Yuan Tian
Yuan Tian
Assistant Professor, University of Virginia
Verified email at virginia.edu - Homepage
Cited by
Cited by
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy, 2019
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
All your screens are belong to us: attacks exploiting the html5 screen sharing api
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
2014 IEEE Symposium on Security and Privacy, 34-48, 2014
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
Unlocin: Unauthorized location inference on smartphones without being caught
L Nguyen, Y Tian, S Cho, W Kwak, S Parab, Y Kim, P Tague, J Zhang
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks
YS Kim, Y Tian, LT Nguyen, P Tague
2014 IEEE Conference on Communications and Network Security, 427-435, 2014
Resistance is not futile: Detecting ddos attacks without packet inspection
AP Athreya, X Wang, YS Kim, Y Tian, P Tague
International Workshop on Information Security Applications, 174-188, 2013
Steganalysis of the MP3 steganographic algorithm based on Huffman coding
K Deng, R Zhang, Y Tian, X Yu, X Niu, Y Yang
2010 International Conference on Intelligent Computing and Integrated …, 2010
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
arXiv preprint arXiv:1908.07000, 2019
StopGuessing: Using Guessed Passwords to Thwart Online Guessing
S Schechter, Y Tian, C Herley
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 576-589, 2019
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th {USENIX} Security Symposium ({USENIX} Security 19), 1537-1555, 2019
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos
Hotmobile, 2018
The system can't perform the operation now. Try again later.
Articles 1–20