Yuan Tian
Yuan Tian
Verified email at - Homepage
Cited by
Cited by
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
CryptGPU: Fast privacy-preserving machine learning on the GPU
S Tan, B Knott, Y Tian, DJ Wu
2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th USENIX Security Symposium (USENIX Security 20), 1327-1344, 2020
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
Curse or redemption? how data heterogeneity affects the robustness of federated learning
S Zawad, A Ali, PY Chen, A Anwar, Y Zhou, N Baracaldo, Y Tian, F Yan
Proceedings of the AAAI conference on artificial intelligence 35 (12), 10807 …, 2021
PolicyQA: A reading comprehension dataset for privacy policies
WU Ahmad, J Chi, Y Tian, KW Chang
arXiv preprint arXiv:2010.02557, 2020
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian
31st USENIX Security Symposium (USENIX Security 22), 1077-1094, 2022
Model-targeted poisoning attacks with provable convergence
F Suya, S Mahloujifar, A Suri, D Evans, Y Tian
International Conference on Machine Learning, 10000-10010, 2021
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, K Chen, XF Wang, W Zou, M Zha, N Zhang, D Xu, Q Zhao, ...
40th IEEE Symposium on Security and Privacy (Oakland), 2019
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Oauthlint: An empirical study on oauth bugs in android applications
T Al Rahat, Y Feng, Y Tian
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Privacy partitioning: Protecting user data during the deep learning inference phase
J Chi, E Owusu, X Yin, T Yu, W Chan, P Tague, Y Tian
arXiv preprint arXiv:1812.02863, 2018
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
WWW, 2020
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
Privacy partition: A privacy-preserving framework for deep neural networks in edge networks
J Chi, E Owusu, X Yin, T Yu, W Chan, Y Liu, H Liu, J Chen, S Sim, ...
2018 IEEE/ACM Symposium on Edge Computing (SEC), 378-380, 2018
The system can't perform the operation now. Try again later.
Articles 1–20