Yuan Tian
Orcid: 0000-0002-6435-564XAffiliations:
- University of California, Los Angeles, CA, USA
- University of Virginia, Charlottesville, VA, USA
- Carnegie Mellon University, Pittsburgh, PA, USA (former)
According to our database1,
Yuan Tian
authored at least 88 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Alexa, is the skill always safe? Uncover Lenient Skill Vetting Process and Protect User Privacy at Run Time.
Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Society, 2024
Protecting Lung CT Nodule Classification Models with Feature Fusion of Image and Pixel-level Features.
Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version).
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023
2022
ACM Trans. Internet Techn., 2022
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning.
CoRR, 2021
CoRR, 2021
MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE International Conference on Smart Computing, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
Curse or Redemption? How Data Heterogeneity Affects the Robustness of Federated Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
IEEE Secur. Priv., 2020
CoRR, 2020
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks.
Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems, 2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Flame and Smoke Detection in Substation Based on Wavelet Analysis and Convolution Neural Network.
Proceedings of the ICIAI 2019: The 3rd International Conference on Innovation in Artificial Intelligence, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
PhD thesis, 2018
CoRR, 2018
Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018
Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018
2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017
2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013