default search action
Shanchieh Jay Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j9]Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Alert-Driven Attack Graph Generation Using S-PDFA. IEEE Trans. Dependable Secur. Comput. 19(2): 731-746 (2022) - 2020
- [j8]Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks. ACM Trans. Manag. Inf. Syst. 11(4): 22:1-22:21 (2020) - 2019
- [j7]Ahmet Okutan, Shanchieh Jay Yang:
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense. Cybersecur. 2(1): 15 (2019) - 2018
- [j6]Ahmet Okutan, Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data. Cybersecur. 1(1): 15 (2018) - 2013
- [j5]Shanchieh Jay Yang, Dana S. Nau, John J. Salerno:
Introduction to the special section on social computing, behavioral-cultural modeling, and prediction. ACM Trans. Intell. Syst. Technol. 4(3): 51:1-51:2 (2013) - 2010
- [j4]Jared Holsopple, Moises Sudit, Michael Nusinov, Daniel F. Liu, Haitao Du, Shanchieh Jay Yang:
Enhancing situation awareness via automated situation assessment. IEEE Commun. Mag. 48(3): 146-152 (2010) - 2009
- [j3]Shanchieh Jay Yang, Adam Stotz, Jared Holsopple, Moises Sudit, Michael E. Kuhl:
High level information fusion for tracking and projection of multistage cyber attacks. Inf. Fusion 10(1): 107-121 (2009) - 2008
- [j2]Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang:
Projecting Cyberattacks Through Variable-Length Markov Models. IEEE Trans. Inf. Forensics Secur. 3(3): 359-369 (2008) - 2004
- [j1]Shanchieh Jay Yang, Gustavo de Veciana:
Enhancing both network and user performance for networks supporting best effort traffic. IEEE/ACM Trans. Netw. 12(2): 349-360 (2004)
Conference and Workshop Papers
- 2024
- [c64]Ádám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda:
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. ARES 2024: 33:1-33:11 - [c63]Steven Ullman, Benjamin M. Ampel, Sagar Samtani, Shanchieh Yang, Hsinchun Chen:
The 4th Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2024: 6741-6742 - 2023
- [c62]Tonmoay Deb, Jürgen Dix, Mingi Jeong, Cristian Molinaro, Andrea Pugliese, Alberto Quattrini Li, Eugene Santos Jr., V. S. Subrahmanian, Shanchieh Yang, Youzhi Zhang:
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents. AAAI 2023: 16425-16427 - [c61]Andrea Corsini, Shanchieh Jay Yang:
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? CNS 2023: 1-9 - [c60]Martin Drasar, Ádám Ruman, Pavel Celeda, Shanchieh Jay Yang:
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. ESORICS Workshops (2) 2023: 738-749 - [c59]Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb:
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. ICDF2C (2) 2023: 132-151 - [c58]Sagar Samtani, Shanchieh Yang, Hsinchun Chen:
The 3rd Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2023: 5880-5881 - 2022
- [c57]Haoran Peng, Hanif Rahbari, Shanchieh Jay Yang, Li-Chun Wang:
Non-cooperative Learning for Robust Spectrum Sharing in Connected Vehicles with Malicious Agents. GLOBECOM 2022: 1769-1775 - [c56]Gordon Werner, Shanchieh Yang:
Discovery of Rare yet Co-occurring Actions with Temporal Characteristics in Episodic Cyberattack Streams. ICCCN 2022: 1-10 - [c55]Sagar Samtani, Gang Wang, Ali Ahmadzadeh, Arridhana Ciptadi, Shanchieh Yang, Hsinchun Chen:
ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurity Analytics and Deployable Defense. KDD 2022: 4900-4901 - 2021
- [c54]Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. ARES 2021: 113:1-113:10 - [c53]Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
Enabling Visual Analytics via Alert-driven Attack Graphs. CCS 2021: 2420-2422 - [c52]Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Near real-time intrusion alert aggregation using concept-based learning. CF 2021: 152-160 - [c51]Stephen Moskal, Shanchieh Jay Yang:
Translating Intrusion Alerts to Cyberattack Stages using Pseudo-Active Transfer Learning (PATRL). CNS 2021: 110-118 - [c50]Martin Husák, Giovanni Apruzzese, Shanchieh Jay Yang, Gordon Werner:
