default search action
Yuan Tian 0001
Person information
- affiliation: University of California, Los Angeles, CA, USA
- affiliation: University of Virginia, Charlottesville, VA, USA
- affiliation (former): Carnegie Mellon University, Pittsburgh, PA, USA
Other persons with the same name
- Yuan Tian — disambiguation page
- Yuan Tian 0002 — University of Texas at Dallas, TX, USA
- Yuan Tian 0003 — King Saud University, Riyadh, Saudi Arabia (and 1 more)
- Yuan Tian 0004 — Auburn University, Auburn, AL, USA
- Yuan Tian 0005 — Dalian Maritime University, School of Science, Dalian, China (and 2 more)
- Yuan Tian 0006 — Peking University, Beijing, China
- Yuan Tian 0008 — Queen's University, Kingston, Canada (and 1 more)
- Yuan Tian 0009 — Harbin Engineering University, College of Information and Communication Engineering, China
- Yuan Tian 0010 — Shanghai Jiao Tong University, Department of Electrical Engineering, China (and 1 more)
- Yuan Tian 0011 — Shanghai Jiao Tong University, State Key Laboratory of Mechanical System and Vibration, China
- Yuan Tian 0012 — University of Paris-Saclay, France
- Yuan Tian 0013 — Zhengzhou University, Zhengzhou, China
- Yuan Tian 0014 — ETH Zürich, Switzerland
- Yuan Tian 0015 — Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan National Laboratory for Optoelectronics, Wuhan, China (and 1 more)
- Yuan Tian 0016 — Jilin University, School of Artificial Intelligence, International Center of Future Science, Key Laboratory of Symbolic Computation and Knowledge Engineering, Changchun, China
- Yuan Tian 0017 — Shanghai Jiao Tong University, Key Laboratory of Artificial Intelligence, AI Institute, Shanghai, China
- Yuan Tian 0018 — Beijing University of Posts and Telecommunications, School of Artificial Intelligence, Beijing, China (and 2 more)
- Yuan Tian 0019 — Pennsylvania State University, Department of Computer Science and Engineering, University Park, PA, USA
- Yuan Tian 0020 — Bosch Research and Technology Center North America, USA (and 1 more)
- Yuan Tian 0021 — Shandong University, School of Qilu Transportation, Jinan, China (and 1 more)
- Yuan Tian 0022 — University of Nottingham, UK
- Yuan Tian 0023 — University of Saskatchewan, Department of Computer Science, Saskatoon, Canada (and 1 more)
- Yuan Tian 0024 — Victoria University of Wellington, New Zealand (and 1 more)
- Yuan Tian 0025 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Key Laboratory of Ecosystem Network Observation and Modeling, Beijing, China
- Yuan Tian 0026 — State Grid Hebei Electric Power Co., Ltd., Electric Power Research Institute, Shijiazhuang, China
- Yuan Tian 0027 — Xinyang University, School of Education, Xinyang, China
- Yuan Tian 0028 — University of South China, School of Electrical Engineering, Hengyang, China (and 1 more)
- Yuan Tian 0029 — Beihang University, Beijing, China
- Yuan Tian 0030 — Harbin Institute of Technology, School of Management, Harbin, China
- Yuan Tian 0031 — University of Science and Technology Beijing, School of Civil and Resource Engineering, Beijing, China (and 1 more)
- Yuan Tian 0032 — Technische Universität Berlin, Department of Mixed Signal Circuit Design Chair, Berlin, Germany
- Yuan Tian 0033 — KU Leuven, Department of Materials Engineering, Leuven, Belgium
- Yuan Tian 0034 — Wuhan University, State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing, Wuhan, China
- Yuan Tian 0035 — Chongqing University of Science and Technology, College of Intelligent Technology and Engineering, Chongqing, China (and 2 more)
