Kan Yuan

According to our database1, Kan Yuan authored at least 17 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Demystifying Hidden Privacy Settings in Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur., 2018

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces.
Proceedings of the 27th USENIX Security Symposium, 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

2016
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Catching predators at watering holes: finding and understanding strategically compromised websites.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Understanding the Dark Side of Domain Parking.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

2012
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

A Highly Efficient Correlation Power Analysis on PRINT Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2009
Modeling of Self-Repairing Aircraft Based on Multi-agent System.
Proceedings of the Fifth International Conference on Natural Computation, 2009


  Loading...