Calculated based on number of publications stored in Pure and citations from Scopus
20102024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Detecting Location Spoofing Attacks using Multiple Angle of Signal Arrivals in MM-Wave Vehicular Networks

    Shanthakumar, C. S. T., Chawariya, A., Cheng, Y. & Eltayeb, M. E., 2024, 2024 IEEE 99th Vehicular Technology Conference, VTC2024-Spring 2024 - Proceedings. Institute of Electrical and Electronics Engineers Inc., (IEEE Vehicular Technology Conference).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • User Perceptions of CAPTCHAs: University vs. Internet Users

    Reddy, A. & Cheng, Y., 2024, Data and Applications Security and Privacy XXXVIII - 38th Annual IFIP WG 11.3 Conference, DBSec 2024, Proceedings. Ferrara, A. L. & Krishnan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 290-297 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14901 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

  • 2023

    A Secure Distributed Learning Framework Using Homomorphic Encryption

    Ly, S., Cheng, Y., Chen, H. & Krovetz, T., 2023, 2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023. Institute of Electrical and Electronics Engineers Inc., (2023 20th Annual International Conference on Privacy, Security and Trust, PST 2023).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2022

    Learning Password Modification Patterns with Recurrent Neural Networks

    Nosenko, A., Cheng, Y. & Chen, H., 2022, Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, SKM 2021, Proceedings. Krishnan, R., Rao, H. R., Sahay, S. K., Samtani, S. & Zhao, Z. (eds.). Springer Science and Business Media Deutschland GmbH, p. 110-129 20 p. (Communications in Computer and Information Science; vol. 1549 CCIS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2021

    A Data-based Protocol for One-way Trust in Inter-vehicular Communication

    Ly, S. & Cheng, Y., 28 Apr 2021, SAT-CPS 2021 - Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems. Association for Computing Machinery, Inc, p. 69-74 6 p. 3450430. (SAT-CPS 2021 - Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2020

    A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems

    Byrnes, J., Hoang, T., Mehta, N. N. & Cheng, Y., Oct 2020, Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020. Institute of Electrical and Electronics Engineers Inc., p. 218-225 8 p. 9325401. (Proceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • An Empirical Analysis on the Usability and Security of Passwords

    Walia, K. S., Shenoy, S. & Cheng, Y., Aug 2020, Proceedings - 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9191658. (Proceedings - 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science, IRI 2020).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    12 Citations (Scopus)
  • A Performance Comparison of WireGuard and OpenVPN

    Mackey, S., Mihov, I., Nosenko, A., Vega, F. & Cheng, Y., 16 Mar 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 162-164 3 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    16 Citations (Scopus)
  • A Performance Study on Cryptographic Algorithms for IoT Devices

    Anaya, E., Patel, J., Shah, P., Shah, V. & Cheng, Y., 16 Mar 2020, CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 159-161 3 p. (CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • 2019

    What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance

    Appana, P., Sun, X. & Cheng, Y., 8 Apr 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 567-571 5 p. 8685579. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2016

    Extended ReBAC Administrative models with cascading revocation and provenance support

    Cheng, Y., Bijon, K. & Sandhu, R., 6 Jun 2016, SACMAT 2016 - Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 161-170 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 06-08-June-2016).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • 2014

    Attribute-aware relationship-based access control for online social networks

    Cheng, Y., Park, J. & Sandhu, R., 2014, Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Proceedings. Springer Verlag, p. 292-306 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8566 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    36 Citations (Scopus)
  • 2013

    Preserving user privacy from third-party applications in online social networks

    Cheng, Y., Park, J. & Sandhu, R., 2013, WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web. Association for Computing Machinery, p. 723-728 6 p. (WWW 2013 Companion - Proceedings of the 22nd International Conference on World Wide Web).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    35 Citations (Scopus)
  • 2012

    A user-to-user relationship-based access control model for online social networks

    Cheng, Y., Park, J. & Sandhu, R., 2012, Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Proceedings. p. 8-24 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7371 LNCS).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    57 Citations (Scopus)
  • Relationship-based access control for online social networks: Beyond user-to-user relationships

    Cheng, Y., Park, J. & Sandhu, R., 2012, Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012. p. 646-655 10 p. 6406322. (Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    82 Citations (Scopus)
  • Towards provenance and risk-awareness in social computing

    Cheng, Y., Nguyen, D., Bijon, K., Krishnan, R., Park, J. & Sandhu, R., 2012, Proc. of the 1st Int. Workshop on Secure and Resilient Architectures and Syst., SRAS 2012 - Held in Conjunction with the 21st Int. Conf. on Parallel Architectures and Compilation Techniques, PACT 2012. p. 25-30 6 p. (Parallel Architectures and Compilation Techniques - Conference Proceedings, PACT).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2011

    ACON: Activity-centric access control for social computing

    Park, J., Sandhu, R. & Cheng, Y., 2011, Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011. p. 242-247 6 p. 6045945. (Proceedings of the 2011 6th International Conference on Availability, Reliability and Security, ARES 2011).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    19 Citations (Scopus)
  • 2010

    Towards a framework for cyber social status based trusted open collaboration

    Park, J., Cheng, Y. & Sandhu, R., 2010, Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010. IEEE Computer Society, 5767055. (Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010).

    Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

    Open Access
    1 Citation (Scopus)