Kan Yuan
Kan Yuan
Indiana University Computer Science Department
Verified email at indiana.edu
TitleCited byYear
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
1142014
Leave me alone: App-level protection against runtime information gathering on android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy, 915-930, 2015
622015
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
492016
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd {USENIX} Security Symposium ({USENIX} Security 14), 207-222, 2014
452014
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
International Conference on Internet and Distributed Computing Systems, 146-159, 2012
332012
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
202017
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
152016
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
82016
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
52016
A novel method for power analysis based on combinational logic in block cipher circuit
Z GUO, D GU, K YUAN, J LIU, Y HE
Chinese Journal of Electronics 23 (1), 151-156, 2014
32014
A Highly Efficient Correlation Power Analysis on PRINT Cipher
K Yuan, D Gu, Z Guo, S Bao
2012 Eighth International Conference on Computational Intelligence and …, 2012
32012
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit …, 2019
22019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
22018
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent App. 15/983,093, 2018
2018
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1 (1), 14, 2018
2018
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent App. 15/547,402, 2018
2018
Reading Thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th {USENIX} Security Symposium ({USENIX} Security 18), 1027-1041, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–17