Research articles, presentations, and other scholarship

Recent Submissions

  • Comprehensive off-target analysis of dCas9-SAM-mediated HIV reactivation via long noncoding RNA and mRNA profiling 

    Zhang, Yonggang; Arango, Gustavo; Li, Fang; Xiao, Xiao; Putatunda, Raj; Yu, Jun; Yang, Xiao-Feng; Wang, Hong; Watson, Layne T; Zhang, Liqing; Hu, Wenhui (2018-09-10)
    Abstract Background CRISPR/CAS9 (epi)genome editing revolutionized the field of gene and cell therapy. Our previous study demonstrated that a rapid and robust reactivation of ...
  • Computational Identification of Tissue-Specific Splicing Regulatory Elements in Human Genes from RNA-Seq Data 

    Badr, Eman; ElHefnawi, Mahmoud; Heath, Lenwood S. (PLOS, 2016-11-18)
    Alternative splicing is a vital process for regulating gene expression and promoting proteomic diversity. It plays a key role in tissue-specific expressed genes. This specificity is mainly regulated by splicing factors ...
  • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

    Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
    We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
  • Personal Anomaly Detection and Smart-Phone Security 

    Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
    Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
  • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

    Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
    The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
  • A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

    Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
    The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
  • User-Centric Dependence Analysis For Identifying Malicious Mobile Apps 

    Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G. (IEEE, 2012)
    This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
  • Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation 

    Rahaman, Sazzadur; Cheng, Long; Yao, Danfeng (Daphne); Li, He; Park, Jung-Min (Jerry) (De Gruyter Open, 2017)
    Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
  • DIMPL: a distributed in-memory drone flight path builder system 

    Shukla, Manu; Chen, Zhiqian; Lu, Chang-Tien (2018-07-12)
    Abstract Drones are increasingly being used to perform risky and labor intensive aerial tasks cheaply and safely. To ensure operating costs are low and flights autonomous, their flight plans must be pre-built. ...
  • Co-located Collaborative Play in Virtual Environments for Group Learning in Museums 

    Apostolellis, Panagiotis (ACM, 2014-06)
    Having witnessed the unexplored potential of co-located group collaboration in contemporary museums, the proposed research aims to identify which elements of collaborative virtual environments and serious games can be ...
  • Designing for Schadenfreude (or, how to express well-being and see if youʼre boring people) 

    André, Paul; Schraefel, M.C.; Dix, Alan; White, Ryen W.; Bernstein, Michael; Luther, Kurt (ACM, 2010)
    This position paper presents two studies of content not normally expressed in status updates—well-being and status feedback—and considers how they may be processed, valued and used for potential quality-of-life benefits ...
  • CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations 

    Singh, Divit P.; Lisle, Lee; Murali, T.M.; Luther, Kurt (ACM, 2018-04)
    Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

    Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
    Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
  • Social Turing Tests: Crowdsourcing Sybil Detection 

    Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
  • Detecting Malicious Landing Pages in Malware Distribution Networks 

    Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
    Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
  • HOMER: An Interactive System for Home Based Stroke Rehabilitation 

    Kelliher, Aisling; Choi, Jinwoo; Huang, Jia-Bin; Rikakis, Thanassis; Kitani, Kris (ACM, 2017)
    Delivering long term, unsupervised stroke rehabilitation in the home is a complex challenge that requires robust, low cost, scalable, and engaging solutions. We present HOMER, an interactive system that uses novel therapy ...
  • Got the Flu (or Mumps)? Check the Eigenvalue! 

    Prakash, B. Aditya; Chakrabarti, Deepayan; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos (Virginia Tech, 2010-03-30)
    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal ...
  • Forecasting the Flu: Designing Social Network Sensors for Epidemics 

    Shao, Huijuan; Hossain, K.S.M. Tozammel; Wu, Hao; Khan, Maleq; Vullikanti, Anil; Prakash, B. Aditya; Marathe, Madhav; Ramakrishnan, Naren (Virginia Tech, 2016-03-08)
    Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to ...
  • Identification of Differentially Methylated Sites with Weak Methylation Effects 

    Tran, Hong; Zhu, Hongxiao; Wu, Xiaowei; Kim, Gunjune; Clarke, Christopher R.; Larose, Hailey; Haak, David C.; Askew, Shawn D.; Barney, Jacob N.; Westwood, James H.; Zhang, Liqing (MDPI, 2018-02-08)
    Deoxyribonucleic acid (DNA) methylation is an epigenetic alteration crucial for regulating stress responses. Identifying large-scale DNA methylation at single nucleotide resolution is made possible by whole genome bisulfite ...
  • Predicting Complications in Critical Care Using Heterogeneous Clinical Data 

    Huddar, Vijay; Desiraju, Bapu Koundinya; Rajan, Vaibhav; Bhattacharya, Sakyajit; Roy, Shourya; Reddy, Chandan K. (IEEE, 2016-10-19)
    Patients in hospitals, particularly in critical care, are susceptible to many complications affecting morbidity and mortality. Digitized clinical data in electronic medical records can be effectively used to develop machine ...

View more