. CCS 2016: 1853-1854 - [c57]Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder:
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. DSN 2016: 467-478 - [c56]Xiaokui Shu, Nikolay Laptev, Danfeng Yao:
DECT: Distributed Evolving Context Tree for Mining Web Behavior Evolution. EDBT 2016: 573-579 - [c55]Hossein Fereidooni, Mauro Conti, Danfeng Yao, Alessandro Sperduti:
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications. NTMS 2016: 1-5 - [c54]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan:
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. IEEE Symposium on Security and Privacy Workshops 2016: 262-271 - 2015
- [j12]Karim O. Elish, Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder, Xuxian Jiang:
Profiling user-trigger dependence for Android malware detection. Comput. Secur. 49: 255-273 (2015) - [j11]Xiaokui Shu, Danfeng Yao, Elisa Bertino:
Privacy-Preserving Detection of Sensitive Data Exposure. IEEE Trans. Inf. Forensics Secur. 10(5): 1092-1103 (2015) - [c53]Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan:
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. CCS 2015: 401-413 - [c52]Hao Zhang, Maoyuan Sun, Danfeng (Daphne) Yao, Chris North:
Visualizing Traffic Causality for Analyzing Network Anomalies. IWSPA@CODASPY 2015: 37-42 - [c51]Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng:
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. CODASPY 2015: 147-149 - [c50]Fang Liu, Xiaokui Shu, Danfeng Yao, Ali Raza Butt:
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. CODASPY 2015: 195-206 - [c49]Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian:
Probabilistic Program Modeling for High-Precision Anomaly Classification. CSF 2015: 497-511 - [c48]Xiaokui Shu, Jing Zhang, Danfeng Yao, Wu-chun Feng:
Rapid and parallel content screening for detecting transformed data exposure. INFOCOM Workshops 2015: 191-196 - [c47]