Rui Wang
Rui Wang
Indiana University, Microsoft Research, AppBugs Inc
Email verificata su indiana.edu - Home page
Titolo
Citata da
Citata da
Anno
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
Security and Privacy (SP), 2010 IEEE Symposium on, 191-206, 2010
4152010
Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
Security and Privacy (SP), 2012 IEEE Symposium on, 365-379, 2012
2772012
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communications …, 2009
2272009
How to shop for free online--Security analysis of cashier-as-a-service based Web stores
R Wang, S Chen, XF Wang, S Qadeer
Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011
1372011
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
Security and Privacy (SP), 2014 IEEE Symposium on, 393-408, 2014
1272014
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
R Bhoraskar, S Han, J Jeon, T Azim, S Chen, J Jung, S Nath, R Wang, ...
USENIX Security, 1021-1036, 2014
1182014
Unauthorized origin crossing on mobile platforms: Threats and mitigation
R Wang, L Xing, XF Wang, S Chen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1042013
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
R Wang, Y Zhou, S Chen, S Qadeer, D Evans, Y Gurevich
USENIX Security 13, 2013
982013
Privacy-preserving genomic computation through program specialization
R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong
Proceedings of the 16th ACM conference on Computer and communications …, 2009
962009
Sidebuster: automated detection and quantification of side-channel leaks in web application development
K Zhang, Z Li, R Wang, XF Wang, S Chen
Proceedings of the 17th ACM conference on Computer and communications …, 2010
652010
Solving the app-level classification problem of P2P traffic via optimized support vector machines
R Wang, Y Liu, Y Yang, X Zhou
Intelligent Systems Design and Applications, 2006. ISDA'06. Sixth …, 2006
592006
Solving p2p traffic identification problems via optimized support vector machines
Y Yang, R Wang, Y Liu, X Zhou
Computer Systems and Applications, 2007. AICCSA'07. IEEE/ACS International …, 2007
322007
Identifying implicit assumptions associated with a software product
R Wang, Y Zhou, S Chen, S Qadeer, Y Gurevich
US Patent 9,372,785, 2016
232016
An improvement of one-against-one method for multi-class support vector machine
Y Liu, R Wang, YS Zeng
Machine Learning and Cybernetics, 2007 International Conference on 5, 2915-2920, 2007
232007
Towards automatic reverse engineering of software security configurations
R Wang, XF Wang, K Zhang, Z Li
Proceedings of the 15th ACM conference on Computer and communications …, 2008
222008
P2P 流量检测技术初探
王逸欣, 王锐, 樊爱华, 唐川
计算机与数字工程 34 (6), 161-164, 2006
202006
Applying support vector machine to P2P traffic identification with smooth processing
Y Liu, R Wang, H Huang, Y Zeng, H He
Signal Processing, 2006 8th International Conference on 3, 2006
182006
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software.
R Wang, XF Wang, Z Li
USENIX Security Symposium, 291-306, 2008
152008
Securing multiparty online services via certification of symbolic transactions
EY Chen, S Chen, S Qadeer, R Wang
Security and Privacy (SP), 2015 IEEE Symposium on, 833-849, 2015
122015
一种跨层 P2P 流量检测方法
王锐, 王逸欣, 樊爱华, 杨岳湘
计算机应用, 30-32, 2006
102006
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20