528045 Privacy-preserving verification of aggregate queries on outsourced database S Haber, WG Horne, T Sander, D Yao RESEARCH DISCLOSURE 528, 349, 2008 | | 2008 |
A Comprehensive Benchmark on Java Cryptographic API Misuses S Afrose, S Rahaman, D Yao Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 2 | 2020 |
A Cryptographic Provenance Verification Approach For Host-Based Malware Detection D Stefan, C Wu, DD Yao, G Xu Rutgers University Technical Report, 2009 | 1 | 2009 |
A first look at toxicity injection attacks on open-domain chatbots C Weeks, A Cheruvu, SM Abdullah, S Kanchi, D Yao, B Viswanath Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | 5 | 2023 |
A first look: Using linux containers for deceptive honeypots A Kedrowitsch, D Yao, G Wang, K Cameron Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017 | 35 | 2017 |
A formal framework for program anomaly detection X Shu, D Yao, BG Ryder Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015 | 38 | 2015 |
A Secure and Efficient Audit Framework for Networked Virtual Environments T Phan, D Yao Collaborative Computing: Networking, Applications and Worksharing. 4th …, 2012 | | 2012 |
A Security Analysis and Revised Security Extension for the Precision Time Protocol K Tian, D Yao, BG Ryder, G Tan, G Peng IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 17 (1), 64-77, 2020 | | 2020 |
A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 177 | 2012 |
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity K Xu, K Tian, D Yao, BG Ryder 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 61 | 2016 |
A static assurance analysis of android applications KO Elish, DD Yao, BG Ryder, X Jiang Department of Computer Science, Virginia Polytechnic Institute & State …, 2013 | 29 | 2013 |
Accredited DomainKeys MT Goodrich, R Tamassia, D Yao | | |
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions DD Yao, T Benzel IEEE Security & Privacy 19 (6), 23-24, 2021 | | 2021 |
Adaptive key protection in complex cryptosystems with attributes Z Wang, DD Yao, R Feng Department of Computer Science, Virginia Polytechnic Institute & State …, 2012 | 3 | 2012 |
Aggregate Group Signature and Anonymous Delegation D Yao, R Tamassia | | |
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. D Yao Security and Management, 555-561, 2008 | 4 | 2008 |
Analysis of code heterogeneity for high-precision classification of repackaged malware K Tian, D Yao, BG Ryder, G Tan 2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016 | 44 | 2016 |
Analysis of code heterogeneity for high-precision classification of repackaged malware. In 2016 IEEE Security and Privacy Workshops (SPW) K Tian, D Yao, BG Ryder, G Tan IEEE, 2016 | 4 | 2016 |
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications H Fereidooni, M Conti, D Yao, A Sperduti 2016 8th IFIP international conference on new technologies, mobility and …, 2016 | 151 | 2016 |
Android collusive data leaks with flow-sensitive DIALDroid dataset A Bosu, F Liu, DD Yao, G Wang Jun, 2018 | 4 | 2018 |