Articles with public access mandates - Kan YuanLearn more
Available somewhere: 9
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Mandates: US National Science Foundation
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
Mandates: US National Science Foundation, US Department of Defense
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
Mandates: US National Science Foundation, US Department of Defense
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
Mandates: US National Science Foundation, National Natural Science Foundation of China
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
Mandates: US National Science Foundation, US Department of Defense, Chinese Academy of …
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
Mandates: US National Science Foundation, US Department of Defense
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Mandates: US National Science Foundation
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Mandates: US National Science Foundation
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1, 1-18, 2018
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program