No photo of Danny Yuxing Huang

Danny Yuxing Huang

Assistant Professor

    20112022

    Research activity per year

    If you made any changes in Pure these will be visible here soon.

    Search results

    • 2022

      Alexa, Who Am i Speaking To? Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa

      Major, D., Huang, D. Y., Chetty, M. & Feamster, N., Feb 2022, In: ACM Transactions on Internet Technology. 22, 1, 3446389.

      Research output: Contribution to journalArticlepeer-review

    • 2020

      IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale

      Huang, D. Y., Apthorpe, N., Li, F., Acar, G. & Feamster, N., Jun 15 2020, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 4, 2, 46.

      Research output: Contribution to journalArticlepeer-review

    • 2019

      Selling a single item with negative externalities to regulate production or payments?

      Chattopadhyay, T., Feamster, N., Ferreira, M. V. X., Huang, D. Y. & Matthew Weinberg, S., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 196-206 11 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

      Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

      Open Access
    • 2018

      Estimating Profitability of Alternative Cryptocurrencies (Short Paper)

      Huang, D. Y., Levchenko, K. & Snoeren, A. C., 2018, Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Revised Selected Papers. Meiklejohn, S. & Sako, K. (eds.). Springer Verlag, p. 409-419 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10957 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Tracking Ransomware End-to-end

      Huang, D. Y., Aliapoulios, M. M., Li, V. G., Invernizzi, L., Bursztein, E., McRoberts, K., Levin, J., Levchenko, K., Snoeren, A. C. & McCoy, D., Jul 23 2018, Proceedings - 2018 IEEE Symposium on Security and Privacy, SP 2018. Institute of Electrical and Electronics Engineers Inc., p. 618-631 14 p. 8418627. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2018-May).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Web-based attacks to discover and control local IoT devices

      Acar, G., Huang, D. Y., Li, F., Narayanan, A. & Feamster, N., Aug 7 2018, IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 29-35 7 p. (IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2017

      Backpage and bitcoin: Uncovering human traffickers

      Portnoff, R. S., Huang, D. Y., Doerfler, P., Afroz, S. & McCoy, D., Aug 13 2017, KDD 2017 - Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 1595-1604 10 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. Part F129685).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • Pinning down abuse on Google maps

      Huang, D. Y., Grundman, D., Thomas, K., Kumar, A., Bursztein, E., Levchenko, K. & Snoeren, A. C., 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 1471-1479 9 p. 3052590. (26th International World Wide Web Conference, WWW 2017).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2016

      Stressing out: Bitcoin “stress testing”

      Baqer, K., Huang, D. Y., McCoy, D. & Weaver, N., 2016, Financial Cryptography and Data Security - International Workshops, FC 2016, BITCOIN, VOTING, and WAHC, Revised Selected Papers. Rohloff, K., Clark, J., Meiklejohn, S., Wallach, D., Brenner, M. & Ryan, P. Y. A. (eds.). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9604 LNCS).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2013

      High-fidelity switch models for software-defined network emulation

      Huang, D. Y., Yocum, K. & Snoeren, A. C., 2013, HotSDN 2013 - Proceedings of the 2013 ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. p. 43-48 6 p. (HotSDN 2013 - Proceedings of the 2013 ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    • 2011

      Managing distributed applications using gush

      Albrecht, J. & Huang, D. Y., 2011, Testbeds and Research Infrastructures - Development of Networks and Communities - 6th International Conference, TridentCom 2010, Revised Selected Papers. p. 401-411 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 46).

      Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Your message has successfully been sent.
    Your message was not sent due to an error.