Danfeng (Daphne) Yao
Danfeng (Daphne) Yao
Vahvistettu sähköpostiosoite verkkotunnuksessa vt.edu - Kotisivu
Systems and method for malware detection
YAO Danfeng, D Stefan, C Wu
US Patent 8,763,127, 2014
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
A semantics aware approach to automated reverse engineering unknown protocols
Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ...
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012
Profiling user-trigger dependence for Android malware detection
KO Elish, X Shu, DD Yao, BG Ryder, X Jiang
Computers & Security 49, 255-273, 2015
Enterprise data breach: causes, challenges, prevention, and future directions
L Cheng, F Liu, D Yao
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 7 (5 …, 2017
Privacy-preserving detection of sensitive data exposure
X Shu, D Yao, E Bertino
IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015
The union-split algorithm and cluster-based anonymization of social networks
B Thompson, D Yao
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
Collusive data leak and more: Large-scale threat analysis of inter-app communications
A Bosu, F Liu, D Yao, G Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Inferring protocol state machine from network traces: a probabilistic approach
Y Wang, Z Zhang, DD Yao, B Qu, L Guo
International Conference on Applied Cryptography and Network Security, 1-18, 2011
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery
H Zhang, DD Yao, N Ramakrishnan
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Towards end-to-end secure content storage and delivery with public cloud
H Xiong, X Zhang, D Yao, X Wu, Y Wen
Proceedings of the second ACM conference on Data and Application Security …, 2012
K2C: Cryptographic cloud storage with lazy revocation and anonymous access
S Zarandioon, DD Yao, V Ganapathy
International Conference on Security and Privacy in Communication Systems, 59-76, 2011
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications
H Fereidooni, M Conti, D Yao, A Sperduti
2016 8th IFIP international conference on new technologies, mobility and …, 2016
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
S Haber, Y Hatano, Y Honda, W Horne, K Miyazaki, T Sander, S Tezoku, ...
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
Securing location aware services over VANET using geographical secure path routing
V Pathak, D Yao, L Iftode
2008 IEEE International Conference on Vehicular Electronics and Safety, 346-353, 2008
Role-based cascaded delegation
R Tamassia, D Yao, WH Winsborough
Proceedings of the ninth ACM symposium on Access control models and …, 2004
DNS for massive-scale command and control
K Xu, P Butler, S Saha, D Yao
IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013
Data leak detection as a service
X Shu, DD Yao
International Conference on Security and Privacy in Communication Systems …, 2012
Unearthing stealthy program attacks buried in extremely long execution paths
X Shu, D Yao, N Ramakrishnan
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
On the need of precise inter-app ICC classification for detecting Android malware collusions
KO Elish, D Yao, BG Ryder
Proceedings of IEEE mobile security technologies (MoST), in conjunction with …, 2015
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20