Seungyeop Han
Seungyeop Han
Rubrik, Inc.
Verified email at cs.washington.edu - Homepage
TitleCited byYear
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ...
ACM Transactions on Computer Systems (TOCS) 32 (2), 5, 2014
33932014
Tor Instead of IP
V Liu, S Han, A Krishnamurthy, T Anderson
1856*2011
Analysis of topological characteristics of huge online social networking services
YY Ahn, S Han, H Kwak, S Moon, H Jeong
Proceedings of the 16th international conference on World Wide Web, 835-844, 2007
12052007
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
P Hornyack, S Han, J Jung, S Schechter, D Wetherall
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2672011
Sslshader: cheap ssl acceleration with commodity processors
K Jang, S Han, S Han, S Moon, K Park
Proceedings of the 8th USENIX conference on Networked systems design and …, 2011
1902011
Mcdnn: An approximation-based execution framework for deep stream processing under resource constraints
S Han, H Shen, M Philipose, S Agarwal, A Wolman, A Krishnamurthy
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
1162016
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
R Bhoraskar, S Han, J Jeon, T Azim, S Chen, J Jung, S Nath, R Wang, ...
Usenix Security, 2014
1062014
Collaborative verification of information flow for a high-assurance app store
MD Ernst, R Just, S Millstein, W Dietl, S Pernsteiner, F Roesner, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
912014
Exploring cyberbullying and other toxic behavior in team competition online games
H Kwak, J Blackburn, S Han
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
772015
Structured learning of Gaussian graphical models
K Mohan, M Chung, S Han, D Witten, SI Lee, M Fazel
Advances in neural information processing systems, 620-628, 2012
592012
Short paper: enhancing mobile application permissions with runtime feedback and constraints
J Jung, S Han, D Wetherall
Proceedings of the second ACM workshop on Security and privacy in …, 2012
582012
Collaborative blog spam filtering using adaptive percolation search
S Han, YY Ahn, S Moon, H Jeong
Proceedings of the Workshop on the Weblogging Ecosystem, 2006
452006
Facilitating development of a spoken natural language interface
YC Ju, M Philipose, S Han
US Patent 9,330,659, 2016
432016
Privacy Revelations for Web and Mobile Apps.
D Wetherall, DR Choffnes, B Greenstein, S Han, P Hornyack, J Jung, ...
HotOS, 2011
392011
A Study of Third-Party Tracking by Mobile Apps in the Wild
S Han, J Jung, D Wetherall
352012
MetaSync: File Synchronization Across Multiple Untrusted Storage Services
S Han, H Shen, T Kim, A Krishnamurthy, T Anderson, D Wetherall
USENIX ATC, 2015
322015
Expressive Privacy Control with Pseudonyms
S Han, V Liu, Q Pu, S Peter, T Anderson, A Krishnamurthy, D Wetherall
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013
282013
Accelerating ssl with gpus
K Jang, S Han, S Han, S Moon, KS Park
ACM SIGCOMM Computer Communication Review 41 (4), 437-438, 2011
282011
Fast video classification via adaptive cascading of deep models
H Shen, S Han, M Philipose, A Krishnamurthy
Proceedings of the IEEE conference on computer vision and pattern …, 2017
222017
GlimpseData: Towards continuous vision-based personal analytics
S Han, R Nandakumar, M Philipose, A Krishnamurthy, D Wetherall
Proceedings of the 2014 workshop on physical analytics, 31-36, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20