XiaoFeng Wang
XiaoFeng Wang
James H. Rudy Professor of Computer Science, Indiana University at Bloomington
Email verificata su indiana.edu - Home page
Citata da
Citata da
Effective and efficient malware detection at the end host.
C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang
USENIX security symposium 4 (1), 351-366, 2009
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang
NDSS 11, 17-33, 2011
Side-channel leaks in web applications: A reality today, a challenge tomorrow
S Chen, R Wang, XF Wang, K Zhang
2010 IEEE Symposium on Security and Privacy, 191-206, 2010
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
R Wang, S Chen, XF Wang
2012 IEEE Symposium on Security and Privacy, 365-379, 2012
Defending against denial-of-service attacks with puzzle auctions
XF Wang, MK Reiter
2003 Symposium on Security and Privacy, 2003., 78-92, 2003
Reinforcement learning to play an optimal Nash equilibrium in team Markov games
X Wang, T Sandholm
Advances in neural information processing systems, 1603-1610, 2003
Sedic: privacy-aware data intensive computing on hybrid clouds
K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
Learning your identity and disease from research papers: information leaks in genome wide association study
R Wang, YF Li, XF Wang, H Tang, X Zhou
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
Knowing your enemy: understanding and detecting malicious web advertising
Z Li, K Zhang, Y Xie, F Yu, XF Wang
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale
K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015
Identity, location, disease and more: Inferring your secrets from android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
How to Shop for Free Online--Security Analysis of Cashier-as-a-Service Based Web Stores
R Wang, S Chen, XF Wang, S Qadeer
Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011
Privacy loss in apple's implementation of differential privacy on macos 10.12
J Tang, A Korolova, X Bai, X Wang, X Wang
arXiv preprint arXiv:1709.02753, 2017
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
Mitigating bandwidth-exhaustion attacks using congestion puzzles
XF Wang, MK Reiter
Proceedings of the 11th ACM conference on Computer and communicationsá…, 2004
The peril of fragmentation: Security hazards in android device driver customizations
X Zhou, Y Lee, N Zhang, M Naveed, XF Wang
2014 IEEE Symposium on Security and Privacy, 409-423, 2014
Screenmilker: How to Milk Your Android Screen for Secrets.
CC Lin, H Li, X Zhou, XF Wang
NDSS, 2014
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20