I am currently leading the threat detection and analytics engineering team at Zoom where we are responsible for detecting internal and external threats to Zoom as well as building and maintaining robust security data pipelines and storage. Prior to that, I led the security analytics team at Pepsico for almost three years -- we were a team of engineers, developers and data scientists that utilized a data-driven approach to advance Pepsico’s threat detection and response capabilities.
Before Pepsico, I spent six years as a senior security researcher at BAE Systems Applied Intelligence, researching and developing security solutions for commercial customers. I received both my Master's and Ph.D. degree in Computer Science and Engineering from the University of Michigan, Ann Arbor. I also earned double Bachelor's degree in Computer Science and Economics from Peking University.
Contact: Linkedin
Identifying Email Threats Using Predictive Analysis
Yuanyuan Grace Zeng
Proceedings of the 3rd International Conference on Cyber Security and Protection of Digital Services,
June 19-20, 2017 (Cyber Security' 2017), London, UK
How Vulnerable are Unprotected Machines on the Internet?
Yuanyuan Grace Zeng, David Coffey and John Viega
Proceedings of the 15th Passive and Active Measurement Conference,
March 10-11, 2014 (PAM' 14), Los Angeles (Acceptance ratio: 24/76=31.6%)
On Detection of Current and Next-Generation Botnets
Yuanyuan Zeng
Ph.D. Dissertation, University of Michigan, 2011
Can Open WiFi Networks be Lethal Weapons for Botnets?
Matthew Knysz, Xin Hu, Yuanyuan Zeng and Kang G. Shin
Proceedings of the 31th Annual IEEE Conference on Computer Communications, Mini-Conference,
March 25-30, 2012 (INFOCOM' 12), Orlando, Florida
Design of SMS Commanded-and-Controlled and P2P-Structured Mobile Botnets
Yuanyuan Zeng, Kang G. Shin and Xin Hu
Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
April 16-18, 2012 (WiSec' 12), Tucson, Arizona (Acceptance ratio: 17/63=27.0%)
University of Michigan Technical Report CSE-TR-562-10
Measuring the Effectiveness of Infrastructure-Level Detection of Large-Scale Botnets
Yuanyuan Zeng, Guanhua Yan, Stephan Eidenbenz and Kang G. Shin
Proceedings of 19th ACM/IEEE International Workshop on Quality of Service,
June 6-7, 2011 (IWQoS' 11), San Jose (Acceptance ratio: 23/80=28.8%)
How to Construct a Mobile Botnet?
Yuanyuan Zeng, Xin Hu and Kang G. Shin
Abstract at 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks,
June 28-July 1, 2010 (DSN' 10), Chicago
Detection of Botnets Using Combined Host- and Network-Level Information
Yuanyuan Zeng, Xin Hu and Kang G. Shin
Proceedings of 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks,
June 28-July 1, 2010 (DSN' 10), Chicago (Acceptance ratio: 39/170 = 22.9%)
Poster abstract at 16th ACM Conference on Computer and Communications Security (CCS' 09), Chicago
Containment of Network Worms via Per-Process Rate-Limiting
Yuanyuan Zeng, Xin Hu, Abhijit Bose, Haixiong Wang, Kang G. Shin
Proceedings of 4th International Conference on Security and Privacy in Communication Networks,
Sep 22-25, 2008 (SecureComm' 08), Istanbul, Turkey (full paper, Acceptance ratio: 26/123=21.1%)
Professional Services
Reviewer for ACM MSWiM 2010, MILCOM 2010, IEEE GLOBECOM 2011, MILCOM 2011, MILCOM 2012, Journal of Computer Networks: Special Issue on Botnets 2012, IEEE Security & Privacy 2013-2015, Elsevier Journal of Computers and Security 2017.
Financial Institution Threat Reports (I was the lead author of the biannual reports from 2012 to 2014)
InfoSecurity Magazine, CSO, eWeek, American Banker
Research
Mobile botnets: Dark Reading
MLB malvertising: eSecurity Planet
General Commentaries
PC Magazine: Game of Thrones Torrents are Perfect for Delivering Malware
TechNewsWorld: Twitter Learns How to Do the 2-Step
E-Commerce Times: Millions of Livingsocial Users Now Prime Phishing Targets
IT Business Edge: Apple Lockout Shows Importance of Device Passcodes
TechNewsWorld: Spammers Quick to Exploit eBay Breach