Ke Tian
Ke Tian
Data Scientist at Microsoft
Verified email at vt.edu - Homepage
TitleCited byYear
Probabilistic program modeling for high-precision anomaly classification
K Xu, DD Yao, BG Ryder, K Tian
2015 IEEE 28th Computer Security Foundations Symposium, 497-511, 2015
302015
Analysis of code heterogeneity for high-precision classification of repackaged malware
K Tian, D Yao, BG Ryder, G Tan
2016 IEEE Security and Privacy Workshops (SPW), 262-271, 2016
292016
A sharper sense of self: Probabilistic reasoning of program behaviors for anomaly detection with context sensitivity
K Xu, K Tian, D Yao, BG Ryder
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
282016
Breaking the target: An analysis of target data breach and lessons learned
X Shu, K Tian, A Ciambrone, D Yao
arXiv preprint arXiv:1701.04940, 2017
252017
Detection of repackaged android malware with code-heterogeneity features
K Tian, DD Yao, BG Ryder, G Tan, G Peng
IEEE Transactions on Dependable and Secure Computing, 2017
232017
Orpheus: Enforcing cyber-physical execution semantics to defend against data-oriented attacks
L Cheng, K Tian, D Yao
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
202017
Needle in a haystack: Tracking down elite phishing domains in the wild
K Tian, STK Jan, H Hu, D Yao, G Wang
Proceedings of the Internet Measurement Conference 2018, 429-442, 2018
182018
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale
K Tian, Z Li, KD Bowers, DD Yao
International Conference on Security and Privacy in Communication Systems …, 2018
62018
An efficient multi-keyword ranked retrieval scheme with johnson-lindenstrauss transform over encrypted cloud data
K Li, W Zhang, K Tian, R Liu, N Yu
2013 International Conference on Cloud Computing and Big Data, 320-327, 2013
62013
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
S Rahaman, Y Xiao, S Afrose, F Shaon, K Tian, M Frantz, M Kantarcioglu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
42019
Redroid: Prioritizing data flows and sinks for app security transformation
K Tian, G Tan, DD Yao, BG Ryder
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
42017
Checking is believing: event-aware program anomaly detection in cyber-physical systems
L Cheng, K Tian, D Yao, L Sha, RA Beyah
IEEE Transactions on Dependable and Secure Computing, 2019
32019
Cs5604 fall 2016 solr team project report
L Li, A Pillai, Y Wang, K Tian
Virginia Tech, 2016
32016
CHIRON: Deployment-quality detection of Java cryptographic vulnerabilities
S Rahaman, Y Xiao, K Tian, F Shaon, M Kantarcioglu, D Yao
arXiv preprint arXiv: 1806.06881, 2018
22018
Learning-based Cyber Security Analysis and Binary Customization for Security
K Tian
Virginia Tech, 2018
12018
POSTER: detection of CPS program anomalies by enforcing cyber-physical execution semantics
L Cheng, K Tian, D Yao
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
12017
A novel fuzzy keyword retrieval scheme over encrypted cloud data
K Tian, W Zhang, K Li, J Wu, N Yu
Wuhan University Journal of Natural Sciences 18 (5), 393-401, 2013
12013
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development
S Rahaman, Y Xiao, S Afrose, K Tian, M Frantz, N Meng, BP Miller, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2019
IntrospectDroid: Scalable, Efficient Detection of Repackaged Malware in Android with Call Graph Analysis
Z Morris, K Tian, DD Yao
The system can't perform the operation now. Try again later.
Articles 1–19