Towards an Efficient Detection of Pivoting Activity. IM 2021: 980-985 - [c49]Sagar Samtani, Shanchieh Yang, Hsinchun Chen:
ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligence-enabled Cybersecurity Analytics. KDD 2021: 4153-4154 - [c48]Azqa Nadeem, Sicco Verwer, Shanchieh Jay Yang:
SAGE: Intrusion Alert-driven Attack Graph Extractor. VizSec 2021: 36-41 - 2020
- [c47]Martin Husák, Tomás Jirsík, Shanchieh Jay Yang:
SoK: contemporary issues and challenges to enable cyber situational awareness for network security. ARES 2020: 2:1-2:10 - [c46]Aunshul Rege, Shanchieh Jay Yang, Alyssa Mendlein, Katorah Williams, Shao-Hsusan Su, Stephen Moskal:
Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations. IWSPA@CODASPY 2020: 71-77 - [c45]Martin Drasar, Stephen Moskal, Shanchieh Jay Yang, Pavol Zat'ko:
Session-level Adversary Intent-Driven Cyberattack Simulator. DS-RT 2020: 1-9 - 2019
- [c44]Ahmet Okutan, Shanchieh Jay Yang, Katie McConky, Gordon Werner:
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. CNS 2019: 205-213 - [c43]Ahmet Okutan, Fu-Yuan Cheng, Shao-Hsuan Su, Shanchieh Jay Yang:
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features. MILCOM 2019: 1-6 - [c42]Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:
Synthetic Intrusion Alert Generation through Generative Adversarial Networks. MILCOM 2019: 1-6 - [c41]Chin-Ya Huang, Ching-Wei Lin, Ray-Guang Cheng, Shanchieh Jay Yang, Shiann-Tsong Sheu:
Experimental Evaluation of Jamming Threat in LoRaWAN. VTC Spring 2019: 1-6 - 2018
- [c40]Ian Perry, Lutzu Li, Christopher Sweet, Shao-Hsuan Su, Fu-Yuan Cheng, Shanchieh Jay Yang, Ahmet Okutan:
Differentiating and Predicting Cyberattack Behaviors Using LSTM. DSC 2018: 1-8 - [c39]Stephen Moskal, Shanchieh Jay Yang, Michael E. Kuhl:
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts. ISI 2018: 49-54 - [c38]Gordon Werner, Shanchieh Yang, Katie McConky:
Leveraging Intra-Day Temporal Variations to Predict Daily Cyberattack Activity. ISI 2018: 58-63 - 2017
- [c37]Ahmet Okutan, Gordon Werner, Katie McConky, Shanchieh Jay Yang:
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE). CCS 2017: 2563-2565 - [c36]Ahmet Okutan, Shanchieh Jay Yang, Katie McConky:
Predicting cyber attacks with bayesian networks using unconventional signals. CISRC 2017: 13:1-13:4 - [c35]Gordon Werner, Shanchieh Jay Yang, Katie McConky:
Time series forecasting of cyber attack intensity. CISRC 2017: 18:1-18:3 - [c34]Neil Wong Hon Chan, Shanchieh Jay Yang:
SCANNER: Sequence clustering of android resource accesses. DSC 2017: 259-266 - [c33]Biru Cui, Shanchieh Jay Yang, Christopher M. Homan:
Modeling Information Sharing Behavior on Q&A Forums. PAKDD (2) 2017: 51-63 - 2016
- [c32]Alexander L. Krall, Michael E. Kuhl, Stephen F. Moskal, Shanchieh Jay Yang:
Assessing the likelihood of cyber network infiltration using rare-event simulation. SSCI 2016: 1-7 - 2015
- [c31]Leah Zhao, Neil Wong Hon Chan, Shanchieh Jay Yang, Roy W. Melton:
Privacy Sensitive Resource Access Monitoring for Android Systems. ICCCN 2015: 1-6 - 2014
- [c30]Biru Cui, Shanchieh Jay Yang, Christopher Homan:
Non-independent Cascade Formation: Temporal and Spatial Effects. CIKM 2014: 1923-1926 - [c29]Biru Cui, Shanchieh Jay Yang:
NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks. CNS 2014: 229-237 - [c28]Haitao Du, Shanchieh Jay Yang:
Probabilistic Inference for Obfuscated Network Attack Sequences. DSN 2014: 57-67 - [c27]Stephen Moskal, Ben Wheeler, Derek Kreider, Michael E. Kuhl, Shanchieh Jay Yang:
Context Model Fusion for Multistage Network Attack Simulation. MILCOM 2014: 158-163 - [c26]Biru Cui, Shanchieh Jay Yang:
Who Will Follow a New Topic Tomorrow? SBP 2014: 43-50 - [c25]Steven Strapp, Shanchieh Jay Yang:
Segmenting Large-Scale Cyber Attacks for Online Behavior Model Generation. SBP 2014: 169-177 - 2013
- [c24]Stephen Moskal, Derek Kreider, Lydia Hays, Ben Wheeler, Shanchieh Jay Yang, Michael E. Kuhl:
