Lianying Zhao

Orcid: 0000-0002-6376-4062

According to our database1, Lianying Zhao authored at least 17 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.
CoRR, 2024

2023
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

vWitness: Certifying Web Page Interactions with Computer Vision.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

VIET: A Tool for Extracting Essential Information from Vulnerability Descriptions for CVSS Evaluation.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

The Flaw Within: Identifying CVSS Score Discrepancies in the NVD.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2023

2022
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
Emilia: Catching Iago in Legacy Code.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Towards 5G-ready Security Metrics.
Proceedings of the ICC 2021, 2021

2020
Is Hardware More Secure Than Software?
IEEE Secur. Priv., 2020

2019
SoK: Hardware Security Support for Trustworthy Execution.
CoRR, 2019

TEE-aided Write Protection Against Privileged Data Tampering.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

One-Time Programs Made Practical.
Proceedings of the Financial Cryptography and Data Security, 2019

Using Inputs and Context to Verify User Intentions in Internet Services.
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 2019

2016
Deceptive Deletion Triggers Under Coercion.
IEEE Trans. Inf. Forensics Secur., 2016

Hypnoguard: Protecting Secrets across Sleep-wake Cycles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Gracewipe: Secure and Verifiable Deletion under Coercion.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2013
Explicit authentication response considered harmful.
Proceedings of the New Security Paradigms Workshop, 2013


  Loading...