Danfeng Yao, Ph.D. - Publications

Affiliations: 
2008 Brown University, Providence, RI 
Area:
Algorithms and Theory, Security and Cryptography

13 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Elish KO, Cai H, Barton D, Yao D, Ryder BG. Identifying Mobile Inter-App Communication Risks Ieee Transactions On Mobile Computing. 19: 90-102. DOI: 10.1109/Tmc.2018.2889495  0.311
2020 Luo Y, Cheng L, Hu H, Peng G, Yao D. Context-rich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT Ieee Internet of Things Journal. 1-1. DOI: 10.1109/Jiot.2020.3019812  0.346
2019 Cheng L, Tian K, Yao D, Sha L, Beyah RA. Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2906161  0.32
2016 Almohri HM, Watson LT, Yao D, Ou X. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Ieee Transactions On Dependable and Secure Computing. 13: 474-487. DOI: 10.1109/Tdsc.2015.2411264  0.326
2015 Shu X, Yao D, Bertino E. Privacy-preserving detection of sensitive data exposure Ieee Transactions On Information Forensics and Security. 10: 1092-1103. DOI: 10.1109/Tifs.2015.2398363  0.351
2014 Almohri HMJ, Yao D, Kafura D. Process Authentication for High System Assurance Ieee Transactions On Dependable and Secure Computing. 11: 168-180. DOI: 10.1109/Tdsc.2013.29  0.332
2012 Xu K, Xiong H, Wu C, Stefan D, Yao D. Data-Provenance Verification For Secure Hosts Ieee Transactions On Dependable and Secure Computing. 9: 173-183. DOI: 10.1109/Tdsc.2011.50  0.407
2010 Ramstetter JR, Yang Y, Yao D. Applications and Security of Next-Generation, User-Centric Wireless Systems Future Internet. 2: 190-211. DOI: 10.3390/Fi2030190  0.352
2010 Yang Q, Yao D, Garnett J, Muller K. Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises Journal of Contingencies and Crisis Management. 18: 231-241. DOI: 10.1111/J.1468-5973.2010.00621.X  0.364
2009 Yao D, Tamassia R. Compact and anonymous role-based authorization chain Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455528  0.53
2008 Yao D, Frikken KB, Atallah MJ, Tamassia R. Private information: To reveal or not to reveal Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410240  0.52
2008 Koglin Y, Yao D, Bertino E. Efficient and secure content processing and distribution by cooperative intermediaries Ieee Transactions On Parallel and Distributed Systems. 19: 615-626. DOI: 10.1109/Tpds.2007.70758  0.396
2006 Goodrich MT, Tamassia R, Yao D. Notarized federated identity management for web services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 133-147. DOI: 10.1007/11805588_10  0.532
Show low-probability matches.