Year |
Citation |
Score |
2020 |
Elish KO, Cai H, Barton D, Yao D, Ryder BG. Identifying Mobile Inter-App Communication Risks Ieee Transactions On Mobile Computing. 19: 90-102. DOI: 10.1109/Tmc.2018.2889495 |
0.311 |
|
2020 |
Luo Y, Cheng L, Hu H, Peng G, Yao D. Context-rich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3019812 |
0.346 |
|
2019 |
Cheng L, Tian K, Yao D, Sha L, Beyah RA. Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2906161 |
0.32 |
|
2016 |
Almohri HM, Watson LT, Yao D, Ou X. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Ieee Transactions On Dependable and Secure Computing. 13: 474-487. DOI: 10.1109/Tdsc.2015.2411264 |
0.326 |
|
2015 |
Shu X, Yao D, Bertino E. Privacy-preserving detection of sensitive data exposure Ieee Transactions On Information Forensics and Security. 10: 1092-1103. DOI: 10.1109/Tifs.2015.2398363 |
0.351 |
|
2014 |
Almohri HMJ, Yao D, Kafura D. Process Authentication for High System Assurance Ieee Transactions On Dependable and Secure Computing. 11: 168-180. DOI: 10.1109/Tdsc.2013.29 |
0.332 |
|
2012 |
Xu K, Xiong H, Wu C, Stefan D, Yao D. Data-Provenance Verification For Secure Hosts Ieee Transactions On Dependable and Secure Computing. 9: 173-183. DOI: 10.1109/Tdsc.2011.50 |
0.407 |
|
2010 |
Ramstetter JR, Yang Y, Yao D. Applications and Security of Next-Generation, User-Centric Wireless Systems Future Internet. 2: 190-211. DOI: 10.3390/Fi2030190 |
0.352 |
|
2010 |
Yang Q, Yao D, Garnett J, Muller K. Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises Journal of Contingencies and Crisis Management. 18: 231-241. DOI: 10.1111/J.1468-5973.2010.00621.X |
0.364 |
|
2009 |
Yao D, Tamassia R. Compact and anonymous role-based authorization chain Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455528 |
0.53 |
|
2008 |
Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240 |
0.52 |
|
2008 |
Koglin Y, Yao D, Bertino E. Efficient and secure content processing and distribution by cooperative intermediaries Ieee Transactions On Parallel and Distributed Systems. 19: 615-626. DOI: 10.1109/Tpds.2007.70758 |
0.396 |
|
2006 |
Goodrich MT, Tamassia R, Yao D. Notarized federated identity management for web services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 133-147. DOI: 10.1007/11805588_10 |
0.532 |
|
Show low-probability matches. |