Danny Yuxing Huang

Orcid: 0000-0002-1794-6105

Affiliations:
  • New York University, NY, USA


According to our database1, Danny Yuxing Huang authored at least 29 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Personalizing Smart Home Privacy Protection With Individuals' Regulatory Focus: Would You Preserve or Enhance Your Information Privacy?
CoRR, 2024

2023
Augmented Reality's Potential for Identifying and Mitigating Home Privacy Leaks.
CoRR, 2023

Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.
Proceedings of the 32nd USENIX Security Symposium, 2023

Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate Partner Surveillance with Covert Devices.
Proceedings of the 32nd USENIX Security Symposium, 2023

In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Behind the Scenes: Uncovering TLS and Server Certificate Practice of IoT Device Vendors in the Wild.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Uncovering Privacy and Security Challenges In K-12 Schools.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Alexa, Who Am I Speaking To?: Understanding Users' Ability to Identify Third-Party Apps on Amazon Alexa.
ACM Trans. Internet Techn., 2022

SkillBot: Identifying Risky Content for Children in Alexa Skills.
ACM Trans. Internet Techn., 2022

Software Update Practices on Smart Home IoT Devices.
CoRR, 2022

Inferring Software Update Practices on Smart Home IoT Devices Through User Agent Analysis.
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022

Challenges in inferring privacy properties of smart devices: towards scalable multi-vantage point testing methods.
Proceedings of the 3rd International CoNEXT Student Workshop, 2022

"It would probably turn into a social faux-pas": Users' and Bystanders' Preferences of Privacy Awareness Mechanisms in Smart Homes.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2020
IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

2019
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping.
Proc. Priv. Enhancing Technol., 2019

Selling a Single Item with Negative Externalities.
Proceedings of the World Wide Web Conference, 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Tracking Ransomware End-to-end.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Web-based Attacks to Discover and Control Local IoT Devices.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Estimating Profitability of Alternative Cryptocurrencies (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Using Crypto-currencies to Measure Financial Activities and Uncover Potential Identities of Actors Involved.
PhD thesis, 2017

Pinning Down Abuse on Google Maps.
Proceedings of the 26th International Conference on World Wide Web, 2017

Backpage and Bitcoin: Uncovering Human Traffickers.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

2016
Stressing Out: Bitcoin "Stress Testing".
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Framing Dependencies Introduced by Underground Commoditization.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

2014
Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
High-fidelity switch models for software-defined network emulation.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

2010
Managing Distributed Applications Using Gush.
Proceedings of the Testbeds and Research Infrastructures. Development of Networks and Communities, 2010


  Loading...