Ke Tian
Ke Tian
Data Scientist at Microsoft
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
452018
Breaking the target: An analysis of target data breach and lessons learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
382017
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, D Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
372017
Detection of repackaged android malware with code-heterogeneity features
K Tian, D Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing 17 (1), 64-77, 2017
362017
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity
K Xu, K Tian, D Yao, BG Ryder
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
352016
Probabilistic program modeling for high-precision anomaly classification
K Xu, DD Yao, BG Ryder, K Tian
2015 IEEE 28th Computer Security Foundations Symposium, 497-511, 2015
352015
Analysis of code heterogeneity for high-precision classification of repackaged malware
K Tian, D Yao, BG Ryder, G Tan
2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016
342016
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized Java projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
252019
Checking is believing: Event-aware program anomaly detection in cyber-physical systems
L Cheng, K Tian, D Yao, L Sha, RA Beyah
IEEE Transactions on Dependable and Secure Computing, 2019
102019
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale
K Tian, Z Li, KD Bowers, DD Yao
International Conference on Security and Privacy in Communication Systems …, 2018
82018
An efficient multi-keyword ranked retrieval scheme with johnson-lindenstrauss transform over encrypted cloud data
K Li, W Zhang, K Tian, R Liu, N Yu
2013 International Conference on Cloud Computing and Big Data, 320-327, 2013
82013
Redroid: Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, DD Yao, BG Ryder
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
52017
CHIRON: Deployment-quality detection of Java cryptographic vulnerabilities
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
CoRR, 2018
32018
Cs5604 fall 2016 solr team project report
L Li, A Pillai, Y Wang, K Tian
Virginia Tech, 2016
32016
Learning-based Cyber Security Analysis and Binary Customization for Security
K Tian
Virginia Tech, 2018
22018
Poster: Deployment-quality and accessible solutions for cryptography code development
S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, N Meng, BP Miller, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
12019
POSTER: detection of CPS program anomalies by enforcing cyber-physical execution semantics
L Cheng, K Tian, D Yao
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
12017
A novel fuzzy keyword retrieval scheme over encrypted cloud data
K Tian, W Zhang, K Li, J Wu, N Yu
Wuhan University Journal of Natural Sciences 18 (5), 393-401, 2013
12013
Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, BG Ryder, DD Yao
Computers & Security 92, 101750, 2020
2020
Deployment-quality and Accessible Solutions for Cryptography Code Development
S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, N Meng, BP Miller, ...
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20