Obserwuj
Yuan Tian
Tytuł
Cytowane przez
Cytowane przez
Rok
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
2242017
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
204*2019
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1922014
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
722015
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
632017
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
562019
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th USENIX Security Symposium (USENIX Security 20), 1327-1344, 2020
492020
CryptGPU: Fast privacy-preserving machine learning on the GPU
S Tan, B Knott, Y Tian, DJ Wu
2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021
442021
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
382015
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
232014
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
22*2017
PolicyQA: A reading comprehension dataset for privacy policies
WU Ahmad, J Chi, Y Tian, KW Chang
arXiv preprint arXiv:2010.02557, 2020
192020
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
WWW, 2020
192020
Oauthlint: an empirical study on oauth bugs in android applications
T Al Rahat, Y Feng, Y Tian
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
192019
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
182017
StopGuessing: Using guessed passwords to thwart online guessing
S Schechter, Y Tian, C Herley
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 576-589, 2019
162019
Privacy partition: A privacy-preserving framework for deep neural networks in edge networks
J Chi, E Owusu, X Yin, T Yu, W Chan, Y Liu, H Liu, J Chen, S Sim, ...
2018 IEEE/ACM Symposium on Edge Computing (SEC), 378-380, 2018
162018
All your screens are belong to us: attacks exploiting the html5 screen sharing api
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
2014 IEEE Symposium on Security and Privacy, 34-48, 2014
162014
Unlocin: Unauthorized location inference on smartphones without being caught
L Nguyen, Y Tian, S Cho, W Kwak, S Parab, Y Kim, P Tague, J Zhang
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
162013
Curse or redemption? how data heterogeneity affects the robustness of federated learning
S Zawad, A Ali, PY Chen, A Anwar, Y Zhou, N Baracaldo, Y Tian, F Yan
Proceedings of the AAAI Conference on Artificial Intelligence 35 (12), 10807 …, 2021
152021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20