正在加载...
系统目前无法执行此操作,请稍后再试。
每年引用数
重复的引用
下面的文章将在学术搜索中合并。它们的
合并引用
次数只会计入第一篇文章。
合并的引用
此“引用引文的出版物数量”计数包含了对学术搜索中以下文章的引用次数。带有
*
标记的引文可能与个人学术档案中的文章有所区别。
添加合著者
合著作者
关注
此作者发表了新文章
有对此作者文章的新引用
有与此作者的研究工作相关的新文章
用于接收动态的电子邮件地址
完成
我的个人学术档案
我的图书馆
统计指标
快讯
设置
登录
登录
创建我的个人资料
引用次数
查看全部
总计
2019 年至今
引用
621
339
h 指数
11
9
i10 指数
11
8
0
120
60
30
90
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
3
27
57
79
109
78
86
63
61
42
9
开放获取的出版物数量
查看全部
查看全部
7 篇文章
4 篇文章
可查看的文章
无法查看的文章
根据资助方的强制性开放获取政策
合著作者
Zhenkai Liang
School of Computing, National University of Singapore
在 comp.nus.edu.sg 的电子邮件经过验证
Prateek Saxena
National University of Singapore
在 comp.nus.edu.sg 的电子邮件经过验证
Hong Hu
Pennsylvania State University
在 psu.edu 的电子邮件经过验证
Guangdong Bai
Associate Professor of The University of Queensland
在 uq.edu.au 的电子邮件经过验证
Tarik Moataz
Brown University
在 brown.edu 的电子邮件经过验证
Roland Yap
National University of Singapore
在 comp.nus.edu.sg 的电子邮件经过验证
Zheng Leong Chua
Advanca
在 iiyume.org 的电子邮件经过验证
Xinshu Dong
关注
Yaoqi Jia
Ph.D Student of Computer Science,
National University of Singapore
在 comp.nus.edu.sg 的电子邮件经过验证 -
首页
System Security
Web Security & Privacy
文章
引用次数
开放获取的出版物数量
合著作者
标题
排序
按引用次数排序
按年份排序
按标题排序
引用次数
引用次数
年份
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …
, 2015
228
2015
Droidvault: A trusted data vault for android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …
, 2014
62
2014
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80
, 2015
56
2015
I know where you've been: Geo-inference attacks via the browser cache
Y Jia, X Dong, Z Liang, P Saxena
IEEE Internet Computing 19 (1), 44-53
, 2014
55
2014
Web-to-application injection attacks on android: Characterization and detection
B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang
Computer Security--ESORICS 2015: 20th European Symposium on Research in …
, 2015
53
2015
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …
, 2016
35
2016
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10
, 2018
25
2018
{PRO-ORAM}: Practical {Read-Only} Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2019
19
2019
Detecting injected behaviors in HTML5-based Android applications
J Mao, R Wang, Y Chen, Y Jia
Journal of High Speed Networks 22 (1), 15-34
, 2016
14
2016
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
Research in Attacks, Intrusions and Defenses: 17th International Symposium …
, 2014
14
2014
Toward exposing timing-based probing attacks in web applications
J Mao, Y Chen, F Shi, Y Jia, Z Liang
Sensors 17 (3), 464
, 2017
12
2017
Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575
, 2019
9
2019
Anonymity in peer-assisted CDNs: Inference attacks and mitigation
Y Jia, G Bai, P Saxena, Z Liang
Proceedings on Privacy Enhancing Technologies
, 2016
8
2016
Automatic permission inference for hybrid mobile apps
J Mao, H Ma, Y Chen, Y Jia, Z Liang
Journal of High Speed Networks 22 (1), 55-64
, 2016
8
2016
Robust detection of android UI similarity
J Mao, J Bian, H Ma, Y Jia, Z Liang, X Jiang
2018 IEEE International Conference on Communications (ICC), 1-6
, 2018
7
2018
Robust Synchronous P2P Primitives Using SGX Enclaves.
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
IACR Cryptol. ePrint Arch. 2017, 180
, 2017
7
2017
PRO-ORAM: Constant latency read-only oblivious RAM
S Tople, Y Jia, P Saxena
Cryptology ePrint Archive
, 2018
5
2018
Robust {P2P} Primitives Using {SGX} Enclaves
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2020
2
2020
A function-level behavior model for anomalous behavior detection in hybrid mobile applications
J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang
2016 International Conference on Identification, Information and Knowledge …
, 2016
2
2016
I Know Where You’ve Been
Y Jia, X Dong, Z Liang, P Saxena
系统目前无法执行此操作,请稍后再试。
文章 1–20
展开
隐私权
条款
帮助
关于学术搜索
Google 搜索帮助