Privacy leakage analysis in online social networks Y Li, Y Li, Q Yan, RH Deng Computers & Security 49, 239-254, 2015 | 83 | 2015 |
On limitations of designing leakage-resilient password systems: Attacks, principles and usability Q Yan, J Han, Y Li, RH Deng Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012 | 72* | 2012 |
Understanding OSN-based facial disclosure against face authentication systems Y Li, K Xu, Q Yan, Y Li, RH Deng Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 70 | 2014 |
Designing leakage-resilient password entry on touchscreen mobile devices Q Yan, J Han, Y Li, J Zhou, RH Deng Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 63 | 2013 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013 | 61 | 2013 |
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication Y Li, Y Li, Q Yan, H Kong, RH Deng Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 42 | 2015 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou International Conference on Applied Cryptography and Network Security, 272-289, 2013 | 33 | 2013 |
Towards semantically secure outsourcing of association rule mining on categorical data J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan Information Sciences 267, 267-286, 2014 | 27 | 2014 |
Insights into malware detection and prevention on mobile phones Q Yan, Y Li, T Li, R Deng International Conference on Security Technology, 242-249, 2009 | 26 | 2009 |
A software-based root-of-trust primitive on multicore platforms Q Yan, J Han, Y Li, RH Deng, T Li Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 23 | 2011 |
Empirical study of face authentication systems under OSNFD attacks Y Li, Y Li, K Xu, Q Yan, RH Deng IEEE Transactions on Dependable and Secure Computing 15 (2), 231-245, 2016 | 22 | 2016 |
Leakage-resilient password entry: challenges, design, and evaluation Q Yan, J Han, Y Li, J Zhou, RH Deng Computers & Security 48, 196-211, 2015 | 20 | 2015 |
On the potential of limitation-oriented malware detection and prevention techniques on mobile phones Q Yan, RH Deng, Y Li, T Li International journal of security and its applications 4 (1), 21, 2010 | 16 | 2010 |
Pseudonym-based rfid discovery service to mitigate unauthorized tracking in supply chain management Q Yan, RH Deng, Z Yan, Y Li, T Li 2010 Second International Symposium on Data, Privacy, and E-Commerce, 21-26, 2010 | 9 | 2010 |
Anti-tracking in rfid discovery service for dynamic supply chain systems Q Yan, Y Li, RH Deng International Journal of RFID Security and Cryptography (IJRFIDSC) 1 (1/2 …, 2012 | 8 | 2012 |
Android or iOS for better privacy protection?(2014) J Han, Q Yan, D Gao, J Zhou, HR DENG International Conference on Secure Knowledge Mangagement in Big-data era …, 2014 | 6* | 2014 |
Outbreak of hepatitis E among aged people in a nursing home K Xu, A WANG, J ZHANG, H TIAN, Q YAN, Z WU, J ZHANG, X ZHANG, ... Chinese Journal of Zoonoses 28, 306-309, 2012 | 4 | 2012 |
On detection of erratic arguments J Han, Q Yan, RH Deng, D Gao International Conference on Security and Privacy in Communication Systems …, 2011 | 4 | 2011 |
A comprehensive study for rfid malwares on mobile devices Q Yan, Y Li, T Li, RH DENG 5th Workshop on RFID Security, 2009 | 4 | 2009 |
Think twice before you share: Analyzing privacy leakage under privacy control in online social networks Y Li, Y Li, Q Yan, RH Deng International Conference on Network and System Security, 671-677, 2013 | 1 | 2013 |