Indlæser...
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Henvisninger pr. år
Dublerede henvisninger
Følgende artikler er flettet i Scholar. Deres
samlede henvisninger
tæller kun for den første artikel.
Flettede henvisninger
Antallet under "Citeret af" inkluderer henvisninger fra følgende artikler i Scholar. Dem, der er markeret med
*
, kan afvige fra artiklen i profilen.
Tilføj medforfattere
Medforfattere
Følg
Nye artikler af denne forfatter
Nye henvisninger til denne forfatter
Nye artikler relateret til denne forfatters videnskabelige undersøgelser
Mailadresse til opdateringer
Udfør
Min profil
Min samling
Metrics
Underretninger
Indstillinger
Log ind
Log ind
Få min egen profil
Citeret af
Se alle
Alle
Siden 2019
Henvisninger
621
339
h-index
11
9
i10-indeks
11
8
0
120
60
30
90
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
3
27
57
79
109
78
86
63
61
42
9
Offentlig adgang
Se alle
Se alle
7 artikler
4 artikler
tilgængelige
ikke tilgængelige
Baseret på krav i forbindelse med finansiering
Medforfattere
Zhenkai Liang
School of Computing, National University of Singapore
Verificeret mail på comp.nus.edu.sg
Prateek Saxena
National University of Singapore
Verificeret mail på comp.nus.edu.sg
Hong Hu
Pennsylvania State University
Verificeret mail på psu.edu
Guangdong Bai
Associate Professor of The University of Queensland
Verificeret mail på uq.edu.au
Tarik Moataz
Brown University
Verificeret mail på brown.edu
Roland Yap
National University of Singapore
Verificeret mail på comp.nus.edu.sg
Zheng Leong Chua
Advanca
Verificeret mail på iiyume.org
Xinshu Dong
Følg
Yaoqi Jia
Ph.D Student of Computer Science,
National University of Singapore
Verificeret mail på comp.nus.edu.sg -
Startside
System Security
Web Security & Privacy
Artikler
Citeret af
Offentlig adgang
Medforfattere
Titel
Sortér
Sortér efter henvisninger
Sortér efter årstal
Sortér efter titel
Citeret af
Citeret af
År
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …
, 2015
228
2015
Droidvault: A trusted data vault for android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …
, 2014
62
2014
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80
, 2015
56
2015
I know where you've been: Geo-inference attacks via the browser cache
Y Jia, X Dong, Z Liang, P Saxena
IEEE Internet Computing 19 (1), 44-53
, 2014
55
2014
Web-to-application injection attacks on android: Characterization and detection
B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang
Computer Security--ESORICS 2015: 20th European Symposium on Research in …
, 2015
53
2015
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …
, 2016
35
2016
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10
, 2018
25
2018
{PRO-ORAM}: Practical {Read-Only} Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2019
19
2019
Detecting injected behaviors in HTML5-based Android applications
J Mao, R Wang, Y Chen, Y Jia
Journal of High Speed Networks 22 (1), 15-34
, 2016
14
2016
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
Research in Attacks, Intrusions and Defenses: 17th International Symposium …
, 2014
14
2014
Toward exposing timing-based probing attacks in web applications
J Mao, Y Chen, F Shi, Y Jia, Z Liang
Sensors 17 (3), 464
, 2017
12
2017
Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575
, 2019
9
2019
Anonymity in peer-assisted CDNs: Inference attacks and mitigation
Y Jia, G Bai, P Saxena, Z Liang
Proceedings on Privacy Enhancing Technologies
, 2016
8
2016
Automatic permission inference for hybrid mobile apps
J Mao, H Ma, Y Chen, Y Jia, Z Liang
Journal of High Speed Networks 22 (1), 55-64
, 2016
8
2016
Robust detection of android UI similarity
J Mao, J Bian, H Ma, Y Jia, Z Liang, X Jiang
2018 IEEE International Conference on Communications (ICC), 1-6
, 2018
7
2018
Robust Synchronous P2P Primitives Using SGX Enclaves.
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
IACR Cryptol. ePrint Arch. 2017, 180
, 2017
7
2017
PRO-ORAM: Constant latency read-only oblivious RAM
S Tople, Y Jia, P Saxena
Cryptology ePrint Archive
, 2018
5
2018
Robust {P2P} Primitives Using {SGX} Enclaves
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2020
2
2020
A function-level behavior model for anomalous behavior detection in hybrid mobile applications
J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang
2016 International Conference on Identification, Information and Knowledge …
, 2016
2
2016
I Know Where You’ve Been
Y Jia, X Dong, Z Liang, P Saxena
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20
Vis flere
Privatliv
Vilkår
Hjælp
Om Scholar
Søg i Hjælp