Yuan Tian
Yuan Tian
Assistant Professor, University of Virginia
Verified email at virginia.edu - Homepage
Title
Cited by
Cited by
Year
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1462014
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
972017
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
562015
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
352017
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy, 2019
332019
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
312015
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
262019
All your screens are belong to us: attacks exploiting the html5 screen sharing api
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
2014 IEEE Symposium on Security and Privacy, 34-48, 2014
152014
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
132014
Unlocin: Unauthorized location inference on smartphones without being caught
L Nguyen, Y Tian, S Cho, W Kwak, S Parab, Y Kim, P Tague, J Zhang
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
132013
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
12*2017
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
112017
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks
YS Kim, Y Tian, LT Nguyen, P Tague
2014 IEEE Conference on Communications and Network Security, 427-435, 2014
112014
Resistance is not futile: Detecting ddos attacks without packet inspection
AP Athreya, X Wang, YS Kim, Y Tian, P Tague
International Workshop on Information Security Applications, 174-188, 2013
102013
Steganalysis of the MP3 steganographic algorithm based on Huffman coding
K Deng, R Zhang, Y Tian, X Yu, X Niu, Y Yang
2010 International Conference on Intelligent Computing and Integrated …, 2010
92010
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
72014
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
arXiv preprint arXiv:1908.07000, 2019
52019
StopGuessing: Using Guessed Passwords to Thwart Online Guessing
S Schechter, Y Tian, C Herley
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 576-589, 2019
52019
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th {USENIX} Security Symposium ({USENIX} Security 19), 1537-1555, 2019
52019
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos
Hotmobile, 2018
5*2018
The system can't perform the operation now. Try again later.
Articles 1–20