Simulating attack behaviors in enterprise networks. CNS 2013: 359-360 - [c23]Ray-Guang Cheng, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao-Li Tsao, Shanchieh Jay Yang:
Design and implementation of a Skype Protocol Analyzer. CNS 2013: 375-376 - [c22]Haitao Du, Shanchieh Jay Yang:
Sequential modeling for obfuscated network attack action sequences. CNS 2013: 389-390 - [c21]Jared Holsopple, Shanchieh Jay Yang:
Handling temporal and functional changes for mission impact assessment. CogSIMA 2013: 212-219 - [c20]Biru Cui, Stephen Moskal, Haitao Du, Shanchieh Jay Yang:
Who Shall We Follow in Twitter for Cyber Vulnerability? SBP 2013: 394-402 - 2011
- [c19]Khiem Tong, Shanchieh Jay Yang, Moises Sudit, Jared Holsopple:
Optimizing collection requirements through analysis of plausible impact. FUSION 2011: 1-7 - [c18]Haitao Du, Shanchieh Jay Yang:
Characterizing Transition Behaviors in Internet Attack Sequences. ICCCN 2011: 1-6 - [c17]Haitao Du, Shanchieh Jay Yang:
Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis. SBP 2011: 129-136 - 2010
- [c16]Christopher Murphy, Shanchieh Jay Yang:
Clustering of multistage cyber attacks using significant services. FUSION 2010: 1-7 - [c15]John S. Salerno, Moises Sudit, Shanchieh Jay Yang, George P. Tadda, Ivan Kadar, Jared Holsopple:
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary). FUSION 2010: 1-17 - [c14]Haitao Du, Daniel F. Liu, Jared Holsopple, Shanchieh Jay Yang:
Toward Ensemble Characterization and Projection of Multistage Cyber Attacks. ICCCN 2010: 1-8 - [c13]Jared Holsopple, Shanchieh Jay Yang, Moises Sudit, Adam Stotz:
Dynamic Creation of Social Networks for Syndromic Surveillance Using Information Fusion. SBP 2010: 330-337 - 2009
- [c12]Haitao Du, Christopher Murphy, Jordan Bean, Shanchieh Jay Yang:
Toward unsupervised classification of non-uniform cyber attack tracks. FUSION 2009: 1919-1925 - 2008
- [c11]Brian Argauer, Shanchieh Jay Yang:
VTAC: virtual terrain assisted impact assessment for cyber attacks. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730F - [c10]Gilbert Hendry, Shanchieh Jay Yang:
Intrusion signature creation via clustering anomalies. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730C - [c9]Jared Holsopple, Shanchieh Jay Yang, Brian Argauer:
Virtual terrain: a security-based representation of a computer network. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008: 69730E - [c8]Stephen R. Byers, Shanchieh Jay Yang:
Real-time fusion and Projection of network intrusion activity. FUSION 2008: 1-8 - [c7]Jared Holsopple, Shanchieh Jay Yang:
FuSIA: Future Situation and Impact Awareness. FUSION 2008: 1-8 - [c6]Shanchieh Jay Yang, Stephen R. Byers, Jared Holsopple, Brian Argauer, Daniel S. Fava:
Intrusion activity projection for cyber situational awareness. ISI 2008: 167-172 - 2007
- [c5]Daniel S. Fava, Jared Holsopple, Shanchieh Jay Yang, Brian Argauer:
Terrain and behavior modeling for projecting multistage cyber attacks. FUSION 2007: 1-7 - 2004
- [c4]Cory C. Cress, Shanchieh Jay Yang, Moises Sudit:
Energy efficient data retrieval for networked multi-mode wireless sensors. PE-WASUN 2004: 119-120 - 2002
- [c3]Shan-Chieh Yang, Gustavo de Veciana:
Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows. INFOCOM 2002: 657-666 - 2001
- [c2]Shanchieh Jay Yang, Gustavo de Veciana:
Bandwidth sharing: the role of user impatience. GLOBECOM 2001: 2258-2262 - 1997
- [c1]Shu-Jen Fang, Yu-Sheng Lin, Shan-Chieh Yang, C. Bernard Shung:
Reactive Bandwidth Arbitration for Priority and Multicasting Control in ATM Switching. ICC (3) 1997: 1724-1728
Parts in Books or Collections
- 2015
- [p4]Haitao Du, Changzhou Wang, Tao Zhang, Shanchieh Jay Yang, Jai J. Choi, Peng Liu:
Cyber Insider Mission Detection for Situation Awareness. Intelligent Methods for Cyber Warfare 2015: 201-217 - [p3]Jared Holsopple, Shanchieh Jay Yang, Moises Sudit:
Mission Impact Assessment for Cyber Warfare. Intelligent Methods for Cyber Warfare 2015: 239-266 - 2014
