Danfeng Yao
Orcid: 0000-0001-8969-2792Affiliations:
- Virginia Tech, Blacksburg, VA, USA
According to our database1,
Danfeng Yao
authored at least 161 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., May, 2024
ACM Trans. Softw. Eng. Methodol., March, 2024
Commun. ACM, January, 2024
2023
Spatiotemporal estimations of temperature rise during electroporation treatments using a deep neural network.
Comput. Biol. Medicine, July, 2023
IEEE Trans. Software Eng., June, 2023
Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks.
IEEE Trans. Software Eng., February, 2023
IEEE Trans. Software Eng., 2023
Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases.
DTRAP, 2023
Deep Phenotyping of Non-Alcoholic Fatty Liver Disease Patients with Genetic Factors for Insights into the Complex Disease.
CoRR, 2023
CoRR, 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
DRGCoder: Explainable Clinical Coding for the Early Prediction of Diagnostic-Related Groups.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Poster: Cybersecurity Usage in the Wild: A look at Deployment Challenges in Intrusion Detection and Alert Handling.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023
2022
From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++.
IEEE Trans. Dependable Secur. Comput., 2022
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding.
IEEE Secur. Priv., 2022
Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities.
ACM Comput. Surv., 2022
Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE.
Computer, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the IEEE Secure Development Conference, 2022
Proceedings of the 30th IEEE/ACM International Conference on Program Comprehension, 2022
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022
Privacy Guarantees of BLE Contact Tracing for COVID-19 and Beyond: A Case Study on COVIDWISE.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Internet Things J., 2021
ACSAC 2020: Furthering the Quest to Tackle Hard Problems and Find Practical Solutions.
IEEE Secur. Priv., 2021
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021
Commun. ACM, 2021
Proceedings of the IEEE Secure Development Conference, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Prediction of High-Performance Computing Input/Output Variability and Its Application to Optimization for System Configurations.
CoRR, 2020
Comput. Secur., 2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2020
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling.
IEEE Trans. Inf. Forensics Secur., 2019
CoRR, 2019
Comparative Measurement of Cache Configurations' Impacts on Cache Timing Side-Channel Attacks.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Security Certification in Payment Card Industry: Testbeds, Measurements, and Recommendations.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018
2017
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02354-5, 2017
WIREs Data Mining Knowl. Discov., 2017
ACM Trans. Priv. Secur., 2017
Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation.
Proc. Priv. Enhancing Technol., 2017
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, 2017
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.
IEEE Trans. Dependable Secur. Comput., 2016
Comput. Secur., 2016
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the 8th IFIP International Conference on New Technologies, 2016
Proceedings of the 19th International Conference on Extending Database Technology, 2016
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
O3FA: A Scalable Finite Automata-based Pattern-Matching Engine for Out-of-Order Deep Packet Inspection.
Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, 2016
DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Comput. Secur., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy Analytics, 2015
Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014
Role-playing game for studying user behaviors in security: A case study on email secrecy.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Detection of stealthy malware activities with traffic causality and scalable triggering relation discovery.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Dependable Secur. Comput., 2013
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
Comput. Secur., 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Security and Privacy in Communication Networks, 2011
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEEE Trans. Syst. Man Cybern. Part A, 2010
Future Internet, 2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the 5th Workshop on Digital Identity Management, 2009
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.
IEEE Trans. Parallel Distributed Syst., 2008
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2008
An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing.
Proceedings of the 2008 International Conference on Security & Management, 2008
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments.
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the CEAS 2008, 2008
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust.
Proceedings of the Trust Management, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the CEAS 2005, 2005
2004
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004