Shanchieh Yang

Shanchieh Yang

Professor
Kate Gleason College of Engineering
Computer Engineering

2017 Submissions

Journal Paper

Moskal, Stephen, Shanchieh Jay Yang, and Michael Kuhl. "Cyber Threat Assessments via Attack Scenario Simulation over Integrated Adversary and Network Models." Journal of Defense Modeling and Simulation 15. 1 (2018): 13-29. Print. *

Published Conference Proceedings

Chan, Neil Wong Hon and Shanchieh Jay Yang. "SCANNER: Sequence Clustering of Android Resource Accesses." Proceedings of the IEEE Conference on Dependable and Secure Computing. Ed. IEEE. Taipei, Taiwan: IEEE, 2017. Print. *

Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Modeling Information Sharing Behavior on Q&A Forums." Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Ed. ACM. Jeju, South Korea: ACM, 2017. Print. «

Werner, Gordon, Shanchieh Jay Yang, and Katie McConky. "Time Series Forecasting of Cyber Attack Intensity." Proceedings of the 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print. *

Okutan, Ahmet, Shanchieh Jay Yang, and Katie McConky. "Predicting Cyber Attacks with Bayesian Networks Using Unconventional Signals." Proceedings of the 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print. *

2016 Submissions

Published Conference Proceedings

Krall, Alex, et al. "Estimating the Likelihood of Cyber Attack Penetration using Rare-Event Simulation." Proceedings of the IEEE Symposium Series on Computational Intelligence. Athens, Greece: IEEE, 2016. Print. *

Peer Reviewed/Juried Poster Presentation or Conference Paper

Yang, Shanchieh, et al. "CASCADES: Modeling and Simulation of Cyber Attacker Behaviors for Network Threat Analysis." Proceedings of the 2016 Annual Computer Security Applications Conference (ACSAC). Ed. N/A. Los Angeles, CA: n.p.. *

Yang, Shanchieh and Neil Wong Hon Chan. "SCANNER: Sequence Clustering of Android Resource Accesses." Proceedings of the 2016 Annual Computer Security Applications Conference (ACSAC). Los Angeles, CA: n.p.. *

Yang, Shanchieh. "Towards Automatic Extraction and Synthesis of Cyber Attack Behavior Models." Proceedings of the USENIX Security. Austin, TX: USENIX. £

2015 Submissions

Book Chapter

Holsopple, Jared, S. J. Yang, and M. Sudit. "Mission Impact Assessment for Cyber Warfare." Intelligent Methods for Cyber Warfare. Ed. R. R. Yager, M. Z. Reformat, and N. Alajlan. NA, Switzerland: Springer International Publishing, 2015. 239-266. Print. ∆

Du, Haito, et al. "Cyber Insider Mission Detection for Situation Awareness." Intelligent Methods for Cyber Warfare. Ed. R. R. Yager, M. Z. Reformat, and N. Alajlan. NA, Switzerland: Springer International Publishing, 2015. 201-218. Print. ∆

Published Conference Proceedings

Zhao, L., et al. "Privacy Sensitive Resource Access Monitoring for Android Systems." Proceedings of the 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), in conjunction with IEEE ICCCN 2015, August 3-6, 2015, Las Vegas, Nevada, USA. Ed. NA. Piscataway, New Jersey: IEEE, Web. *

2014 Submissions

Book Chapter

Yang, Shanchieh Jay, et al. "Attack Projection for Predictive Cyber Situation Awareness." Cyber Defense and Situational Awareness Advances in Information Security Volume 62. Ed. Alexander Kott, Cliff Wang, and Robert F. Erbacher. Unknown, Switzerland: Springer, 2014. 239-261. Print. £

Holsopple, Jared, Shanchieh Jay Yang, and Moises Sudit. "Top-down Driven Cyber Impact Assessment." Cyber Defense and Situational Awareness Advances in Information Security Volume 62. Ed. Alexander Kott, Cliff Wang, and Robert F. Erbacher. Unknown, Switzerland: Springer, 2014. 219-238. Print. £

Published Conference Proceedings

Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Non-independent Cascade Formation: Temporal and Spatial Effects (Short Paper)." Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM14). Ed. Unknown. Shanghai, China: ACM, 2014. Print. «

Cui, Biru and Shanchieh Jay Yang. "NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks." Proceedings of the IEEE Conference on Communications and Network Security (CNS14). Ed. Unknown. San Francisco, CA: IEEE, 2014. Print. ˜

