Follow
Ke Tian
Ke Tian
palo alto network
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1302019
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
1302018
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, D Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
1032017
Breaking the target: An analysis of target data breach and lessons learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
892017
Detection of repackaged android malware with code-heterogeneity features
K Tian, D Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing 17 (1), 64-77, 2017
872017
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity
K Xu, K Tian, D Yao, BG Ryder
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
612016
Probabilistic program modeling for high-precision anomaly classification
K Xu, DD Yao, BG Ryder, K Tian
2015 IEEE 28th Computer Security Foundations Symposium, 497-511, 2015
532015
Analysis of code heterogeneity for high-precision classification of repackaged malware
K Tian, D Yao, BG Ryder, G Tan
2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016
462016
Checking is believing: Event-aware program anomaly detection in cyber-physical systems
L Cheng, K Tian, DD Yao, L Sha, RA Beyah
IEEE Transactions on Dependable and Secure Computing 18 (2), 825-842, 2019
332019
{iOS}, Your {OS}, Everybody's {OS}: Vetting and Analyzing Network Services of {iOS} Applications
Z Tang, K Tang, M Xue, Y Tian, S Chen, M Ikram, T Wang, H Zhu
29th USENIX Security Symposium (USENIX Security 20), 2415-2432, 2020
242020
Living-off-the-land command detection using active learning
T Ongun, JW Stokes, JB Or, K Tian, F Tajaddodianfar, J Neil, C Seifert, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
212021
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale
K Tian, Z Li, KD Bowers, D Yao
Security and Privacy in Communication Networks: 14th International …, 2018
112018
An efficient multi-keyword ranked retrieval scheme with johnson-lindenstrauss transform over encrypted cloud data
K Li, W Zhang, K Tian, R Liu, N Yu
2013 International Conference on Cloud Computing and Big Data, 320-327, 2013
102013
Danfeng (Daphne) Yao
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in …, 2019
82019
Redroid: Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, DD Yao, BG Ryder
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
82017
Danfeng, Yao, and Murat Kantarcioglu
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz
Cryptoguard: High precision detection of cryptographic vulnerabilities in …, 2018
72018
CHIRON: deployment-quality detection of Java cryptographic vulnerabilities
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
arXiv preprint arXiv:1806.06881, 2018
62018
Being the developers’ friend: Our experience developing a high-precision tool for secure coding
DD Yao, S Rahaman, Y Xiao, S Afrose, M Frantz, K Tian, N Meng, ...
IEEE Security & Privacy 20 (6), 43-52, 2022
42022
Cs5604 fall 2016 solr team project report
L Li, A Pillai, Y Wang, K Tian
Virginia Tech, 2016
42016
Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, BG Ryder, DD Yao
Computers & Security 92, 101750, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20