Xiao-yong Zhou

According to our database1, Xiao-yong Zhou authored at least 18 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2015
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Screenmilker: How to Milk Your Android Screen for Secrets.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Mayhem in the Push Clouds: Understanding and Mitigating Security Hazards in Mobile Push-Messaging Services.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Identity, location, disease and more: inferring your secrets from android public resources.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones.
Proceedings of the Network and Distributed System Security Symposium, 2011

To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data.
Proceedings of the Computer Security - ESORICS 2011, 2011

Sedic: privacy-aware data intensive computing on hybrid clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2009
Effective and Efficient Malware Detection at the End Host.
Proceedings of the 18th USENIX Security Symposium, 2009

Learning your identity and disease from research papers: information leaks in genome wide association study.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2007
Solving P2P Traffic Identification Problems Via Optimized Support Vector Machines.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Solving the App-Level Classification Problem of P2P Traffic Via Optimized Support Vector Machines.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006


  Loading...