Student Publication and Presentation

  • Yichao Xu, “An improvement for the DCC in ITS-G5 to alleviate the influences of DoS attack,” ISI TR-01, April 2023.
  • Matthew Shonman, Xiaoyu Shi, Mingqing Kang, Zuo Wang, Xiangyang Li, and Anton Dahbura, “Using a Computational Cognitive Model to Understand Phishing Classification Decisions,” The 35th International BCS Human-Computer Interaction Conference (British HCI-2022), Keele University, Keele, Staffordshire, UK, July 11-13, 2022. (Spring-Fall 2019 Project)
  • Qi Cheng, Anyi Xu, Xiangyang Li, and Leah Ding, “Adversarial Email Generation against Spam Detection Models through Feature Perturbation,” The 2022 IEEE International Conference on Assured Autonomy (ICAA’22), Virtual Event, March 22-23, 2022. (Fall 2021 Project)
  • Chenran Wang, Danyi Zhang, Suye Huang, Xiangyang Li, and Leah Ding, “Crafting Adversarial Email Content against Machine Learning Based Spam Email Detection,” In Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems (ASSS ’21) with AsiaCCS 2021, Hong Kong, June 7, 2021. (Fall 2020 Project)
  • Bo Hui, Yuchen Yang, Haolin Yuan, Philippe Burlina, Neil Zhenqiang Gong, and Yinzhi Cao, “Practical Blind Membership Inference Attack via Differential Comparisons,” The Network and Distributed System Security Symposium (NDSS), February 2021. (Fall 2020 Project)
  • Shane Sartalamacchia, Richard Bradt, Karan Dhareshwar, Harsimar Bagga, William H. Robinson, Lanier Watkins, Aviel Rubin, “Defending Against Consumer Drone Privacy Attacks: A Blueprint For A Counter Autonomous Drone Tool”, NDSS Workshop on Decentralized IoT Systems and Security (DISS 2020), February 2020.
  • Honghao GuoZuo WangBenfang Wang, Xiangyang Li, and Devu Shila, “Fooling A Deep-Learning Based Gait Behavioral Biometric System,” The Workshop on Assured Autonomous Systems (WAAS) with the IEEE Symposium on Security and Privacy (SP), May 21, 2020. (Fall 2019 Project)
  • Jingchi ZhangYu-Tsern Jou, and Xiangyang Li, “Cross-Site Scripting (XSS) Detection Integrating Evidences in Multiple Stages,” Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea, Hawaii, January 8-11, 2019. (Spring 2018 Project)
  • Haoruo Zhang, Digvijay Singh, and Xiangyang Li, “Augmenting Authentication with Context-Specific Behavioral Biometrics,” Hawaii International Conference on System Sciences (HICSS-52), Grand Wailea, Hawaii, January 8-11, 2019. (Fall 2017 Project)
  • Supriya Muthal, Sen Li, Yuan Huang, Xiangyang Li, Nathan Bos, Anton Dahbura, and Kylie Molinaro, A Phishing Study of User Behavior with Incentive and Informed intervention, National Cyber Summit’17, Huntsville, Alabama, June 7-8, 2017. (Fall 2016-Spring 2017 Project)
  • Chanyang Shin,  Prerit Chandok,  Ran Liu,  Seth Nielson, Timothy Leschke, “iThings-154,” The 10th IEEE International Conference on Internet of Things (iThings-2017), Exeter, England, UK, June 21-23, 2017. (Spring 2017 Project)
  • Nikunj Malik, Jayanarayan Chandramouli,  Prahlad Suresh, Kevin D. Fairbanks, Lanier Watkins, and William H. Robinson, “Using Network Traffic To Verify Mobile Device Forensic Artifacts,” The IEEE Consumer Communications & Networking Conference, January 2017. (Spring 2017 Project)
  • Jayanarayan Chandramouli,  Juan Ramos, Lakshmi Srinivasan, Prahlad Suresh, Garth V. Crosby, and Lanier Watkins, “Using Network Traffic to Infer Compromised Neighbors in Wireless Sensor Nodes,” The IEEE Consumer Communications & Networking Conference Workshop, January 2017. (Spring 2017 Project)
