Implicit authentication through learning user behavior E Shi, Y Niu, M Jakobsson, R Chow Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 400 | 2011 |
Authentication in the clouds: a framework and its application to mobile users R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010 | 212 | 2010 |
Spam double-funnel: Connecting web spammers with advertisers YM Wang, M Ma, Y Niu, H Chen Proceedings of the 16th international conference on World Wide Web, 291-300, 2007 | 133 | 2007 |
A Quantitative Study of Forum Spamming Using Context-based Analysis. Y Niu, H Chen, F Hsu, YM Wang, M Ma NDSS, 2007 | 129 | 2007 |
Remedying web hijacking: Notification effectiveness and webmaster comprehension F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016 | 81 | 2016 |
iPhish: Phishing Vulnerabilities on Consumer Electronics. Y Niu, F Hsu, H Chen UPSEC 8, 10, 2008 | 61 | 2008 |
Five years of the right to be forgotten T Bertram, E Bursztein, S Caro, H Chao, R Chin Feman, P Fleischer, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 41 | 2019 |
Gesture authentication with touch input for mobile devices Y Niu, H Chen Security and Privacy in Mobile Information and Communication Systems: Third …, 2012 | 35 | 2012 |
Three years of the Right to be Forgotten T Bertram, E Bursztein, S Caro, H Chao, RC Feman, P Fleischer, ... Google, Inc, 1-17, 2018 | 20 | 2018 |
Strider honeymonkeys: Active, client-side honeypots for finding malicious websites YM Wang, Y Niu, H Chen, D Beck, X Jiang, R Roussev, C Verbowski, ... See http://research. microsoft. com/users/shuochen/HM. PDF, 2007 | 5 | 2007 |
Visual preference authentication Y Niu, M Jakobsson, G Rydstedt, D Tamir na, 2012 | 3 | 2012 |
Solutions to the Problem R Chow, E Shi, M Jakobsson, P Golle, R Masuoka, J Molina, Y Niu, ... The Death of the Internet, 245-329, 2012 | | 2012 |
Navigating the Malweb: Authentication Schemes for Mobile Devices Y Niu University of California, Davis, 2011 | | 2011 |
Spam double-funnel YM Wang, M Ma, Y Niu, H Chen Proceedings of the 16th international conference on World Wide Web, 2007 | | 2007 |
Hao Chen GM Hsu, Y Niu, Y Rong, R Stevens, M Van Gundy, J Vronsky University of California, Berkeley 8, 2004-06, 1998 | | 1998 |
Automated Discovery of Functional Aspects in Imperative Programs C Franke, Y Niu, D Zinn | | |