Enterprise data breach: causes, challenges, prevention, and future directions L Cheng, F Liu, D Yao Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 7 (5 …, 2017 | 354 | 2017 |
Droidcat: Effective android malware detection and categorization via app-level profiling H Cai, N Meng, B Ryder, D Yao IEEE Transactions on Information Forensics and Security 14 (6), 1455-1470, 2018 | 284 | 2018 |
Systems and method for malware detection YAO Danfeng, D Stefan, C Wu US Patent 8,763,127, 2014 | 259 | 2014 |
Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities Y Luo, Y Xiao, L Cheng, G Peng, D Yao ACM Computing Surveys (CSUR) 54 (5), 1-36, 2021 | 217 | 2021 |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption D Yao, N Fazio, Y Dodis, A Lysyanskaya Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 213 | 2004 |
Secure coding practices in java: Challenges and vulnerabilities N Meng, S Nagy, D Yao, W Zhuang, GA Argoty Proceedings of the 40th International Conference on Software Engineering …, 2018 | 176 | 2018 |
A semantics aware approach to automated reverse engineering unknown protocols Y Wang, X Yun, MZ Shafiq, L Wang, AX Liu, Z Zhang, D Yao, Y Zhang, ... 2012 20th IEEE International Conference on Network Protocols (ICNP), 1-10, 2012 | 173 | 2012 |
Profiling user-trigger dependence for Android malware detection KO Elish, X Shu, DD Yao, BG Ryder, X Jiang Computers & Security 49, 255-273, 2015 | 155 | 2015 |
Collusive data leak and more: Large-scale threat analysis of inter-app communications A Bosu, F Liu, D Yao, G Wang Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 153 | 2017 |
Privacy-preserving detection of sensitive data exposure X Shu, D Yao, E Bertino IEEE transactions on information forensics and security 10 (5), 1092-1103, 2015 | 152 | 2015 |
ANASTASIA: ANdroid mAlware detection using STatic analySIs of Applications H Fereidooni, M Conti, D Yao, A Sperduti 2016 8th IFIP international conference on new technologies, mobility and …, 2016 | 151 | 2016 |
Needle in a haystack: Tracking down elite phishing domains in the wild K Tian, STK Jan, H Hu, D Yao, G Wang Proceedings of the Internet Measurement Conference 2018, 429-442, 2018 | 146 | 2018 |
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 142 | 2019 |
Inferring protocol state machine from network traces: a probabilistic approach Y Wang, Z Zhang, D Yao, B Qu, L Guo Applied Cryptography and Network Security: 9th International Conference …, 2011 | 131 | 2011 |
The union-split algorithm and cluster-based anonymization of social networks B Thompson, D Yao Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 116 | 2009 |
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks L Cheng, K Tian, D Yao Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 105 | 2017 |
Unearthing stealthy program attacks buried in extremely long execution paths X Shu, D Yao, N Ramakrishnan Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 103 | 2015 |
Breaking the target: An analysis of target data breach and lessons learned X Shu, K Tian, A Ciambrone, D Yao arXiv preprint arXiv:1701.04940, 2017 | 97 | 2017 |
Detection of repackaged android malware with code-heterogeneity features K Tian, D Yao, BG Ryder, G Tan, G Peng IEEE Transactions on Dependable and Secure Computing 17 (1), 64-77, 2017 | 94 | 2017 |
DNS for massive-scale command and control K Xu, P Butler, S Saha, D Yao IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013 | 92 | 2013 |