Yang, Shanchieh
58  Ergebnisse:
Personensuche X
?
1

The 3rd Workshop on Artificial Intelligence-enabled Cyberse..:

, In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
Samtani, Sagar ; Yang, Shanchieh ; Chen, Hsinchun - p. 5880-5881 , 2023
 
?
2

ACM KDD AI4Cyber/MLHat: Workshop on AI-enabled Cybersecurit..:

, In: Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
Samtani, Sagar ; Wang, Gang ; Ahmadzadeh, Ali... - p. 4900-4901 , 2022
 
?
3

Discovery of Rare yet Co-occurring Actions with Temporal Ch..:

, In: 2022 International Conference on Computer Communications and Networks (ICCCN),
Werner, Gordon ; Yang, Shanchieh - p. 1-10 , 2022
 
?
4

ACM KDD AI4Cyber: The 1st Workshop on Artificial Intelligen..:

, In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining,
Samtani, Sagar ; Yang, Shanchieh ; Chen, Hsinchun - p. 4153-4154 , 2021
 
?
5

Session-level Adversary Intent-Driven Cyberattack Simulator:

, In: 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT),
 
?
6

Session-level adversary intent-driven cyberattack simulator:

, In: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications,
 
?
7

Dissecting Cyberadversarial Intrusion Stages via Interdisci..:

, In: Proceedings of the Sixth International Workshop on Security and Privacy Analytics,
 
?
8

Estimation of cyber network risk using rare event simulatio:

Krall, Alexander L ; Kuhl, Michael E ; Yang, Shanchieh J
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.  19 (2020)  1 - p. 37-55 , 2020
 
?
9

Time series forecasting of cyber attack intensity:

, In: Proceedings of the 12th Annual Conference on Cyber and Information Security Research,
 
?
11

Energy efficient data retrieval for networked multi-mode wi..:

, In: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks,
 
?
12

The Road Towards Autonomous Cybersecurity Agents: Remedies ..:

, In: Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science,
Drašar, Martin ; Ruman, Ádám ; Čeleda, Pavel. - p. 738-749 , 2024
 
?
13

Unraveling Network-Based Pivoting Maneuvers: Empirical Insi..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime,
 
?
14

Learning About the Adversary:

, In: Advances in Information Security; Autonomous Intelligent Cyber Defense Agent (AICA),
 
?
15

Are Existing Out-Of-Distribution Techniques Suitable for Ne..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
 
1-15