Suivre
Danny Yuxing Huang
Danny Yuxing Huang
Assistant Professor at New York University
Adresse e-mail validée de nyu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
2492018
IoT inspector: Crowdsourcing labeled network traffic from smart home devices at scale
DY Huang, N Apthorpe, F Li, G Acar, N Feamster
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
1782020
High-fidelity switch models for software-defined network emulation
DY Huang, K Yocum, AC Snoeren
Proceedings of the second ACM SIGCOMM workshop on Hot topics in software …, 2013
1782013
Keeping the smart home private with smart (er) iot traffic shaping
N Apthorpe, DY Huang, D Reisman, A Narayanan, N Feamster
Proceedings on Privacy Enhancing Technologies 2019 (Issue 3 (July 2019 …, 2019
1752019
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
Proceedings of the Workshop on the Economics of Information Security, 2015
1472015
Botcoin: Monetizing Stolen Cycles
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014
1292014
Watching you watch: The tracking ecosystem of over-the-top tv streaming devices
H Mohajeri Moghaddam, G Acar, B Burgess, A Mathur, DY Huang, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1012019
Stressing out: Bitcoin “stress testing”
K Baqer, DY Huang, D McCoy, N Weaver
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
902016
Backpage and bitcoin: Uncovering human traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
872017
Web-based attacks to discover and control local IoT devices
G Acar, DY Huang, F Li, A Narayanan, N Feamster
Proceedings of the 2018 workshop on iot security and privacy, 29-35, 2018
672018
Alexa, who am I speaking to?: Understanding users’ ability to identify third-party apps on Amazon Alexa
D Major, DY Huang, M Chetty, N Feamster
ACM Transactions on Internet Technology (TOIT) 22 (1), 1-22, 2021
372021
“It would probably turn into a social faux-pas”: Users’ and Bystanders’ Preferences of Privacy Awareness Mechanisms in Smart Homes
PK Thakkar, S He, S Xu, DY Huang, Y Yao
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
272022
Managing distributed applications using gush
J Albrecht, DY Huang
International Conference on Testbeds and Research Infrastructures, 401-411, 2010
262010
Pinning down abuse on google maps
DY Huang, D Grundman, K Thomas, A Kumar, E Bursztein, K Levchenko, ...
Proceedings of the 26th International Conference on World Wide Web, 1471-1479, 2017
172017
Skillbot: Identifying risky content for children in alexa skills
T Le, DY Huang, N Apthorpe, Y Tian
ACM Transactions on Internet Technology (TOIT) 22 (3), 1-31, 2022
162022
Profit-driven abuses of virtual currencies
DY Huang
Univ California, San Diego 14, 2013
152013
Estimating Profitability of Alternative Crypto-currencies
DY Huang, K Levchenko, AC Snoeren
International Conference on Financial Cryptography and Data Security, 2018
13*2018
Abuse Vectors: A Framework for Conceptualizing {IoT-Enabled} Interpersonal Abuse
S Stephenson, M Almansoori, P Emami-Naeini, DY Huang, R Chatterjee
32nd USENIX Security Symposium (USENIX Security 23), 69-86, 2023
92023
In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes
A Girish, T Hu, V Prakash, DJ Dubois, S Matic, DY Huang, S Egelman, ...
Proceedings of the 2023 ACM on Internet Measurement Conference, 437-456, 2023
52023
Sneaky spy devices and defective detectors: the ecosystem of intimate partner surveillance with covert devices
R Ceccio, S Stephenson, V Chadha, DY Huang, R Chatterjee
32nd USENIX Security Symposium (USENIX Security 23), 123-140, 2023
52023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20