Follow
Kan Yuan
Kan Yuan
Indiana University Computer Science Department
Verified email at indiana.edu
Title
Cited by
Cited by
Year
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
NDSS, 2015
3432015
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2082016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
1552014
Leave me alone: App-level protection against runtime information gathering on android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy, 915-930, 2015
972015
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd USENIX Security Symposium (USENIX Security 14), 207-222, 2014
732014
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
612017
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
International Conference on Internet and Distributed Computing Systems, 146-159, 2012
592012
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
372016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
352019
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
292018
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
182016
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
162016
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
142019
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
142018
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent 10,685,142, 2020
92020
A novel method for power analysis based on combinational logic in block cipher circuit
Z GUO, D GU, K YUAN, J LIU, Y HE
Chinese Journal of Electronics 23 (1), 151-156, 2014
52014
A Highly Efficient Correlation Power Analysis on PRINT Cipher
K Yuan, D Gu, Z Guo, S Bao
2012 Eighth International Conference on Computational Intelligence and …, 2012
42012
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1 (1), 1-18, 2018
32018
Understanding iot security through the data crystal ball: Where we are now and where weare going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
Scanning Electron Microsc Meet at, 2017
32017
Systems and Methods for Detection of Infected Websites
X Wang, K Yuan, X Liao, RA Beyah
2020
The system can't perform the operation now. Try again later.
Articles 1–20