Danny Yuxing Huang
Danny Yuxing Huang
Assistant Professor at New York University
Verifierad e-postadress på nyu.edu - Startsida
Citeras av
Citeras av
High-fidelity switch models for software-defined network emulation
DY Huang, K Yocum, AC Snoeren
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
Proceedings of the Workshop on the Economics of Information Security, 2015
Botcoin: Monetizing Stolen Cycles
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
Stressing out: Bitcoin “stress testing”
K Baqer, DY Huang, D McCoy, N Weaver
International Conference on Financial Cryptography and Data Security, 3-18, 2016
Backpage and bitcoin: Uncovering human traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
Keeping the smart home private with smart (er) iot traffic shaping
N Apthorpe, DY Huang, D Reisman, A Narayanan, N Feamster
Proceedings on Privacy Enhancing Technologies 2019 (3), 128-148, 2019
Managing distributed applications using gush
J Albrecht, DY Huang
International Conference on Testbeds and Research Infrastructures, 401-411, 2010
Web-based attacks to discover and control local IoT devices
G Acar, DY Huang, F Li, A Narayanan, N Feamster
Proceedings of the 2018 Workshop on IoT Security and Privacy, 29-35, 2018
Watching you watch: The tracking ecosystem of over-the-top tv streaming devices
H Mohajeri Moghaddam, G Acar, B Burgess, A Mathur, DY Huang, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Profit-driven abuses of virtual currencies
DY Huang
University of California, San Diego 14, 2013
Pinning down abuse on google maps
DY Huang, D Grundman, K Thomas, A Kumar, E Bursztein, K Levchenko, ...
Proceedings of the 26th International Conference on World Wide Web, 1471-1479, 2017
Estimating Profitability of Alternative Crypto-currencies
DY Huang, K Levchenko, AC Snoeren
International Conference on Financial Cryptography and Data Security, 2018
Using Crypto-currencies to Measure Financial Activities and Uncover Potential Identities of Actors Involved
DY Huang
UC San Diego, 2017
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale
D Yuxing Huang, N Apthorpe, G Acar, F Li, N Feamster
arXiv, arXiv: 1909.09848, 2019
Developing Mobile Applications with Shims
DY Huang
Williams College, 2011
To Mitigate Insecure IoT Devices, Regulate Manufacturers or Consumers?
M Ferreira, T Chattopadhyay, N Feamster, M Weinberg, DY Huang
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–17