Yaoqi Jia

According to our database1, Yaoqi Jia authored at least 19 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Robust P2P Primitives Using SGX Enclaves.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

2019
PRO-ORAM: Practical Read-Only Oblivious RAM.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TraffickStop: Detecting and Measuring Illicit Traffic Monetization Through Large-Scale DNS Analysis.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
PRO-ORAM: Constant Latency Read-Only Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Robust Detection of Android UI Similarity.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Toward Exposing Timing-Based Probing Attacks in Web Applications.
Sensors, 2017

Robust Synchronous P2P Primitives Using SGX Enclaves.
IACR Cryptol. ePrint Arch., 2017

2016
Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation.
Proc. Priv. Enhancing Technol., 2016

Detecting injected behaviors in HTML5-based Android applications.
J. High Speed Networks, 2016

Automatic permission inference for hybrid mobile apps.
J. High Speed Networks, 2016

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System.
Proceedings of the 25th USENIX Security Symposium, 2016

A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016

"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
I Know Where You've Been: Geo-Inference Attacks via the Browser Cache.
IEEE Internet Comput., 2015

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Comput. Secur., 2015

Web-to-Application Injection Attacks on Android: Characterization and Detection.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

DroidVault: A Trusted Data Vault for Android Devices.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014


  Loading...