Shanchieh Jay Yang

Orcid: 0009-0004-5503-2082

According to our database1, Shanchieh Jay Yang authored at least 89 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
How Good Is It? Evaluating the Efficacy of Common versus Domain-Specific Prompts on Foundational Large Language Models.
CoRR, 2024

Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation.
CoRR, 2024

The 4<sup>th</sup> Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions.
CoRR, 2023

The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?
Proceedings of the IEEE Conference on Communications and Network Security, 2023

DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Alert-Driven Attack Graph Generation Using S-PDFA.
IEEE Trans. Dependable Secur. Comput., 2022

HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns.
CoRR, 2022

Quantifying impact on safety from cyber-attacks on cyber-physical systems.
CoRR, 2022

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Non-cooperative Learning for Robust Spectrum Sharing in Connected Vehicles with Malicious Agents.
Proceedings of the IEEE Global Communications Conference, 2022

2021
SAGE: Intrusion Alert-driven Attack Graph Extractor.
CoRR, 2021

Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts.
CoRR, 2021

SAGE: Intrusion Alert-driven Attack Graph Extractor.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2021

ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Towards an Efficient Detection of Pivoting Activity.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL).
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Near real-time intrusion alert aggregation using concept-based learning.
Proceedings of the CF '21: Computing Frontiers Conference, 2021

Enabling Visual Analytics via Alert-driven Attack Graphs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On the Evaluation of Sequential Machine Learning for Network Intrusion Detection.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.
ACM Trans. Manag. Inf. Syst., 2020

Cyberattack Action-Intent-Framework for Mapping Intrusion Observables.
CoRR, 2020

Session-level Adversary Intent-Driven Cyberattack Simulator.
Proceedings of the 24th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2020

Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

SoK: contemporary issues and challenges to enable cyber situational awareness for network security.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.
Cybersecur., 2019

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks.
CoRR, 2019

Experimental Evaluation of Jamming Threat in LoRaWAN.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Synthetic Intrusion Alert Generation through Generative Adversarial Networks.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.
Cybersecur., 2018

Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences.
CoRR, 2018

Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG.
CoRR, 2018

Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities.
CoRR, 2018

Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Differentiating and Predicting Cyberattack Behaviors Using LSTM.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
Modeling Information Sharing Behavior on Q&A Forums.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

SCANNER: Sequence clustering of android resource accesses.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Time series forecasting of cyber attack intensity.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Predicting cyber attacks with bayesian networks using unconventional signals.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Assessing the likelihood of cyber network infiltration using rare-event simulation.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2015
Mission Impact Assessment for Cyber Warfare.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Cyber Insider Mission Detection for Situation Awareness.
Proceedings of the Intelligent Methods for Cyber Warfare, 2015

Privacy Sensitive Resource Access Monitoring for Android Systems.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
Attack Projection.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Impact Assessment.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Segmenting Large-Scale Cyber Attacks for Online Behavior Model Generation.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

Who Will Follow a New Topic Tomorrow?
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

Context Model Fusion for Multistage Network Attack Simulation.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Probabilistic Inference for Obfuscated Network Attack Sequences.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Non-independent Cascade Formation: Temporal and Spatial Effects.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Introduction to the special section on social computing, behavioral-cultural modeling, and prediction.
ACM Trans. Intell. Syst. Technol., 2013

Who Shall We Follow in Twitter for Cyber Vulnerability?
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2013

Handling temporal and functional changes for mission impact assessment.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

Simulating attack behaviors in enterprise networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Sequential modeling for obfuscated network attack action sequences.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Design and implementation of a Skype Protocol Analyzer.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2011
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2011

Characterizing Transition Behaviors in Internet Attack Sequences.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Optimizing collection requirements through analysis of plausible impact.
Proceedings of the 14th International Conference on Information Fusion, 2011

2010
Enhancing situation awareness via automated situation assessment.
IEEE Commun. Mag., 2010

Dynamic Creation of Social Networks for Syndromic Surveillance Using Information Fusion.
Proceedings of the Advances in Social Computing, 2010

Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.
Proceedings of the 19th International Conference on Computer Communications and Networks, 2010

Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary).
Proceedings of the 13th Conference on Information Fusion, 2010

Clustering of multistage cyber attacks using significant services.
Proceedings of the 13th Conference on Information Fusion, 2010

2009
High level information fusion for tracking and projection of multistage cyber attacks.
Inf. Fusion, 2009

Toward unsupervised classification of non-uniform cyber attack tracks.
Proceedings of the 12th International Conference on Information Fusion, 2009

2008
Projecting Cyberattacks Through Variable-Length Markov Models.
IEEE Trans. Inf. Forensics Secur., 2008

Intrusion activity projection for cyber situational awareness.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

FuSIA: Future Situation and Impact Awareness.
Proceedings of the 11th International Conference on Information Fusion, 2008

Real-time fusion and Projection of network intrusion activity.
Proceedings of the 11th International Conference on Information Fusion, 2008

Virtual terrain: a security-based representation of a computer network.
Proceedings of the Data Mining, 2008

Intrusion signature creation via clustering anomalies.
Proceedings of the Data Mining, 2008

VTAC: virtual terrain assisted impact assessment for cyber attacks.
Proceedings of the Data Mining, 2008

2007
Terrain and behavior modeling for projecting multistage cyber attacks.
Proceedings of the 10th International Conference on Information Fusion, 2007

2004
Enhancing both network and user performance for networks supporting best effort traffic.
IEEE/ACM Trans. Netw., 2004

Energy efficient data retrieval for networked multi-mode wireless sensors.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004

2002
Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

2001
Bandwidth sharing: the role of user impatience.
Proceedings of the Global Telecommunications Conference, 2001

1997
Reactive Bandwidth Arbitration for Priority and Multicasting Control in ATM Switching.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997


  Loading...