Chan, Neil Wong Hon and Shanchieh Jay Yang. "SCANNER: Sequence Clustering of Android Resource Accesses." Proceedings of the IEEE Conference on Dependable and Secure Computing. Ed. IEEE. Taipei, Taiwan: IEEE, 2017. Print.
Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Modeling Information Sharing Behavior on Q&A Forums." Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Ed. ACM. Jeju, South Korea: ACM, 2017. Print.
Werner, Gordon, Shanchieh Jay Yang, and Katie McConky. "Time Series Forecasting of Cyber Attack Intensity." Proceedings of the 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print.
Okutan, Ahmet, Shanchieh Jay Yang, and Katie McConky. "Predicting Cyber Attacks with Bayesian Networks Using Unconventional Signals." Proceedings of the 12th Annual Conference on Cyber and Information Security Research. Ed. ACM. Oak Ridge, TN: ACM, 2017. Print.
Krall, Alex, et al. "Estimating the Likelihood of Cyber Attack Penetration using Rare-Event Simulation." Proceedings of the IEEE Symposium Series on Computational Intelligence. Athens, Greece: IEEE, 2016. Print.
Zhao, L., et al. "Privacy Sensitive Resource Access Monitoring for Android Systems." Proceedings of the 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), in conjunction with IEEE ICCCN 2015, August 3-6, 2015, Las Vegas, Nevada, USA. Ed. NA. Piscataway, New Jersey: IEEE, Web.
Cui, Biru, Shanchieh Jay Yang, and Chris Homan. "Non-independent Cascade Formation: Temporal and Spatial Effects (Short Paper)." Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM14). Ed. Unknown. Shanghai, China: ACM, 2014. Print.
Cui, Biru and Shanchieh Jay Yang. "NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks." Proceedings of the IEEE Conference on Communications and Network Security (CNS14). Ed. Unknown. San Francisco, CA: IEEE, 2014. Print.
Moskal, Steven, et al. "Context Model Fusion for Multistage Network Attack Simulation." Proceedings of the IEEE Military Communications Conference (MILCOM14). Ed. Unknown. Baltimore, MD: IEEE, 2014. Print.
Du, Haitao and Shanchieh Jay Yang. "Probabilistic Inference for Obfuscated Network Attack Sequences." Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN14). Ed. Unknown. Atlanta, GA: IEEE, 2014. Print.
Strapp, Steven and Shanchieh Jay Yang. "Segmenting Large-scale Cyber Attacks for Online Behavior Model Generation." Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print.
Cui, Biru and Shanchieh Jay Yang. "Who Will Follow a New Topic Tomorrow?" Proceedings of the 2014 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP14). Ed. William G. Kennedy, Nitin Agarwal, and Shanchieh Jay Yang. Washington, DC: Springer, 2014. Print.
Moskal, Stephen, et al. "Simulating Attack Behaviors in Enterprise Networks." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Cui, Biru, Shanchieh Jay Yang, and Ivan Kadar. "Influence versus Intent for Predictive Analytics in Situation Awareness." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print.
Du, Haitao and Shanchieh Jay Yang. "Sequential Modeling for Obfuscated Network Attack Action Sequences." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Cheng, R.G., et al. "Design and Implementation of a Skype Protocol Analyzer." Proceedings of the IEEE Communications and Network Security. Ed. Wenjing Lou and Wade Trappe. Washington, DC: IEEE, 2013. Web.
Blasch, Erik P., et al. "Summary of Human Social, Cultural, Behavioral (HSCB) Modeling for Information Fusion Panel Discussion." Proceedings of the SPIE Symposium on Defense, Security and Sensing, Vol. 8745. Ed. Ivan Kadar. Baltimore, MD: SPIE, 2013. Print.
Du, Haitao and Shanchieh Jay Yang. "Characterizing Transition Behaviors in Internet Attack Sequences." Proceedings of the IEEE International Conference on Computer Communication Networks, Maui, HI USA, August 1-4, 2011. Ed. George Rouskas and Xiaobo Zhou. Red Hook, NY: IEEE, Print.
Tong, Khiem, et al. "Optimizing Collection Requirements Through Analysis of Plausible Impact." Proceedings of the ISIF/IEEE International Conference on Information Fusion, July 5-8, 2011, Chicago IL, USA,. Ed. Lance Kaplan and Neil Gordon. Chicago, IL: IEEE, Web.
Du, Haitao and Shanchieh Jay Yang. "Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis." Proceedings of the 2011 International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction (SBP11), Mach 29-31, College Park, MD. Ed. John Salerno, et al. USA: Springer LNCS, Print.