Yuan Tian
Yuan Tian
Assistant Professor, University of Virginia
Verified email at virginia.edu - Homepage
Cited by
Cited by
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
All your screens are belong to us: attacks exploiting the html5 screen sharing api
Y Tian, YC Liu, A Bhosale, LS Huang, P Tague, C Jackson
2014 IEEE Symposium on Security and Privacy, 34-48, 2014
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
Unlocin: Unauthorized location inference on smartphones without being caught
L Nguyen, Y Tian, S Cho, W Kwak, S Parab, Y Kim, P Tague, J Zhang
2013 International Conference on Privacy and Security in Mobile Systems …, 2013
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks
YS Kim, Y Tian, LT Nguyen, P Tague
2014 IEEE Conference on Communications and Network Security, 427-435, 2014
Resistance is not futile: Detecting ddos attacks without packet inspection
AP Athreya, X Wang, YS Kim, Y Tian, P Tague
International Workshop on Information Security Applications, 174-188, 2013
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th {USENIX} Security Symposium ({USENIX} Security 20), 1327-1344, 2020
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th {USENIX} Security Symposium ({USENIX} Security 19), 1537-1555, 2019
IVD: Automatic Learning and Enforcement of Authorization
P Marinescu, C Parry, M Pomarole, Y Tian, P Tague, I Papagiannis
Security and Privacy (SP), 2017 IEEE Symposium on, 2017
Steganalysis of the MP3 steganographic algorithm based on Huffman coding
K Deng, R Zhang, Y Tian, X Yu, X Niu, Y Yang
2010 International Conference on Intelligent Computing and Integrated …, 2010
StopGuessing: Using Guessed Passwords to Thwart Online Guessing
S Schechter, Y Tian, C Herley
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 576-589, 2019
Privatedroid: Private browsing mode for android
SM Kywe, C Landis, Y Pei, J Satterfield, Y Tian, P Tague
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps
Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos
Hotmobile, 2018
The system can't perform the operation now. Try again later.
Articles 1–20