  • Lanier Watkins, Sean Beck, Jared Zook, Anna Buczak, Jeffery Chavis, William H. Robinson, Jose A. Morales, and Sameul Mishra, “Using Semi-supervised Machine Learning to Address the Big Data Problem in DNS Networks,” The IEEE Computing and Communication Workshop and Conference, January 2017. (Spring 2017 Project)
  • Lanier Watkins, John Hurley, Shuang Xie, and Tianning Yang, “Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications”, Journal of Information Warfare (JIW), October 2016. (Fall 2016 Project)
  • Rahul Nair, Chinmohan Nayak, Kashif Memon, Lanier Watkins, Kevin Fairbanks, and William H. Robinson, “The Resource Usage Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System”, Cybersecurity for Industry 4.0: Analysis for Design and Manufacturing, (edited by Lane Thames and Dirk Schafer), Springer, 2017. (Spring 2016 Project)
  • Rahul Nair, Chinmohan Nayak, Kashif Memon, Lanier Watkins, Kevin Fairbanks, and William H. Robinson,”An Inference-Based Industrial Control System (ICS) Intrusion Detection Prototype”,Malware Technical Exchange Meeting (MTEM), June 2016.  (Spring 2016 Project)
  • Michael Hooper , Yifan Tian, Runzuan Zhou, Bin Cao, Adrian P. Lauf, Lanier Watkins, William H. Robinson, Wlajimir Alexis, “Securing Commercial WiFi-Based UAVs From Common Security Attacks,” MilCom 2016, Baltimore, MD, November 1-3, 2016. (Fall 2015 Project)
  • Yiyuan Hu, Xiangyang Li, and Xenia Mountrouidou, Improving Covert Storage Channel Analysis with SDN and Experimentation on GENI, National Cyber Summit’16, Huntsville, Alabama, June 7-9, 2016. (Fall 2015 Project)
  • Lanier Watkins, Kurt Silberberg, Jose A Morales, and William H. Robinson, “Using Inherent Command and Control Vulnerabilities To Halt DDoS Attacks,” In IEEE Proceedings of the International Conference on Malicious and Unwanted Software (MALCON), October 2015. (Spring 2015 Project)
  • Georgios Lontorfos, Kevin D Fairbanks, Lanier Watkins, and William H. Robinson, “Remotely Inferring Device Manipulation of Industrial Control Systems Via Network Behavior,” In Proceedings of IEEE Workshop on Network Measurements (WNM), October 2015. (Fall 2014 Project)
  • Heng Song and Xiangyang Li, “Collaborative Detection of Covert Storage Channels,” MilCom 2016, Baltimore, MD, November 1-3, 2016. (Fall 2014 Project)
  • Fangyue Chen, Yunke Wang, Heng Song, and Xiangyang Li, “A Statistical Study of Covert Timing Channels Using Network Packet Frequency,” IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), Baltimore, May 2015. (Spring 2014 Project)
  • Christina Kawka, Benjamin Schmidt, Lanier Watkins, Cherita Corbett, and Kevin Fairbanks, “Fighting Banking Trojans: The Offensive Tactical Reconnaissance (OTR) Platform,” Malware Technical Exchange Meeting (MTEM) 2014, July 2014. (Spring 2014 Project)
  • Mengchao Yue, William H. Robinson, Lanier Watkins, and Cherita Corbett, “Constructing Timing-Based Covert Channels in Mobile Networks by Adjusting CPU Frequency,” Hardware and Architectural Support for Security and Privacy (HASP 2014) / The 41st International Symposium on Computer Architecture (ISCA 2014), June 2014. (Fall 2013 Project)
  • Matthew Brocker and Steve Checkoway, “iSeeYou: Disabling the MacBook Webcam Indicator LED,” In K. Fu, ed. Proceedings of USENIX Security 2014. USENIX, August 2014. (Spring 2013 Project)

JHU Information Security Institute