What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuan Tian
Google Scholar
36
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Firmrca: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-Based Fault Localization.
Boyu Chang
Binbin Zhao
Qiao Zhang
Peiyu Liu
Yuan Tian
Raheem Beyah
Shouling Ji
2025
conf/uss
Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation.
Lingming Zhang
Binbin Zhao
Jiacheng Xu
Peiyu Liu
Qinge Xie
Yuan Tian
Jianhai Chen
Shouling Ji
2025
conf/uss
SoK: Towards Effective Automated Vulnerability Repair.
Ying Li
Faysal Hossain Shezan
Bomin Wei
Gang Wang
Yuan Tian
2024
conf/ccs
: Automated Safety Verification of OpenID Connect Programs.
Tamjid Al Rahat
Yu Feng
Yuan Tian
2024
conf/ccs
BadMerging: Backdoor Attacks Against Model Merging.
Jinghuai Zhang
Jianfeng Chi
Zheng Li
Kunlin Cai
Yang Zhang
Yuan Tian
2024
conf/uss
Remote Keylogging Attacks in Multi-user VR Applications.
Zihao Su
Kunlin Cai
Reuben Beeler
Lukas Dresel
Allan Garcia
Ilya Grishchenko
Yuan Tian
Christopher Kruegel
Giovanni Vigna
2024
conf/sp
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Qinying Wang
Boyu Chang
Shouling Ji
Yuan Tian
Xuhong Zhang
Binbin Zhao
Gaoning Pan
Chenyang Lyu
Mathias Payer
Wenhai Wang
Raheem Beyah
2024
conf/ndss
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Jiacheng Xu
Xuhong Zhang
Shouling Ji
Yuan Tian
Binbin Zhao
Qinying Wang
Peng Cheng
Jiming Chen
2023
journals/popets
SenRev: Measurement of Personal Information Disclosure in Online Health Communities.
Faysal Hossain Shezan
Minjun Long
David Hasani
Gang Wang
Yuan Tian
2023
conf/uss
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Binbin Zhao
Shouling Ji
Xuhong Zhang
Yuan Tian
Qinying Wang
Yuwen Pu
Chenyang Lyu
Raheem Beyah
2023
conf/soups
Towards Usable Security Analysis Tools for Trigger-Action Programming.
McKenna McCall
Eric Zeng
Faysal Hossain Shezan
Mitchell Yang
Lujo Bauer
Abhishek Bichhawat
Camille Cobb
Limin Jia
Yuan Tian
2023
conf/eurosp
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Tu Le
Alan Wang
Yaxing Yao
Yuanyuan Feng
Arsalan Heydarian
Norman M. Sadeh
Yuan Tian
2023
conf/ndss
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Faysal Hossain Shezan
Zihao Su
Mingqing Kang
Nicholas Phair
Patrick William Thomas
Michelangelo van Dam
Yinzhi Cao
Yuan Tian
2022
conf/ccs
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
Tamjid Al Rahat
Yu Feng
Yuan Tian
2022
conf/uss
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Yan Meng
Jiachun Li
Matthew Pillari
Arjun Deopujari
Liam Brennan
Hafsah Shamsie
Haojin Zhu
Yuan Tian
2021
conf/uss
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Qinying Wang
Shouling Ji
Yuan Tian
Xuhong Zhang
Binbin Zhao
Yuhong Kan
Zhaowei Lin
Changting Lin
Shuiguang Deng
Alex X. Liu
Raheem Beyah
2021
conf/sp
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU.
Sijun Tan
Brian Knott
Yuan Tian
David J. Wu
2021
conf/dsn
SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Weizhao Jin
Xiaoyu Ji
Ruiwen He
Zhou Zhuang
Wenyuan Xu
Yuan Tian
2020
conf/uss
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Zhushou Tang
Ke Tang
Minhui Xue
Yuan Tian
Sen Chen
Muhammad Ikram
Tielei Wang
Haojin Zhu
2020
conf/uss
Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
Fnu Suya
Jianfeng Chi
David Evans
Yuan Tian
2020
conf/ndss
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Faysal Hossain Shezan
Kaiming Cheng
Zhen Zhang
Yinzhi Cao
Yuan Tian
2019
conf/uss
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Ding Wang
Ping Wang
Debiao He
Yuan Tian
2019
conf/sp
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization.
Sihang Liu
Yizhou Wei
Jianfeng Chi
Faysal Hossain Shezan
Yuan Tian
2019
conf/sp
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Nan Zhang
Xianghang Mi
Xuan Feng
XiaoFeng Wang
Yuan Tian
Feng Qian
2019
conf/sp
Demystifying Hidden Privacy Settings in Mobile Apps.
Yi Chen
Mingming Zha
Nan Zhang
Dandan Xu
Qianqian Zhao
Xuan Feng
Kan Yuan
Fnu Suya
Yuan Tian
Kai Chen
XiaoFeng Wang
Wei Zou
2019
conf/eurosp
StopGuessing: Using Guessed Passwords to Thwart Online Guessing.
Stuart E. Schechter
Yuan Tian
Cormac Herley
2017
conf/uss
SmartAuth: User-Centered Authorization for the Internet of Things.
Yuan Tian
Nan Zhang
Yue-Hsun Lin
XiaoFeng Wang
Blase Ur
Xianzheng Guo
Patrick Tague
2017
conf/sp
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Paul Marinescu
Chad Parry
Marjori Pomarole
Yuan Tian
Patrick Tague
Ioannis Papagiannis
2016
conf/acsac
Swords and shields: a study of mobile game hacks and existing defenses.
