Follow
Huangyi Ge
Huangyi Ge
Verified email at purdue.edu
Title
Cited by
Cited by
Year
P3DB 3.0: from plant phosphorylation sites to protein networks
Q Yao, H Ge, S Wu, N Zhang, W Chen, C Xu, J Gao, JJ Thelen, D Xu
Nucleic Acids Research 42 (D1), D1206-D1213, 2014
772014
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations
SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li
2017 IEEE Symposium on Security and Privacy (SP), 503-520, 2017
692017
Influence of privacy priming and security framing on mobile app selection
I Chong, H Ge, N Li, RW Proctor
Computers & Security 78, 143-154, 2018
332018
Display of major risk categories for android apps.
J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor
Journal of Experimental Psychology: Applied 24 (3), 306, 2018
152018
Cybersecurity for android applications: Permissions in android 5 and 6
SR Moore, H Ge, N Li, RW Proctor
International Journal of Human–Computer Interaction 35 (7), 630-640, 2019
132019
Koinonia: verifiable e-voting with long-term privacy
H Ge, SY Chau, VE Gonsalves, H Li, T Wang, X Zou, N Li
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
122019
Influence of privacy priming and security framing on Android app selection
I Chong, H Ge, N Li, RW Proctor
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61 (1 …, 2017
62017
Adaptive Deterrence of DNS Cache Poisoning
SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li
Security and Privacy in Communication Networks: 14th International …, 2018
52018
On the security and usability of segment-based visual cryptographic authentication protocols
T Wang, H Ge, O Chowdhury, HK Maji, N Li
Proceedings of the 2016 ACM SIGSAC Conference on computer and communications …, 2016
42016
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors
J Chen, H Ge, N Li, RW Proctor
Human factors 64 (8), 1331-1350, 2022
22022
MoNet: Impressionism As A Defense Against Adversarial Examples
H Ge, SY Chau, N Li
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
12020
Random spiking and systematic evaluation of defenses against adversarial examples
H Ge, SY Chau, B Ribeiro, N Li
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
12020
Safety Priming and Subsequent App Selection Behaviors
I Chong, H Ge, RW Proctor, N Li
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62 (1 …, 2018
12018
Using Randomness to Defend Against Adversarial Examples in Computer Vision
H Ge
Purdue University, 2022
2022
Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation
A Xiong, H Ge, W Zou, N Li, RW Proctor
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61 (1 …, 2017
2017
Display of Major Risk Categories for Mobile Apps
J Chen, H Ge, RW Proctor, N Li, W Yang
Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60 (1 …, 2016
2016
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-7281-8543-9/20/$31.00© 2020 IEEE| DOI: 10.1109 …
S Abuadbba, A Abusnaina, GJ Ahn, A Al-Alaj, M Anisetti, CA Ardagna, ...
Recall Accuracy of Self-generated Passwords with and without Generation Criteria Reminders
Q Zhong, H Ge, J Blocki, N Li, RW Proctor
An Empirical Study of Mnemonic Password Recall Errors
A Xiong, H Ge, RW Proctor, J Blocki, N Li
The system can't perform the operation now. Try again later.
Articles 1–19