Yuan Tian
Cited by
Cited by
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
CryptGPU: Fast privacy-preserving machine learning on the GPU
S Tan, B Knott, Y Tian, DJ Wu
2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021
Run-time Monitoring and Formal Analysis of Information Flows in Chromium
L Bauer, S Cai, L Jia, T Passaro, M Stroucken, Y Tian
NDSS, 2015
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
D Wang, P Wang, D He, Y Tian
USENIX Security Symposium, 1537-1555, 2019
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th USENIX Security Symposium, 2020
Supporting Privacy-Conscious App Update Decisions with User Reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
PolicyQA: A reading comprehension dataset for privacy policies
WU Ahmad, J Chi, Y Tian, KW Chang
arXiv preprint arXiv:2010.02557, 2020
Curse or redemption? how data heterogeneity affects the robustness of federated learning
S Zawad, A Ali, PY Chen, A Anwar, Y Zhou, N Baracaldo, Y Tian, F Yan
Proceedings of the AAAI conference on artificial intelligence 35 (12), 10807 …, 2021
Privacy partitioning: Protecting user data during the deep learning inference phase
J Chi, E Owusu, X Yin, T Yu, W Chan, P Tague, Y Tian
arXiv preprint arXiv:1812.02863, 2018
Model-targeted poisoning attacks with provable convergence
F Suya, S Mahloujifar, A Suri, D Evans, Y Tian
International Conference on Machine Learning, 10000-10010, 2021
Analyzing the dangers posed by Chrome extensions
L Bauer, S Cai, L Jia, T Passaro, Y Tian
CNS, 2014
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, K Chen, XF Wang, W Zou, M Zha, N Zhang, D Xu, Q Zhao, ...
40th IEEE Symposium on Security and Privacy (Oakland), 2019
Query-limited Black-box Attacks to Classifiers
Fnu Suya, Yuan Tian, Dave Evans, Paolo Papotti
NIPS Workshop on Machine Learning and Computer Security, 2017
Privacy partition: A privacy-preserving framework for deep neural networks in edge networks
J Chi, E Owusu, X Yin, T Yu, W Chan, Y Liu, H Liu, J Chen, S Sim, ...
2018 IEEE/ACM Symposium on Edge Computing (SEC), 378-380, 2018
EchoSafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
WWW, 2020
Synchronous push–pull class E rectifiers with load-independent operation for megahertz wireless power transfer
X Huang, Y Dou, S Lin, Y Tian, Z Ouyang, MAE Andersen
IEEE Transactions on Power Electronics 36 (6), 6351-6363, 2020
The system can't perform the operation now. Try again later.
Articles 1–20