Obserwuj
Kan Yuan
Kan Yuan
Indiana University Computer Science Department
Zweryfikowany adres z indiana.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
NDSS, 2015
3882015
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2272016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
1562014
Leave me alone: App-level protection against runtime information gathering on android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy, 915-930, 2015
992015
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd USENIX Security Symposium (USENIX Security 14), 207-222, 2014
742014
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
632017
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
International Conference on Internet and Distributed Computing Systems, 146-159, 2012
592012
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
402016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
382019
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
342018
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
182016
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
172016
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
152019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
152018
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent 10,685,142, 2020
92020
A novel method for power analysis based on combinational logic in block cipher circuit
Z GUO, D GU, K YUAN, J LIU, Y HE
Chinese Journal of Electronics 23 (1), 151-156, 2014
52014
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1 (1), 1-18, 2018
42018
A Highly Efficient Correlation Power Analysis on PRINT Cipher
K Yuan, D Gu, Z Guo, S Bao
2012 Eighth International Conference on Computational Intelligence and …, 2012
42012
Understanding iot security through the data crystal ball: Where we are now and where weare going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
Scanning Electron Microsc Meet at, 2017
32017
Systems and Methods for Detection of Infected Websites
X Wang, K Yuan, X Liao, RA Beyah
2020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20