Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 375 | 2016 |
Systems and methods for detection of infected websites X Wang, K Yuan, X Liao, RA Beyah US Patent 10,880,330, 2020 | 180 | 2020 |
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating L Xing, X Pan, R Wang, K Yuan, XF Wang 2014 IEEE Symposium on Security and Privacy, 393-408, 2014 | 173 | 2014 |
Leave me alone: App-level protection against runtime information gathering on android N Zhang, K Yuan, M Naveed, X Zhou, XF Wang 2015 IEEE Symposium on Security and Privacy, 915-930, 2015 | 118 | 2015 |
Understanding iot security through the data crystal ball: Where we are now and where we are going to be N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ... arXiv preprint arXiv:1703.09809, 2017 | 83 | 2017 |
Understanding the dark side of domain parking S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang 23rd USENIX Security Symposium (USENIX Security 14), 207-222, 2014 | 81 | 2014 |
Efficient ciphertext-policy attribute based encryption with hidden policy X Li, D Gu, Y Ren, N Ding, K Yuan Internet and Distributed Computing Systems: 5th International Conference …, 2012 | 68 | 2012 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 67 | 2019 |
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces K Yuan, H Lu, X Liao, XF Wang 27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018 | 65 | 2018 |
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ... 2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016 | 50 | 2016 |
Demystifying hidden privacy settings in mobile apps Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ... 2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019 | 44 | 2019 |
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah NDSS, 2018 | 24 | 2018 |
Catching predators at watering holes: finding and understanding strategically compromised websites S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 23 | 2016 |
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 23 | 2016 |
External resource control of mobile devices X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter US Patent 10,685,142, 2020 | 11 | 2020 |
Cloud repository as a malicious service: challenge, identification and implication X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah Cybersecurity 1, 1-18, 2018 | 9 | 2018 |
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter NDSS, 2015 | 9 | 2015 |
A novel method for power analysis based on combinational logic in block cipher circuit Z GUO, D GU, K YUAN, J LIU, Y HE Chinese Journal of Electronics 23 (1), 151-156, 2014 | 5 | 2014 |
A Highly Efficient Correlation Power Analysis on PRINT Cipher K Yuan, D Gu, Z Guo, S Bao 2012 Eighth International Conference on Computational Intelligence and …, 2012 | 5 | 2012 |
Understanding iot security through the data crystal ball: Where we are now and where weare going to be N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ... Scanning Electron Microsc Meet at, 2017 | 1 | 2017 |