Ke Tian
Ke Tian
Data Scientist at Microsoft
Verified email at vt.edu - Homepage
TitleCited byYear
Analysis of code heterogeneity for high-precision classification of repackaged malware
K Tian, D Yao, BG Ryder, G Tan
2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016
282016
Probabilistic program modeling for high-precision anomaly classification
K Xu, DD Yao, BG Ryder, K Tian
2015 IEEE 28th Computer Security Foundations Symposium, 497-511, 2015
272015
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity
K Xu, K Tian, D Yao, BG Ryder
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
252016
Breaking the target: An analysis of target data breach and lessons learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
232017
Detection of repackaged android malware with code-heterogeneity features
K Tian, DD Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing, 2017
202017
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, DD Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
172017
Needle in a haystack: tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
112018
An efficient multi-keyword ranked retrieval scheme with johnson-lindenstrauss transform over encrypted cloud data
K Li, W Zhang, K Tian, R Liu, N Yu
2013 International Conference on Cloud Computing and Big Data, 320-327, 2013
62013
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale
K Tian, Z Li, KD Bowers, DD Yao
International Conference on Security and Privacy in Communication Systems …, 2018
52018
Redroid: Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, DD Yao, BG Ryder
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
42017
Checking is believing: event-aware program anomaly detection in cyber-physical systems
L Cheng, K Tian, D Yao, L Sha, RA Beyah
IEEE Transactions on Dependable and Secure Computing, 2019
22019
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu
arXiv preprint arXiv:1806.06881, 2018
22018
CS5604 Fall 2016 Solr Team Project Report
L Li, A Pillai, Y Wang, K Tian
Virginia Tech, 2016
22016
Learning-based Cyber Security Analysis and Binary Customization for Security
K Tian
Virginia Tech, 2018
12018
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities.
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
arXiv preprint arXiv:1806.06881, 2018
12018
POSTER: detection of CPS program anomalies by enforcing cyber-physical execution semantics
L Cheng, K Tian, DD Yao
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
12017
A novel fuzzy keyword retrieval scheme over encrypted cloud data
K Tian, W Zhang, K Li, J Wu, N Yu
Wuhan University Journal of Natural Sciences 18 (5), 393-401, 2013
12013
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development
S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, DD Yao, N Meng, ...
IntrospectDroid: Scalable, Efficient Detection of Repackaged Malware in Android with Call Graph Analysis
Z Morris, K Tian, DD Yao
The system can't perform the operation now. Try again later.
Articles 1–19