Daphne

Results: 903



#Item
1Computing / Computer architecture / Android / System software / Online marketplaces / Google Play / Intent

Poster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset Amiangshu Bosu Fang Liu, Danfeng (Daphne) Yao, Gang Wang Department of Computer Science

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-05 07:38:02
2

Data Leak Detection As a Service Xiaokui Shu and Danfeng (Daphne) Yao Department of Computer Science Virginia Tech Blacksburg, Virginia, US

Add to Reading List

Source URL: people.cs.vt.edu

Language: English - Date: 2012-10-04 15:29:51
    3

    Massive Distributed and Parallel Log Analysis For Organizational Security Xiaokui Shu, John Smiy, Danfeng (Daphne) Yao, and Heshan Lin Department of Computer Science Virginia Tech Blacksburg, VirginiaEmails: {subx

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2013-11-20 11:50:22
      4

      Comprehensive Behavior Profiling for Proactive Android Malware Detection Britton Wolfe1 , Karim O. Elish2 , and Danfeng (Daphne) Yao2 1 Information Analytics and Visualization Center,

      Add to Reading List

      Source URL: people.cs.vt.edu

      Language: English - Date: 2014-08-12 14:49:29
        5

        MadeCR: Correlation-based Malware Detection for Cognitive Radio Yanzhi Dou, Kexiong (Curtis) Zeng, Yaling Yang, Danfeng (Daphne) Yao Virginia Polytechnic Institute and State University {yzdou, kexiong6, yyang8, danfeng}@

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2015-01-31 12:17:02
          6

          An Interview of Daphne and Naren by Comm. of ACM on Program Anomaly Detection 1-Your method only seems to work on programs whose behavior with which you have become very familiar. Is that true? Response: Yes, that is cor

          Add to Reading List

          Source URL: people.cs.vt.edu

          Language: English - Date: 2016-05-01 10:17:43
            7

            Knowing Where Your Input is From: Kernel-Level Data-Provenance Verification ? Deian Stefan1 , Chehai Wu2 , Danfeng (Daphne) Yao3 , and Gang Xu4

            Add to Reading List

            Source URL: people.cs.vt.edu

            Language: English - Date: 2010-04-20 16:21:47
              8

              Data Leak Detection As a Service Xiaokui Shu and Danfeng (Daphne) Yao Department of Computer Science Virginia Tech Blacksburg VA, USA {subx,danfeng}@cs.vt.edu

              Add to Reading List

              Source URL: people.cs.vt.edu

              Language: English - Date: 2012-07-15 10:26:09
                9

                Sentence Simplification for Semantic Role Labeling David Vickrey and Daphne Koller Stanford University Stanford, CA {dvickrey,koller}@cs.stanford.edu Abstract

                Add to Reading List

                Source URL: ai.stanford.edu

                Language: English - Date: 2008-05-06 01:35:28
                  10

                  It is love that fashions us By Daphne Rose Kingham It is love that fashions us into the fullness of our being – not our looks, not our work,

                  Add to Reading List

                  Source URL: jenniferblock.org

                  - Date: 2012-04-10 22:12:22
                    UPDATE