- Yuan Tian 0036 — Dalian University of Technology, School of Software, Dalian, China
- Yuan Tian 0037 — Jingchu University of Technology, School of Electronics Information, Jingmen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b1]Yuan Tian:
Privacy Preserving Information Sharing in Modern and Emerging Platforms. Carnegie Mellon University, USA, 2018
Journal Articles
- 2024
- [j9]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Trans. Dependable Secur. Comput. 21(3): 1372-1389 (2024) - [j8]Yan Meng, Jiachun Li, Haojin Zhu, Yuan Tian, Jiming Chen:
Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces. IEEE Trans. Dependable Secur. Comput. 21(4): 2900-2916 (2024) - 2023
- [j7]Faysal Hossain Shezan, Minjun Long, David Hasani, Gang Wang, Yuan Tian:
SenRev: Measurement of Personal Information Disclosure in Online Health Communities. Proc. Priv. Enhancing Technol. 2023(3): 233-251 (2023) - 2022
- [j6]Xiaoyang Xie, Zhiqing Hong, Zhou Qin, Zhihan Fang, Yuan Tian, Desheng Zhang:
TransRisk: Mobility Privacy Risk Prediction based on Transferred Knowledge. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 82:1-82:19 (2022) - [j5]Tu Le, Danny Yuxing Huang, Noah J. Apthorpe, Yuan Tian:
SkillBot: Identifying Risky Content for Children in Alexa Skills. ACM Trans. Internet Techn. 22(3): 79:1-79:31 (2022) - 2021
- [j4]John A. Stankovic, Homa Alemzadeh, Brad Campbell, John C. Lach, Lu Feng, Cody H. Fleming, Jonathan L. Goodall, Toluwalogo Odumosu, Daniel Quinn, Yuan Tian, Kelley Tobler:
A Graduate Curriculum in Cyber-Physical Systems. IEEE Des. Test 38(3): 112-120 (2021) - 2020
- [j3]Yuan Tian, Cormac Herley, Stuart E. Schechter:
StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing. IEEE Secur. Priv. 18(3): 38-47 (2020) - [j2]Yeonjoon Lee, Yue Zhao, Jiutian Zeng, Kwangwuk Lee, Nan Zhang, Faysal Hossain Shezan, Yuan Tian, Kai Chen, XiaoFeng Wang:
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 16:1-16:28 (2020) - [j1]Faysal Hossain Shezan, Hang Hu, Gang Wang, Yuan Tian:
VerHealth: Vetting Medical Voice Applications through Policy Enforcement. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 153:1-153:21 (2020)
Conference and Workshop Papers
- 2024
- [c62]Tu Le, Dongfang Zhao, Zihao Wang, XiaoFeng Wang, Yuan Tian:
Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run Time. ICSE (SEIS) 2024: 34-45 - [c61]Kunlin Cai, Jinghuai Zhang, Zhiqing Hong, William Shand, Guang Wang, Desheng Zhang, Jianfeng Chi, Yuan Tian:
Where Have You Been? A Study of Privacy Risk for Point-of-Interest Recommendation. KDD 2024: 175-186 - [c60]Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - [c59]Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans:
SoK: Pitfalls in Evaluating Black-Box Attacks. SaTML 2024: 387-407 - [c58]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. SP 2024: 2310-2387 - [c57]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. USENIX Security Symposium 2024 - 2023
- [c56]Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang:
PLUE: Language Understanding Evaluation Benchmark for Privacy Policies in English. ACL (2) 2023: 352-365 - [c55]Arup Kumar Sarker, Md. Khairul Islam, Yuan Tian, Geoffrey C. Fox:
MVAM: Multi-variant Attacks on Memory for IoT Trust Computing. CPS-IoT Week Workshops 2023: 13-18 - [c54]Peiyi Yang, Jie Fan, Zice Wei, Haoqian Li, Tu Le, Yuan Tian:
