Articles with public access mandates - Yuan TianLearn more
Not available anywhere: 1
Privacy-preserving Liveness Detection for Securing Smart Voice Interfaces
Y Meng, J Li, H Zhu, Y Tian, J Chen
IEEE Transactions on Dependable and Secure Computing, 2023
Mandates: US National Science Foundation, National Natural Science Foundation of China
Available somewhere: 40
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems
N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian
2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019
Mandates: US National Science Foundation, US Department of Defense
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
Usenix Security, 2017
Mandates: US National Science Foundation, US Department of Defense
CryptGPU: Fast privacy-preserving machine learning on the GPU
S Tan, B Knott, Y Tian, DJ Wu
2021 IEEE Symposium on Security and Privacy (SP), 1021-1038, 2021
Mandates: US National Science Foundation
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
Mandates: National Natural Science Foundation of China
Hybrid batch attacks: Finding black-box adversarial examples with limited queries
F Suya, J Chi, D Evans, Y Tian
29th USENIX Security Symposium (USENIX Security 20), 1327-1344, 2020
Mandates: US National Science Foundation
Curse or redemption? how data heterogeneity affects the robustness of federated learning
S Zawad, A Ali, PY Chen, A Anwar, Y Zhou, N Baracaldo, Y Tian, F Yan
Proceedings of the AAAI conference on artificial intelligence 35 (12), 10807 …, 2021
Mandates: US National Science Foundation
Your microphone array retains your identity: A robust voice liveness detection system for smart speakers
Y Meng, J Li, M Pillari, A Deopujari, L Brennan, H Shamsie, H Zhu, Y Tian
31st USENIX Security Symposium (USENIX Security 22), 1077-1094, 2022
Mandates: US National Science Foundation, National Natural Science Foundation of China
Model-targeted poisoning attacks with provable convergence
F Suya, S Mahloujifar, A Suri, D Evans, Y Tian
International Conference on Machine Learning, 10000-10010, 2021
Mandates: US National Science Foundation
Demystifying Hidden Privacy Settings in Mobile Apps
Y Chen, K Chen, XF Wang, W Zou, M Zha, N Zhang, D Xu, Q Zhao, ...
40th IEEE Symposium on Security and Privacy (Oakland), 2019
Mandates: US National Science Foundation, US Department of Defense, Chinese Academy of …
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols
Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ...
30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021
Mandates: Chinese Academy of Sciences, National Natural Science Foundation of China
Using sonar for liveness detection to protect smart speakers against remote attackers
Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ...
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020
Mandates: US National Science Foundation, Chinese Academy of Sciences, National …
Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems
FH Shezan, H Hu, J Wang, G Wang, Y Tian
WWW, 2020
Mandates: US National Science Foundation
Oauthlint: An empirical study on oauth bugs in android applications
T Al Rahat, Y Feng, Y Tian
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Mandates: US National Science Foundation
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware
B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ...
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
Mandates: US National Science Foundation, National Natural Science Foundation of China
Trade-offs and guarantees of adversarial representation learning for information obfuscation
H Zhao, J Chi, Y Tian, GJ Gordon
Advances in Neural Information Processing Systems 33, 9485-9496, 2020
Mandates: US National Science Foundation, US Department of Defense
{iOS}, your {OS}, everybody's {OS}: Vetting and analyzing network services of {iOS} applications
Z Tang, K Tang, M Xue, Y Tian, S Chen, M Ikram, T Wang, H Zhu
29th USENIX Security Symposium (USENIX Security 20), 2415-2432, 2020
Mandates: National Natural Science Foundation of China
Echosafe: Sonar-based verifiable interaction with intelligent digital agents
A Alanwar, B Balaji, Y Tian, S Yang, M Srivastava
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 38-43, 2017
Mandates: US National Science Foundation
Skillbot: Identifying risky content for children in alexa skills
T Le, DY Huang, N Apthorpe, Y Tian
ACM Transactions on Internet Technology (TOIT) 22 (3), 1-31, 2022
Mandates: US National Science Foundation
Understanding and mitigating accuracy disparity in regression
J Chi, Y Tian, GJ Gordon, H Zhao
International conference on machine learning, 1866-1876, 2021
Mandates: US National Science Foundation, US Department of Defense
Publication and funding information is determined automatically by a computer program