Name
Affiliation
Papers
SHANCHIEH JAY YANG
Department of Computer Engineering, Rochester Institute of Technology, Rochester, NY
36
Collaborators
Citations 
PageRank 
48
131
23.11
Referers 
Referees 
References 
379
516
229
Search Limit
100516
Title
Citations
PageRank
Year
Towards an Efficient Detection of Pivoting Activity00.342021
Enabling Visual Analytics via Alert-driven Attack Graphs10.352021
Near real-time intrusion alert aggregation using concept-based learning10.352021
On the Variety and Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks00.342020
ASSERT: attack synthesis and separation with entropy redistribution towards predictive cyber defense.10.382019
Synthetic Intrusion Alert Generation through Generative Adversarial Networks00.342019
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features00.342019
CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags00.342019
Differentiating and Predicting Cyberattack Behaviors Using LSTM00.342018
Extracting and Evaluating Similar and Unique Cyber Attack Strategies from Intrusion Alerts00.342018
Forecasting Cyber Attacks with Imbalanced Data Sets and Different Time Granularities.00.342018
Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences.00.342018
Forecasting cyberattacks with incomplete, imbalanced, and insignificant data.20.382018
POSTER: Cyber Attack Prediction of Threats from Unconventional Resources (CAPTURE).10.362017
Modeling Information Sharing Behavior on Q&A Forums.00.342017
Predicting cyber attacks with bayesian networks using unconventional signals20.392017
Privacy Sensitive Resource Access Monitoring for Android Systems20.452015
Non-independent Cascade Formation: Temporal and Spatial Effects30.402014
Probabilistic Inference for Obfuscated Network Attack Sequences40.422014
Segmenting Large-Scale Cyber Attacks for Online Behavior Model Generation.20.392014
Who Will Follow a New Topic Tomorrow?00.342014
NRE: Suppress Selective Forwarding attacks in Wireless Sensor Networks20.392014
Sequential modeling for obfuscated network attack action sequences.10.372013
Introduction to the special section on social computing, behavioral-cultural modeling, and prediction00.342013
Who shall we follow in twitter for cyber vulnerability?40.682013
Optimizing collection requirements through analysis of plausible impact00.342011
Discovering collaborative cyber attack patterns using social network analysis40.492011
Characterizing Transition Behaviors in Internet Attack Sequences40.522011
Social Computing, Behavioral-Cultural Modeling and Prediction - 4th International Conference, SBP 2011, College Park, MD, USA, March 29-31, 2011. Proceedings468.152011
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary).60.452010
Toward Ensemble Characterization and Projection of Multistage Cyber Attacks110.682010
Clustering of multistage cyber attacks using significant services.20.402010
Toward unsupervised classification of non-uniform cyber attack tracks10.372009
FuSIA: Future Situation and Impact Awareness.141.042008
Real-time fusion and Projection of network intrusion activity.30.442008
Enhancing both network and user performance for networks supporting best effort traffic140.872004