Follow
Kan Yuan
Kan Yuan
Indiana University Computer Science Department
Verified email at indiana.edu
Title
Cited by
Cited by
Year
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence
X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
3302016
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating
L Xing, X Pan, R Wang, K Yuan, XF Wang
2014 IEEE Symposium on Security and Privacy, 393-408, 2014
1712014
Systems and methods for detection of infected websites
X Wang, K Yuan, X Liao, RA Beyah
US Patent 10,880,330, 2020
1282020
Leave me alone: App-level protection against runtime information gathering on android
N Zhang, K Yuan, M Naveed, X Zhou, XF Wang
2015 IEEE Symposium on Security and Privacy, 915-930, 2015
1082015
Understanding the dark side of domain parking
S Alrwais, K Yuan, E Alowaisheq, Z Li, XF Wang
23rd USENIX Security Symposium (USENIX Security 14), 207-222, 2014
782014
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
742017
Efficient ciphertext-policy attribute based encryption with hidden policy
X Li, D Gu, Y Ren, N Ding, K Yuan
Internet and Distributed Computing Systems: 5th International Conference …, 2012
662012
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
622019
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces
K Yuan, H Lu, X Liao, XF Wang
27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018
542018
Seeking nonsense, looking for trouble: Efficient promotional-infection detection through semantic inconsistency search
X Liao, K Yuan, XF Wang, Z Pei, H Yang, J Chen, H Duan, K Du, ...
2016 IEEE Symposium on Security and Privacy (SP), 707-723, 2016
452016
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
312019
Lurking malice in the cloud: Understanding and detecting cloud repository as a malicious service
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
P Wang, X Mi, X Liao, XF Wang, K Yuan, F Qian, RA Beyah
NDSS, 2018
192018
Catching predators at watering holes: finding and understanding strategically compromised websites
S Alrwais, K Yuan, E Alowaisheq, X Liao, A Oprea, XF Wang, Z Li
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
182016
External resource control of mobile devices
X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter
US Patent 10,685,142, 2020
112020
Cloud repository as a malicious service: challenge, identification and implication
X Liao, S Alrwais, K Yuan, L Xing, XF Wang, S Hao, R Beyah
Cybersecurity 1, 1-18, 2018
82018
A novel method for power analysis based on combinational logic in block cipher circuit
Z GUO, D GU, K YUAN, J LIU, Y HE
Chinese Journal of Electronics 23 (1), 151-156, 2014
52014
A Highly Efficient Correlation Power Analysis on PRINT Cipher
K Yuan, D Gu, Z Guo, S Bao
2012 Eighth International Conference on Computational Intelligence and …, 2012
52012
Understanding iot security through the data crystal ball: Where we are now and where weare going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
Scanning Electron Microsc Meet at, 2017
12017
Fighting Cybercrime with Automatic Semantic Analysis
K Yuan
Indiana University, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20