Moskal, Steven, et al. "Context Model Fusion for Multistage Network Attack Simulation." Proceedings of the IEEE Military Communications Conference (MILCOM14). Ed. Unknown. Baltimore, MD: IEEE, 2014. Print. ˜

Du, Haitao and Shanchieh Jay Yang. "Probabilistic Inference for Obfuscated Network Attack Sequences." Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN14). Ed. Unknown. Atlanta, GA: IEEE, 2014. Print. «

Strapp, Steven and Shanchieh Jay Yang. "Segmenting Large-scale Cyber Attacks for Online Behavior Model Generation." Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print. ˜

Cui, Biru and Shanchieh Jay Yang. "Who Will Follow a New Topic Tomorrow?" Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print. ˜

2013 Submissions

Book Chapter

Du, Haitao and Shanchieh Jay Yang. "Temporal and Spatial Analyses of Large Scale Cyber Attacks." Handbook of Computational Approaches to Counterterrorism. Ed. V.S. Subrahmanian. New York, NY: Springer, 2013. 559-578. Print. ∆ £

Published Conference Proceedings

Moskal, Stephen, et al. "Simulating Attack Behaviors in Enterprise Networks." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web. *

Cui, Biru, Shanchieh Jay Yang, and Ivan Kadar. "Influence versus Intent for Predictive Analytics in Situation Awareness." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print. *

Du, Haitao and Shanchieh Jay Yang. "Sequential Modeling for Obfuscated Network Attack Action Sequences." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web. *

Cheng, R.G., et al. "Design and Implementation of a Skype Protocol Analyzer." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web. *

Blasch, Erik P., et al. "Summary of Human Social, Cultural, Behavioral (HSCB) Modeling for Information Fusion Panel Discussion." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print. £

Invited Keynote/Presentation

Yang, Shanchieh Jay. "Characterizing Attack Behavior for Cyber Situation Awareness." International Conference on Cyber Security. Fordham University and FBI. New York, NY. 10 Jan. 2012. Conference Presentation. ∆

Yang, Shanchieh Jay. "Characterizing Large-scale Attack Behavior for Predictive Cyber Situation Awareness." SPIE Defense, Security, and Sensing Symposium. SPIE. Baltimore, MD. 25 Apr. 2012. Conference Presentation. ∆

2011 Submissions

Published Conference Proceedings

Du, Haitao and Shanchieh Jay Yang. "Characterizing Transition Behaviors in Internet Attack Sequences." Proceedings of the IEEE International Conference on Computer Communication Networks, Maui, HI USA, August 1-4, 2011. Ed. George Rouskas and Xiaobo Zhou. Red Hook, NY: IEEE, Print. *

Tong, Khiem, et al. "Optimizing Collection Requirements Through Analysis of Plausible Impact." Proceedings of the ISIF/IEEE International Conference on Information Fusion, July 5-8, 2011, Chicago IL, USA,. Ed. Lance Kaplan and Neil Gordon. Chicago, IL: IEEE, Web. *

Du, Haitao and Shanchieh Jay Yang. "Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis." Proceedings of the 2011 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP11), Mach 29-31, College Park, MD. Ed. John Salerno, et al. USA: Springer LNCS, Print. *

Invited Keynote/Presentation

Yang, Shanchieh Jay. "Characterizing Attack Behavior for Cyber Situation Awareness." Invited Seminar. SUNY Binghamton. SUNY Binghamton, Binghamton, NY. 29 Nov. 2011. Guest Lecture. ∆

Yang, Shanchieh Jay. "Cyber Situation Awareness and Threat Anticipation." Taiwan. National Taiwan University. NTU campus, Taipei, Taiwan. 20 Jan. 2011. Guest Lecture. ∆

Yang, Shanchieh Jay. "Characterizing Hacker Behavior for Cyber Situation Awareness." The 11th Emerging Information and Technology Conference, July 28-29, Chicago IL. EITC. Chicago, Chicago, IL. 28 Aug. 2011. Conference Presentation. ∆

2010 Submissions

Published Article

Holsopple, Jared, Michael Nusinov, Daniel Liu, Haitao Du, Shanchieh Yang, and Moises Sudit. “Enhancing Situation Awareness via Automated Situation Assessment.” IEEE Communication Magazine, 48.3 (2010): 146-152. Web. "  *

Du, Haitao, Daniel Liu, Jared Holsopple, and Shanchieh Yang. “Toward Ensemble Characterization and Projection of Multistage Cyber Attacks.” Proceedings of 19th International Conference on Computer Communications and Networks (IEEE ICCCN), 2-5 Aug. 2010. n.p. Print. "  *