Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 685 | 2009 |
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang NDSS 11, 17-33, 2011 | 589 | 2011 |
The tangled web of password reuse. A Das, J Bonneau, M Caesar, N Borisov, XF Wang NDSS 14 (2014), 23-26, 2014 | 573 | 2014 |
Side-channel leaks in web applications: A reality today, a challenge tomorrow S Chen, R Wang, XF Wang, K Zhang 2010 IEEE Symposium on Security and Privacy, 191-206, 2010 | 531 | 2010 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 369 | 2017 |
Reinforcement learning to play an optimal Nash equilibrium in team Markov games X Wang, T Sandholm Advances in neural information processing systems 15, 2002 | 336 | 2002 |
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services R Wang, S Chen, XF Wang 2012 IEEE Symposium on Security and Privacy, 365-379, 2012 | 331 | 2012 |
Learning your identity and disease from research papers: information leaks in genome wide association study R Wang, YF Li, XF Wang, H Tang, X Zhou Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 316 | 2009 |
Privacy in the genomic era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015 | 311 | 2015 |
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 297 | 2018 |
Knowing your enemy: understanding and detecting malicious web advertising Z Li, K Zhang, Y Xie, F Yu, XF Wang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 296 | 2012 |
Defending against denial-of-service attacks with puzzle auctions XF Wang, MK Reiter 2003 Symposium on Security and Privacy, 2003., 78-92, 2003 | 296 | 2003 |
Sedic: privacy-aware data intensive computing on hybrid clouds K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 275 | 2011 |
Privacy loss in apple's implementation of differential privacy on macos 10.12 J Tang, A Korolova, X Bai, X Wang, X Wang arXiv preprint arXiv:1709.02753, 2017 | 267 | 2017 |
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 264 | 2016 |
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th {USENIX} security symposium ({USENIX} security 15), 659-674, 2015 | 262 | 2015 |
SmartAuth: User-Centered Authorization for the Internet of Things. Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague USENIX Security Symposium 5 (1), 8.2, 2017 | 243 | 2017 |
Identity, location, disease and more: Inferring your secrets from android public resources X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 237 | 2013 |
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian 2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019 | 232* | 2019 |
Understanding membership inferences on well-generalized learning models Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ... arXiv preprint arXiv:1802.04889, 2018 | 232* | 2018 |