XiaoFeng Wang
XiaoFeng Wang
James H. Rudy Professor of Computer Science, Indiana University at Bloomington
Email verificata su indiana.edu - Home page
Titolo
Citata da
Citata da
Anno
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
5482009
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
NDSS 11, 17-33, 2011
4932011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
3992010
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
3832014
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
2012 IEEE Symposium on Security and Privacy, 365-379, 2012
2722012
Defending against denial-of-service attacks with puzzle auctions
XF Wang, MK Reiter
2003 Symposium on Security and Privacy, 2003., 78-92, 2003
2682003
Reinforcement learning to play an optimal Nash equilibrium in team Markov games
X Wang, T Sandholm
Advances in neural information processing systems, 1603-1610, 2003
2372003
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
2342011
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
2162009
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
2072012
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
182*2015
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
1762015
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
1762013
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
1452017
How to Shop for Free Online--Security Analysis of Cashier-as-a-Service Based Web Stores
R Wang, S Chen, XF Wang, S Qadeer
Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011
1302011
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
1242014
Mitigating bandwidth-exhaustion attacks using congestion puzzles
XF Wang, MK Reiter
Proceedings of the 11th ACM conference on Computer and communicationsá…, 2004
1212004
Privacy loss in apple's implementation of differential privacy on macos 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
1162017
Screenmilker: How to Milk Your Android Screen for Secrets.
CC Lin, H Li, X Zhou, XF Wang
NDSS, 2014
1162014
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
1122014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20