Yuan Tian
Yuan Tian
Assistant Professor, University of Virginia
Verified email at virginia.edu - Homepage
TitleCited byYear
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
IEEE Symposium on Security and Privacy, 2019
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
All your screens are belong to us: attacks exploiting the html5 screen sharing api
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
2014 IEEE Symposium on Security and Privacy, 34-48, 2014
Resistance is not futile: Detecting ddos attacks without packet inspection
AP Athreya, X Wang, YS Kim, Y Tian, P Tague
International Workshop on Information Security Applications, 174-188, 2013
Unlocin: Unauthorized location inference on smartphones without being caught
L Nguyen, Y Tian, S Cho, W Kwak, S Parab, Y Kim, P Tague, J Zhang
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks
YS Kim, Y Tian, LT Nguyen, P Tague
2014 IEEE Conference on Communications and Network Security, 427-435, 2014
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
Steganalysis of the MP3 steganographic algorithm based on Huffman coding
K Deng, R Zhang, Y Tian, X Yu, X Niu, Y Yang
2010 International Conference on Intelligent Computing and Integrated …, 2010
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
Dangerous Skills: Understanding and Mitigating Security Risks of Voice …, 2019
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos
Hotmobile, 2018
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
IVD: Automatic Learning and Enforcement of Authorization
P Marinescu, C Parry, M Pomarole, Y Tian, P Tague, I Papagiannis
Security and Privacy (SP), 2017 IEEE Symposium on, 2017
The Activity Platform
HJ Wang, A Moshchuk, H Gamon, Michael, Mona, S Iqbal, E Brown, ...
HotOS, 2015
Poster: LAPWiN: Location-Aided Probing in Wi-Fi Networks
YS Kim, Y Tian, LT Nguyen, P Tague
IEEE Symposium on Security & Privacy, San Francisco, 2013
The system can't perform the operation now. Try again later.
Articles 1–20