Dawn Xiaodong Song


Ontology type: schema:Person     


Person Info

NAME

Dawn Xiaodong

SURNAME

Song

Publications in SciGraph latest 50 shown

  • 2020-11-26 A Principled Approach to Data Valuation for Federated Learning in FEDERATED LEARNING
  • 2019-10-23 Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations in HETEROGENEOUS DATA MANAGEMENT, POLYSTORES, AND ANALYTICS FOR HEALTHCARE
  • 2019-08-01 Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation in ADVANCES IN CRYPTOLOGY – CRYPTO 2019
  • 2018-10-06 Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation in COMPUTER VISION – ECCV 2018
  • 2018-10-06 Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms in COMPUTER VISION – ECCV 2018
  • 2016-08-31 On Scaling Decentralized Blockchains in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2013 Juxtapp: A Scalable System for Detecting Code Reuse among Android Applications in DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
  • 2013 HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism in COMPUTER SECURITY – ESORICS 2013
  • 2013 Automatic Malware Analysis, An Emulator Based Approach in NONE
  • 2013 Understanding Mobile App Usage Patterns Using In-App Advertisements in PASSIVE AND ACTIVE MEASUREMENT
  • 2013 Data-Confined HTML5 Applications in COMPUTER SECURITY – ESORICS 2013
  • 2012-06-05 Stimuli for Gaze Based Intrusion Detection in FUTURE INFORMATION TECHNOLOGY, APPLICATION, AND SERVICE
  • 2012-04-11 Recognizing malicious software behaviors with tree automata inference in FORMAL METHODS IN SYSTEM DESIGN
  • 2012 Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies in PUBLIC KEY CRYPTOGRAPHY – PKC 2012
  • 2012 Privacy-Preserving Stream Aggregation with Fault Tolerance in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2012 Optimal Lower Bound for Differentially Private Multi-party Aggregation in ALGORITHMS – ESA 2012
  • 2011 Malware Analysis with Tree Automata Inference in COMPUTER AIDED VERIFICATION
  • 2011 A Systematic Analysis of XSS Sanitization in Web Application Frameworks in COMPUTER SECURITY – ESORICS 2011
  • 2010 A Learning-Based Approach to Reactive Security in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2010 Private and Continual Release of Statistics in AUTOMATA, LANGUAGES AND PROGRAMMING
  • 2010 Signatures of Reputation in FINANCIAL CRYPTOGRAPHY AND DATA SECURITY
  • 2010 HookScout: Proactive Binary-Centric Hook Detection in DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
  • 2009-09-30 Cyber SA: Situational Awareness for Cyber Defense in CYBER SITUATIONAL AWARENESS
  • 2009 Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration in RECENT ADVANCES IN INTRUSION DETECTION
  • 2008 BitBlaze: A New Approach to Computer Security via Binary Analysis in INFORMATION SYSTEMS SECURITY
  • 2008 BinHunt: Automatically Finding Semantic Differences in Binary Programs in INFORMATION AND COMMUNICATIONS SECURITY
  • 2008-01-01 Automatically Identifying Trigger-based Behavior in Malware in BOTNET DETECTION
  • 2007-01-01 Sting: An End-to-End Self-Healing System for Defending against Internet Worms in MALWARE DETECTION
  • 2007 Distributed Evasive Scan Techniques and Countermeasures in DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT
  • 2006 Behavioral Distance Measurement Using Hidden Markov Models in RECENT ADVANCES IN INTRUSION DETECTION
  • 2006 Paragraph: Thwarting Signature Learning by Training Maliciously in RECENT ADVANCES IN INTRUSION DETECTION
  • 2006 Behavioral Distance for Intrusion Detection in RECENT ADVANCES IN INTRUSION DETECTION
  • 2005 Privacy-Preserving Set Operations in ADVANCES IN CRYPTOLOGY – CRYPTO 2005
  • 2004-01-01 Key Distribution Techniques for Sensor Networks in WIRELESS SENSOR NETWORKS
  • 2004 Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds in RECENT ADVANCES IN INTRUSION DETECTION
  • 2004 Private Keyword-Based Push and Pull with Applications to Anonymous Communication in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2003 Quasi-Efficient Revocation of Group Signatures in FINANCIAL CRYPTOGRAPHY
  • 2002-02-08 Homomorphic Signature Schemes in TOPICS IN CRYPTOLOGY — CT-RSA 2002
  • 2001-07-04 AGVI — Automatic Generation, Verification, and Implementation of Security Protocols in COMPUTER AIDED VERIFICATION
  • JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "affiliation": [
          {
            "affiliation": {
              "id": "http://www.grid.ac/institutes/grid.47840.3f", 
              "type": "Organization"
            }, 
            "isCurrent": true, 
            "type": "OrganizationRole"
          }, 
          {
            "id": "http://www.grid.ac/institutes/grid.147455.6", 
            "type": "Organization"
          }
        ], 
        "familyName": "Song", 
        "givenName": "Dawn Xiaodong", 
        "id": "sg:person.01143152610.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
        ], 
        "sdDataset": "persons", 
        "sdDatePublished": "2022-01-01T19:57", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/person/person_832.jsonl", 
        "type": "Person"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/person.01143152610.86'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/person.01143152610.86'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/person.01143152610.86'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/person.01143152610.86'


     




    Preview window. Press ESC to close (or click here)


    ...