What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Danny Yuxing Huang
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/popets
Connecting the Dots: Tracing Data Endpoints in IoT Devices.
Md. Jakaria
Danny Yuxing Huang
Anupam Das
2024
conf/soups
Well-intended but half-hearted: Hosts' consideration of guests' privacy using smart devices on rental properties.
Sunyup Park
Weijia He
Elmira Deldari
Pardis Emami Naeini
Danny Yuxing Huang
Jessica Vitak
Yaxing Yao
Michael Zimmer
2024
conf/eurosp
Can Allowlists Capture the Variability of Home IoT Device Network Behavior?
Weijia He
Kevin Bryson
Ricardo Calderon
Vijay Prakash
Nick Feamster
Danny Yuxing Huang
Blase Ur
2023
conf/uss
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.
Sophie Stephenson
Majed Almansoori
Pardis Emami Naeini
Danny Yuxing Huang
Rahul Chatterjee
2023
conf/uss
Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices.
Rose Ceccio
Sophie Stephenson
Varun Chadha
Danny Yuxing Huang
Rahul Chatterjee
2023
conf/uss
Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.
Zixin Wang
Danny Yuxing Huang
Yaxing Yao
2019
journals/popets
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping.
Noah J. Apthorpe
Danny Yuxing Huang
Dillon Reisman
Arvind Narayanan
Nick Feamster
2019
conf/ccs
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Hooman Mohajeri Moghaddam
Gunes Acar
Ben Burgess
Arunesh Mathur
Danny Yuxing Huang
Nick Feamster
Edward W. Felten
Prateek Mittal
Arvind Narayanan
2018
conf/fc
Estimating Profitability of Alternative Cryptocurrencies (Short Paper).
Danny Yuxing Huang
Kirill Levchenko
Alex C. Snoeren
2018
conf/sp
Tracking Ransomware End-to-end.
Danny Yuxing Huang
Maxwell Matthaios Aliapoulios
Vector Guo Li
Luca Invernizzi
Elie Bursztein
Kylie McRoberts
Jonathan Levin
Kirill Levchenko
Alex C. Snoeren
Damon McCoy
2016
conf/fc
Stressing Out: Bitcoin "Stress Testing".
Khaled Baqer
Danny Yuxing Huang
Damon McCoy
Nicholas Weaver
2014
conf/ndss
Botcoin: Monetizing Stolen Cycles.
Danny Yuxing Huang
Hitesh Dharmdasani
Sarah Meiklejohn
Vacha Dave
Chris Grier
Damon McCoy
Stefan Savage
Nicholas Weaver
Alex C. Snoeren
Kirill Levchenko
Coauthors
Alex C. Snoeren
(3)
Anupam Das
(1)
Arunesh Mathur
(1)
Arvind Narayanan
(2)
Ben Burgess
(1)
Blase Ur
(1)
Chris Grier
(1)
Damon McCoy
(3)
Danny Yuxing Huang
(12)
Dillon Reisman
(1)
Edward W. Felten
(1)
Elie Bursztein
(1)
Elmira Deldari
(1)
Gunes Acar
(1)
Hitesh Dharmdasani
(1)
Hooman Mohajeri Moghaddam
(1)
Jessica Vitak
(1)
Jonathan Levin
(1)
Kevin Bryson
(1)
Khaled Baqer
(1)
Kirill Levchenko
(3)
Kylie McRoberts
(1)
Luca Invernizzi
(1)
Majed Almansoori
(1)
Maxwell Matthaios Aliapoulios
(1)
Md. Jakaria
(1)
Michael Zimmer
(1)
Nicholas Weaver
(2)
Nick Feamster
(3)
Noah J. Apthorpe
(1)
Pardis Emami Naeini
(2)
Prateek Mittal
(1)
Rahul Chatterjee
(2)
Ricardo Calderon
(1)
Rose Ceccio
(1)
Sarah Meiklejohn
(1)
Sophie Stephenson
(2)
Stefan Savage
(1)
Sunyup Park
(1)
Vacha Dave
(1)
Varun Chadha
(1)
Vector Guo Li
(1)
Vijay Prakash
(1)
Weijia He
(2)
Yaxing Yao
(2)
Zixin Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to