Towards Usable Parental Control for Voice Assistants. CPS-IoT Week Workshops 2023: 43-48 - [c53]Md. Rizwan Parvez, Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang:
Retrieval Enhanced Data Augmentation for Question Answering on Privacy Policies. EACL 2023: 201-210 - [c52]Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. EuroS&P 2023: 1030-1046 - [c51]Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu, Xuemin Sherman Shen:
MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging. INFOCOM 2023: 1-10 - [c50]Faysal Hossain Shezan, Zihao Su, Mingqing Kang, Nicholas Phair, Patrick William Thomas, Michelangelo van Dam, Yinzhi Cao, Yuan Tian:
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph. NDSS 2023 - [c49]Fnu Suya, Xiao Zhang, Yuan Tian, David Evans:
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners? NeurIPS 2023 - [c48]McKenna McCall, Eric Zeng, Faysal Hossain Shezan, Mitchell Yang, Lujo Bauer, Abhishek Bichhawat, Camille Cobb, Limin Jia, Yuan Tian:
Towards Usable Security Analysis Tools for Trigger-Action Programming. SOUPS 2023: 301-320 - [c47]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - 2022
- [c46]Jianfeng Chi, Jian Shen, Xinyi Dai, Weinan Zhang, Yuan Tian, Han Zhao:
Towards Return Parity in Markov Decision Processes. AISTATS 2022: 1161-1178 - [c45]Tamjid Al Rahat, Yu Feng, Yuan Tian:
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations. CCS 2022: 2459-2473 - [c44]Jianfeng Chi, William Shand, Yaodong Yu, Kai-Wei Chang, Han Zhao, Yuan Tian:
Conditional Supervised Contrastive Learning for Fair Text Classification. EMNLP (Findings) 2022: 2736-2756 - [c43]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. ISSTA 2022: 442-454 - [c42]Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:
ML-FEED: Machine Learning Framework for Efficient Exploit Detection. TPS-ISA 2022: 140-149 - [c41]Yan Meng, Jiachun Li, Matthew Pillari, Arjun Deopujari, Liam Brennan, Hafsah Shamsie, Haojin Zhu, Yuan Tian:
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers. USENIX Security Symposium 2022: 1077-1094 - [c40]Tamjid Al Rahat, Minjun Long, Yuan Tian:
Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR. WPES@CCS 2022: 89-102 - 2021
- [c39]Syed Zawad, Ahsan Ali, Pin-Yu Chen, Ali Anwar, Yi Zhou, Nathalie Baracaldo, Yuan Tian, Feng Yan:
Curse or Redemption? How Data Heterogeneity Affects the Robustness of Federated Learning. AAAI 2021: 10807-10814 - [c38]Wasi Uddin Ahmad, Jianfeng Chi, Tu Le, Thomas Norton, Yuan Tian, Kai-Wei Chang:
Intent Classification and Slot Filling for Privacy Policies. ACL/IJCNLP (1) 2021: 4402-4417 - [c37]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem. DSN Workshops 2021: 7-14 - [c36]Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon, Han Zhao:
Understanding and Mitigating Accuracy Disparity in Regression. ICML 2021: 1866-1876 - [c35]Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian:
Model-Targeted Poisoning Attacks with Provable Convergence. ICML 2021: 10000-10010 - [c34]John A. Stankovic, Tu Le, Abdeltawab M. Hendawi, Yuan Tian:
Hardware/Software Security Patches for the Internet of Things. SMARTCOMP 2021: 240-245 - [c33]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. SP 2021: 1021-1038 - [c32]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. USENIX Security Symposium 2021: 4205-4222 - 2020
- [c31]Wasi Uddin Ahmad, Jianfeng Chi, Yuan Tian, Kai-Wei Chang:
PolicyQA: A Reading Comprehension Dataset for Privacy Policies. EMNLP (Findings) 2020: 743-749 - [c30]Faysal Hossain Shezan, Kaiming Cheng, Zhen Zhang, Yinzhi Cao, Yuan Tian:
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications. NDSS 2020 - [c29]Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon:
Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation. NeurIPS 2020 - [c28]Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian:
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. USENIX Security Symposium 2020: 1327-1344 - [c27]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432 - [c26]Tu Le, Ingy Elsayed-Aly, Weizhao Jin, Seunghan Ryu, Guy Verrier, Tamjid Al Rahat, B. Brian Park, Yuan Tian:
Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks. VEHITS 2020: 37-44 - [c25]Faysal Hossain Shezan, Hang Hu, Jiamin Wang, Gang Wang, Yuan Tian:
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems. WWW 2020: 1006-1017 - 2019
- [c24]Stuart E. Schechter, Yuan Tian, Cormac Herley:
StopGuessing: Using Guessed Passwords to Thwart Online Guessing. EuroS&P 2019: 576-589 - [c23]Xu Zhang, Wanguo Wang, Xinrui Li, Bin Liu, Yuan Tian:
Flame and Smoke Detection in Substation Based on Wavelet Analysis and Convolution Neural Network. ICIAI 2019: 248-252 - [c22]Tamjid Al Rahat, Yu Feng, Yuan Tian:
OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications. ASE 2019: 293-304 - [c21]Yonghua Yu, Changyang Li, Mainuddin Ahmad Jonas, Chuanhao Ma, Faysal Hossain Shezan, Siyuan Shen, Peng Gao, Yuan Tian:
Detecting Abnormal Behaviors in Smart Home. MASS Workshops 2019: 37-42 - [c20]Sihang Liu, Yizhou Wei, Jianfeng Chi, Faysal Hossain Shezan, Yuan Tian:
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization. IEEE Symposium on Security and Privacy Workshops 2019: 156-161 - [c19]Yi Chen, Mingming Zha, Nan Zhang, Dandan Xu, Qianqian Zhao, Xuan Feng, Kan Yuan, Fnu Suya, Yuan Tian, Kai Chen, XiaoFeng Wang, Wei Zou:
Demystifying Hidden Privacy Settings in Mobile Apps. IEEE Symposium on Security and Privacy 2019: 570-586 - [c18]Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian:
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems. IEEE Symposium on Security and Privacy 2019: 1381-1396 - [c17]Ding Wang, Ping Wang, Debiao He, Yuan Tian:
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. USENIX Security Symposium 2019: 1537-1555 - 2018
- [c16]Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Yiming Liu, Haodong Liu, Jiasen Chen, Swee Sim, Vibha Iyengar, Patrick Tague, Yuan Tian:
Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks. SEC 2018: 378-380 - [c15]Yanyan Zhuang, Albert Rafetseder, Yu Hu, Yuan Tian, Justin Cappos:
Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps. HotMobile 2018: 113-118 - 2017
- [c14]Amr Alanwar, Bharathan Balaji, Yuan Tian, Shuo Yang, Mani B. Srivastava:
EchoSafe: Sonar-based Verifiable Interaction with Intelligent Digital Agents. SafeThings@SenSys 2017: 38-43 - [c13]Paul Marinescu, Chad Parry, Marjori Pomarole, Yuan Tian, Patrick Tague, Ioannis Papagiannis:
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks. IEEE Symposium on Security and Privacy 2017: 1094-1109 - [c12]Yuan Tian, Nan Zhang, Yue-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, Patrick Tague:
SmartAuth: User-Centered Authorization for the Internet of Things. USENIX Security Symposium 2017: 361-378 - 2016
- [c11]Yuan Tian, Eric Yawei Chen, Xiaojun Ma, Shuo Chen, Xiao Wang, Patrick Tague:
Swords and shields: a study of mobile game hacks and existing defenses. ACSAC 2016: 386-397 - 2015
- [c10]Yuan Tian, Bin Liu, Weisi Dai, Blase Ur, Patrick Tague, Lorrie Faith Cranor:
Supporting Privacy-Conscious App Update Decisions with User Reviews. SPSM@CCS 2015: 51-61 - [c9]Helen J. Wang, Alexander Moshchuk, Michael Gamon, Shamsi T. Iqbal, Eli T. Brown, Ashish Kapoor, Christopher Meek, Eric Yawei Chen, Yuan Tian, Jaime Teevan, Mary Czerwinski, Susan T. Dumais:
The Activity Platform. HotOS 2015 - [c8]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. NDSS 2015 - 2014
- [c7]Eric Yawei Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague:
OAuth Demystified for Mobile Application Developers. CCS 2014: 892-903 - [c6]Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Yuan Tian:
Analyzing the dangers posed by Chrome extensions. CNS 2014: 184-192 - [c5]Yu Seung Kim, Yuan Tian, Le T. Nguyen, Patrick Tague:
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks. CNS 2014: 427-435 - [c4]Yuan Tian, Ying Chuan Liu, Amar Bhosale, Lin-Shung Huang, Patrick Tague, Collin Jackson:
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API. IEEE Symposium on Security and Privacy 2014: 34-48 - [c3]Su Mon Kywe, Christopher Landis, Yutong Pei, Justin Satterfield, Yuan Tian, Patrick Tague:
PrivateDroid: Private Browsing Mode for Android. TrustCom 2014: 27-36 - 2013
- [c2]Le T. Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, S. Parab, Yu Seung Kim, Patrick Tague, Joy Zhang:
UnLocIn: Unauthorized location inference on smartphones without being caught. PRISMS 2013: 1-8 - [c1]Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian, Patrick Tague:
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection. WISA 2013: 174-188
Informal and Other Publications
- 2024
- [i34]Zihao Su, Kunlin Cai, Reuben Beeler, Lukas Dresel, Allan Garcia, Ilya Grishchenko, Yuan Tian, Christopher Kruegel, Giovanni Vigna:
Remote Keylogging Attacks in Multi-user VR Applications. CoRR abs/2405.14036 (2024) - 2023
- [i33]Tanujay Saha, Tamjid Al Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha:
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version). CoRR abs/2301.04314 (2023) - [i32]Tu Le, Alan Wang, Yaxing Yao, Yuanyuan Feng, Arsalan Heydarian, Norman M. Sadeh, Yuan Tian:
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States. CoRR abs/2303.04955 (2023) - [i31]Peiyi Yang, Jie Fan, Zice Wei, Haoqian Li, Tu Le, Yuan Tian:
Towards Usable Parental Control for Voice Assistants. CoRR abs/2303.04957 (2023) - [i30]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - [i29]Fnu Suya, Xiao Zhang, Yuan Tian, David Evans:
When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks? CoRR abs/2307.01073 (2023) - [i28]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. CoRR abs/2309.14742 (2023) - [i27]Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans:
SoK: Pitfalls in Evaluating Black-Box Attacks. CoRR abs/2310.17534 (2023) - [i26]Kunlin Cai, Jinghuai Zhang, Will Shand, Zhiqing Hong, Guang Wang, Desheng Zhang, Jianfeng Chi, Yuan Tian:
Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation. CoRR abs/2310.18606 (2023) - 2022
- [i25]Md. Rizwan Parvez, Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang:
Retrieval Enhanced Data Augmentation for Question Answering on Privacy Policies. CoRR abs/2204.08952 (2022) - [i24]Jianfeng Chi, William Shand, Yaodong Yu, Kai-Wei Chang, Han Zhao, Yuan Tian:
Conditional Supervised Contrastive Learning for Fair Text Classification. CoRR abs/2205.11485 (2022) - [i23]Qinying Wang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Yuhong Kan, Zhaowei Lin, Changting Lin, Shuiguang Deng, Alex X. Liu, Raheem Beyah:
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols. CoRR abs/2208.08751 (2022) - [i22]Jianfeng Chi, Wasi Uddin Ahmad, Yuan Tian, Kai-Wei Chang:
PLUE: Language Understanding Evaluation Benchmark for Privacy Policies in English. CoRR abs/2212.10011 (2022) - [i21]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. CoRR abs/2212.13716 (2022) - 2021
- [i20]Wasi Uddin Ahmad, Jianfeng Chi, Tu Le, Thomas Norton, Yuan Tian, Kai-Wei Chang:
Intent Classification and Slot Filling for Privacy Policies. CoRR abs/2101.00123 (2021) - [i19]Syed Zawad, Ahsan Ali, Pin-Yu Chen, Ali Anwar, Yi Zhou, Nathalie Baracaldo, Yuan Tian, Feng Yan:
Curse or Redemption? How Data Heterogeneity Affects the Robustness of Federated Learning. CoRR abs/2102.00655 (2021) - [i18]Tu Le, Danny Yuxing Huang, Noah J. Apthorpe, Yuan Tian:
SkillBot: Identifying Risky Content for Children in Alexa Skills. CoRR abs/2102.03382 (2021) - [i17]Omid Aramoon, Pin-Yu Chen, Gang Qu, Yuan Tian:
Meta Federated Learning. CoRR abs/2102.05561 (2021) - [i16]Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon, Han Zhao:
Understanding and Mitigating Accuracy Disparity in Regression. CoRR abs/2102.12013 (2021) - [i15]Weizhao Jin, Xiaoyu Ji, Ruiwen He, Zhou Zhuang, Wenyuan Xu, Yuan Tian:
Towards Fortifying the Multi-Factor-Based Online Account Ecosystem. CoRR abs/2104.08651 (2021) - [i14]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. CoRR abs/2104.10949 (2021) - [i13]Tamjid Al Rahat, Yu Feng, Yuan Tian:
OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations. CoRR abs/2110.01005 (2021) - [i12]Tamjid Al Rahat, Tu Le, Yuan Tian:
Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning. CoRR abs/2111.04224 (2021) - [i11]Jianfeng Chi, Jian Shen, Xinyi Dai, Weinan Zhang, Yuan Tian, Han Zhao:
Towards Return Parity in Markov Decision Processes. CoRR abs/2111.10476 (2021) - [i10]Sijun Tan, Brian Knott, Yuan Tian, David J. Wu:
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU. IACR Cryptol. ePrint Arch. 2021: 533 (2021) - 2020
- [i9]Fnu Suya, Saeed Mahloujifar, David Evans, Yuan Tian:
Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds. CoRR abs/2006.16469 (2020) - [i8]Wasi Uddin Ahmad, Jianfeng Chi, Yuan Tian, Kai-Wei Chang:
PolicyQA: A Reading Comprehension Dataset for Privacy Policies. CoRR abs/2010.02557 (2020) - 2019
- [i7]John A. Stankovic, Tu Le, Abdeltawab M. Hendawi, Yuan Tian:
Hardware/Software Security Patches for Internet of Trillions of Things. CoRR abs/1903.05266 (2019) - [i6]Han Zhao, Jianfeng Chi, Yuan Tian, Geoffrey J. Gordon:
Adversarial Task-Specific Privacy Preservation under Attribute Attack. CoRR abs/1906.07902 (2019) - [i5]Fnu Suya, Jianfeng Chi, David Evans, Yuan Tian:
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries. CoRR abs/1908.07000 (2019) - 2018
- [i4]Nan Zhang, Xianghang Mi, Xuan Feng, XiaoFeng Wang, Yuan Tian, Feng Qian:
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. CoRR abs/1805.01525 (2018) - [i3]Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Patrick Tague, Yuan Tian:
Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase. CoRR abs/1812.02863 (2018) - 2017
- [i2]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - [i1]Fnu Suya, Yuan Tian, David Evans, Paolo Papotti:
Query-limited Black-box Attacks to Classifiers. CoRR abs/1712.08713 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint