See no evil: phishing for permissions with false transparency GS Tuncay, J Qian, CA Gunter 29th USENIX Security Symposium (USENIX Security 20), 415-432, 2020 | 22 | 2020 |
A survey on common threats in npm and pypi registries B Kaplan, J Qian Deployable Machine Learning for Security Defense: Second International …, 2021 | 18 | 2021 |
Dedos: Defusing dos with dispersion oriented software HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ... Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 13 | 2018 |
A survey on sentiment classification in face recognition J Qian Journal of Physics: Conference Series 960 (1), 012030, 2018 | 8 | 2018 |
Attacks on visualization-based malware detection: Balancing effectiveness and executability H Benkraouda, J Qian, HQ Tran, B Kaplan International Workshop on Deployable Machine Learning for Security Defense …, 2021 | 4 | 2021 |
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ... Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017 | 4 | 2017 |
A Tagging Solution to Discover IoT Devices in Apartments B Kaplan, IJ Lopez-Toledo, C Gunter, J Qian Proceedings of the 39th Annual Computer Security Applications Conference …, 2023 | | 2023 |
Designing and Evaluating a Testbed for the Matter Protocol: Insights into User Experience R Mangar, J Qian, W Zegeye, A AlRabah, B Civjan, S Sundram, S Yuan, ... | | |