Yuan Tian
Eric Yawei Chen
Xiaojun Ma
Shuo Chen
Xiao Wang
Patrick Tague
2015
conf/ccs
Supporting Privacy-Conscious App Update Decisions with User Reviews.
Yuan Tian
Bin Liu
Weisi Dai
Blase Ur
Patrick Tague
Lorrie Faith Cranor
2015
conf/ndss
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Michael Stroucken
Yuan Tian
2014
conf/ccs
OAuth Demystified for Mobile Application Developers.
Eric Yawei Chen
Yutong Pei
Shuo Chen
Yuan Tian
Robert Kotcher
Patrick Tague
2014
conf/sp
All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
Yuan Tian
Ying Chuan Liu
Amar Bhosale
Lin-Shung Huang
Patrick Tague
Collin Jackson
2014
conf/cns
Analyzing the dangers posed by Chrome extensions.
Lujo Bauer
Shaoying Cai
Limin Jia
Timothy Passaro
Yuan Tian
2014
conf/cns
LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks.
Yu Seung Kim
Yuan Tian
Le T. Nguyen
Patrick Tague
2013
conf/wisa
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection.
Arjun P. Athreya
Xiao Wang
Yu Seung Kim
Yuan Tian
Patrick Tague
Coauthors
Abhishek Bichhawat
(1)
Alan Wang
(1)
Alex X. Liu
(1)
Allan Garcia
(1)
Amar Bhosale
(1)
Arjun Deopujari
(1)
Arjun P. Athreya
(1)
Arsalan Heydarian
(1)
Bin Liu
(1)
Binbin Zhao
(6)
Blase Ur
(2)
Bomin Wei
(1)
Boyu Chang
(2)
Brian Knott
(1)
Camille Cobb
(1)
Chad Parry
(1)
Changting Lin
(1)
Chenyang Lyu
(2)
Christopher Kruegel
(1)
Collin Jackson
(1)
Cormac Herley
(1)
Dandan Xu
(1)
David Evans
(1)
David Hasani
(1)
David J. Wu
(1)
Debiao He
(1)
Ding Wang
(1)
Eric Yawei Chen
(2)
Eric Zeng
(1)
Faysal Hossain Shezan
(6)
Feng Qian
(1)
Fnu Suya
(2)
Gang Wang
(2)
Gaoning Pan
(1)
Giovanni Vigna
(1)
Hafsah Shamsie
(1)
Haojin Zhu
(2)
Ilya Grishchenko
(1)
Ioannis Papagiannis
(1)
Jiacheng Xu
(2)
Jiachun Li
(1)
Jianfeng Chi
(3)
Jianhai Chen
(1)
Jiming Chen
(1)
Jinghuai Zhang
(1)
Kai Chen
(1)
Kaiming Cheng
(1)
Kan Yuan
(1)
Ke Tang
(1)
Kunlin Cai
(2)
Le T. Nguyen
(1)
Liam Brennan
(1)
Limin Jia
(3)
Lin-Shung Huang
(1)
Lingming Zhang
(1)
Lorrie Faith Cranor
(1)
Lujo Bauer
(3)
Lukas Dresel
(1)
Marjori Pomarole
(1)
Mathias Payer
(1)
Matthew Pillari
(1)
McKenna McCall
(1)
Michael Stroucken
(1)
Michelangelo van Dam
(1)
Mingming Zha
(1)
Mingqing Kang
(1)
Minhui Xue
(1)
Minjun Long
(1)
Mitchell Yang
(1)
Muhammad Ikram
(1)
Nan Zhang
(3)
Nicholas Phair
(1)
Norman M. Sadeh
(1)
Patrick Tague
(8)
Patrick William Thomas
(1)
Paul Marinescu
(1)
Peiyu Liu
(2)
Peng Cheng
(1)
Ping Wang
(1)
Qianqian Zhao
(1)
Qiao Zhang
(1)
Qinge Xie
(1)
Qinying Wang
(4)
Raheem Beyah
(4)
Reuben Beeler
(1)
Robert Kotcher
(1)
Ruiwen He
(1)
Sen Chen
(1)
Shaoying Cai
(2)
Shouling Ji
(6)
Shuiguang Deng
(1)
Shuo Chen
(2)
Sihang Liu
(1)
Sijun Tan
(1)
Stuart E. Schechter
(1)
Tamjid Al Rahat
(2)
Tielei Wang
(1)
Timothy Passaro
(2)
Tu Le
(1)
Wei Zou
(1)
Weisi Dai
(1)
Weizhao Jin
(1)
Wenhai Wang
(1)
Wenyuan Xu
(1)
Xianghang Mi
(1)
Xianzheng Guo
(1)
Xiao Wang
(2)
XiaoFeng Wang
(3)
Xiaojun Ma
(1)
Xiaoyu Ji
(1)
Xuan Feng
(2)
Xuhong Zhang
(4)
Yan Meng
(1)
Yang Zhang
(1)
Yaxing Yao
(1)
Yi Chen
(1)
Ying Chuan Liu
(1)
Ying Li
(1)
Yinzhi Cao
(2)
Yizhou Wei
(1)
Yu Feng
(2)
Yu Seung Kim
(2)
Yuan Tian
(36)
Yuanyuan Feng
(1)
Yue-Hsun Lin
(1)
Yuhong Kan
(1)
Yutong Pei
(1)
Yuwen Pu
(1)
Zhaowei Lin
(1)
Zhen Zhang
(1)
Zheng Li
(1)
Zhou Zhuang
(1)
Zhushou Tang
(1)
Zihao Su
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to