关注
Danfeng (Daphne) Yao, IEEE Fellow
Danfeng (Daphne) Yao, IEEE Fellow
在 vt.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
528045 Privacy-preserving verification of aggregate queries on outsourced database
S Haber, WG Horne, T Sander, D Yao
RESEARCH DISCLOSURE 528, 349, 2008
2008
A Comprehensive Benchmark on Java Cryptographic API Misuses
S Afrose, S Rahaman, D Yao
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
22020
A Cryptographic Provenance Verification Approach For Host-Based Malware Detection
D Stefan, C Wu, DD Yao, G Xu
Rutgers University Technical Report, 2009
12009
A first look at toxicity injection attacks on open-domain chatbots
C Weeks, A Cheruvu, SM Abdullah, S Kanchi, D Yao, B Viswanath
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
52023
A first look: Using linux containers for deceptive honeypots
A Kedrowitsch, D Yao, G Wang, K Cameron
Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017
352017
A formal framework for program anomaly detection
X Shu, D Yao, BG Ryder
Research in Attacks, Intrusions, and Defenses: 18th International Symposium …, 2015
382015
A Secure and Efficient Audit Framework for Networked Virtual Environments
T Phan, D Yao
Collaborative Computing: Networking, Applications and Worksharing. 4th …, 2012
2012
A Security Analysis and Revised Security Extension for the Precision Time Protocol
K Tian, D Yao, BG Ryder, G Tan, G Peng
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 17 (1), 64-77, 2020
2020
A semantics aware approach to automated reverse engineering unknown protocols
Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ...
2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012
1772012
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity
K Xu, K Tian, D Yao, BG Ryder
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
612016
A static assurance analysis of android applications
KO Elish, DD Yao, BG Ryder, X Jiang
Department of Computer Science, Virginia Polytechnic Institute & State …, 2013
292013
Accredited DomainKeys
MT Goodrich, R Tamassia, D Yao
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions
DD Yao, T Benzel
IEEE Security & Privacy 19 (6), 23-24, 2021
2021
Adaptive key protection in complex cryptosystems with attributes
Z Wang, DD Yao, R Feng
Department of Computer Science, Virginia Polytechnic Institute & State …, 2012
32012
Aggregate Group Signature and Anonymous Delegation
D Yao, R Tamassia
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing.
D Yao
Security and Management, 555-561, 2008
42008
Analysis of code heterogeneity for high-precision classification of repackaged malware
K Tian, D Yao, BG Ryder, G Tan
2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016
442016
Analysis of code heterogeneity for high-precision classification of repackaged malware. In 2016 IEEE Security and Privacy Workshops (SPW)
K Tian, D Yao, BG Ryder, G Tan
IEEE, 2016
42016
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications
H Fereidooni, M Conti, D Yao, A Sperduti
2016 8th IFIP international conference on new technologies, mobility and …, 2016
1512016
Android collusive data leaks with flow-sensitive DIALDroid dataset
A Bosu, F Liu, DD Yao, G Wang
Jun, 2018
42018
系统目前无法执行此操作,请稍后再试。
文章 1–20