- [p2]Jared Holsopple, Moises Sudit, Shanchieh Jay Yang:
Impact Assessment. Cyber Defense and Situational Awareness 2014: 219-238 - [p1]Shanchieh Jay Yang, Haitao Du, Jared Holsopple, Moises Sudit:
Attack Projection. Cyber Defense and Situational Awareness 2014: 239-261
Editorship
- 2014
- [e3]William G. Kennedy, Nitin Agarwal, Shanchieh Jay Yang:
Social Computing, Behavioral-Cultural Modeling and Prediction - 7th International Conference, SBP 2014, Washington, DC, USA, April 1-4, 2014. Proceedings. Lecture Notes in Computer Science 8393, Springer 2014, ISBN 978-3-319-05578-7 [contents] - 2012
- [e2]Shanchieh Jay Yang, Ariel M. Greenberg, Mica R. Endsley:
Social Computing, Behavioral - Cultural Modeling and Prediction - 5th International Conference, SBP 2012, College Park, MD, USA, April 3-5, 2012. Proceedings. Lecture Notes in Computer Science 7227, Springer 2012, ISBN 978-3-642-29046-6 [contents] - 2011
- [e1]John J. Salerno, Shanchieh Jay Yang, Dana S. Nau, Sun-Ki Chai:
Social Computing, Behavioral-Cultural Modeling and Prediction - 4th International Conference, SBP 2011, College Park, MD, USA, March 29-31, 2011. Proceedings. Lecture Notes in Computer Science 6589, Springer 2011, ISBN 978-3-642-19655-3 [contents]
Informal and Other Publications
- 2024
- [i14]Reza Fayyazi, Rozhina Taghdimi, Shanchieh Jay Yang:
Advancing TTP Analysis: Harnessing the Power of Encoder-Only and Decoder-Only Language Models with Retrieval Augmented Generation. CoRR abs/2401.00280 (2024) - [i13]Oluyemi Enoch Amujo, Shanchieh Jay Yang:
How Good Is It? Evaluating the Efficacy of Common versus Domain-Specific Prompts on Foundational Large Language Models. CoRR abs/2407.11006 (2024) - 2023
- [i12]Reza Fayyazi, Shanchieh Jay Yang:
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions. CoRR abs/2306.14062 (2023) - [i11]Andrea Corsini, Shanchieh Jay Yang:
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? CoRR abs/2308.14376 (2023) - 2022
- [i10]Eleftherios E. Vlahakis, Gregory M. Provan, Gordon Werner, Shanchieh Yang, Nikolaos Athanasopoulos:
Quantifying impact on safety from cyber-attacks on cyber-physical systems. CoRR abs/2211.12196 (2022) - [i9]Stephen Moskal, Shanchieh Jay Yang:
HeATed Alert Triage (HeAT): Transferrable Learning to Extract Multistage Attack Campaigns. CoRR abs/2212.13941 (2022) - 2021
- [i8]Shanchieh Jay Yang, Ahmet Okutan, Gordon Werner, Shao-Hsuan Su, Ayush Goel, Nathan D. Cahill:
Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts. CoRR abs/2103.13902 (2021) - [i7]Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese:
On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. CoRR abs/2106.07961 (2021) - [i6]Azqa Nadeem, Sicco Verwer, Stephen Moskal, Shanchieh Jay Yang:
SAGE: Intrusion Alert-driven Attack Graph Extractor. CoRR abs/2107.02783 (2021) - 2020
- [i5]Stephen Moskal, Shanchieh Jay Yang:
Cyberattack Action-Intent-Framework for Mapping Intrusion Observables. CoRR abs/2002.07838 (2020) - 2019
- [i4]Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:
On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks. CoRR abs/1908.01219 (2019) - 2018
- [i3]Ahmet Okutan, Shanchieh Jay Yang, Katie McConky:
Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities. CoRR abs/1803.09560 (2018) - [i2]Alexander Kott, Ryan Thomas, Martin Drasar, Markus Kont, Alexander Poylisher, Benjamin A. Blakely, Paul Théron, Nathaniel Evans, Nandi Leslie, Rajdeep Singh, Maria Rigaki, Shanchieh Jay Yang, Benoît Leblanc, Paul Losiewicz, Sylvain Hourlier, Misty K. Blowers, Hugh Harney, Gregory Wehner, Alessandro Guarino, Jana Komárková, James Rowell:
Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG. CoRR abs/1804.07646 (2018) - [i1]Haitao Du, Shanchieh Jay Yang:
Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences. CoRR abs/1809.01562 (2018)
Coauthor Index
aka: Stephen F. Moskal
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint