Nothing Special   »   [go: up one dir, main page]

Follow
Yuan Tian
Yuan Tian
Verified email at ucla.edu - Homepage
Title
Cited by
Cited by
Year
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
314*2019
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
3142017
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
2202014
CryptGPU: Fast privacy-preserving machine learning on the GPU
S Tan, B Knott, Y Tian, DJ Wu
2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021
1822021
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
1102019
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th USENIX Security Symposium (USENIX Security 20), 1327-1344, 2020
1022020
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
832017
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
822015
Curse or redemption? how data heterogeneity affects the robustness of federated learning
S Zawad, A Ali, PY Chen, A Anwar, Y Zhou, N Baracaldo, Y Tian, F Yan
Proceedings of the AAAI conference on artificial intelligence 35 (12), 10807 …, 2021
682021
PolicyQA: A reading comprehension dataset for privacy policies
WU Ahmad, J Chi, Y Tian, KW Chang
arXiv preprint arXiv:2010.02557, 2020
572020
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian
31st USENIX Security Symposium (USENIX Security 22), 1077-1094, 2022
482022
Model-targeted poisoning attacks with provable convergence
F Suya, S Mahloujifar, A Suri, D Evans, Y Tian
International Conference on Machine Learning, 10000-10010, 2021
472021
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
472015
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, K Chen, XF Wang, W Zou, M Zha, N Zhang, D Xu, Q Zhao, ...
40th IEEE Symposium on Security and Privacy (Oakland), 2019
442019
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
402020
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
382021
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
WWW, 2020
372020
Oauthlint: An empirical study on oauth bugs in android applications
T Al Rahat, Y Feng, Y Tian
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
372019
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
36*2022
Trade-offs and guarantees of adversarial representation learning for information obfuscation
H Zhao, J Chi, Y Tian, GJ Gordon
Advances in Neural Information Processing Systems 33, 9485-9496, 2020
322020
The system can't perform the operation now. Try again later.
Articles 1–20