Yuan Tian

Orcid: 0000-0002-6435-564X

Affiliations:
  • University of California, Los Angeles, CA, USA
  • University of Virginia, Charlottesville, VA, USA
  • Carnegie Mellon University, Pittsburgh, PA, USA (former)


According to our database1, Yuan Tian authored at least 79 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Where have you been? A Study of Privacy Risk for Point-of-Interest Recommendation.
CoRR, 2023

SoK: Pitfalls in Evaluating Black-Box Attacks.
CoRR, 2023

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
CoRR, 2023

When Can Linear Learners be Robust to Indiscriminate Poisoning Attacks?
CoRR, 2023

ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Extended version).
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Usable Security Analysis Tools for Trigger-Action Programming.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

CHKPLUG: Checking GDPR Compliance of WordPress Plugins via Cross-language Code Property Graph.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023

Exploring Smart Commercial Building Occupants' Perceptions and Notification Preferences of Internet of Things Data Collection in the United States.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

Retrieval Enhanced Data Augmentation for Question Answering on Privacy Policies.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

Towards Usable Parental Control for Voice Assistants.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

MVAM: Multi-variant Attacks on Memory for IoT Trust Computing.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

PLUE: Language Understanding Evaluation Benchmark for Privacy Policies in English.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

2022
SkillBot: Identifying Risky Content for Children in Alexa Skills.
ACM Trans. Internet Techn., 2022

TransRisk: Mobility Privacy Risk Prediction based on Transferred Knowledge.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
CoRR, 2022

Is Your Policy Compliant?: A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022

ML-FEED: Machine Learning Framework for Efficient Exploit Detection.
Proceedings of the 4th IEEE International Conference on Trust, 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Conditional Supervised Contrastive Learning for Fair Text Classification.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Towards Return Parity in Markov Decision Processes.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU.
IACR Cryptol. ePrint Arch., 2021

A Graduate Curriculum in Cyber-Physical Systems.
IEEE Des. Test, 2021

Automated Detection of GDPR Disclosure Requirements in Privacy Policies using Deep Active Learning.
CoRR, 2021

OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations.
CoRR, 2021

Meta Federated Learning.
CoRR, 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

Hardware/Software Security Patches for the Internet of Things.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Model-Targeted Poisoning Attacks with Provable Convergence.
Proceedings of the 38th International Conference on Machine Learning, 2021

Understanding and Mitigating Accuracy Disparity in Regression.
Proceedings of the 38th International Conference on Machine Learning, 2021

SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Intent Classification and Slot Filling for Privacy Policies.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Curse or Redemption? How Data Heterogeneity Affects the Robustness of Federated Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
VerHealth: Vetting Medical Voice Applications through Policy Enforcement.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

StopGuessing: Using Guessed Passwords to Thwart Online Password Guessing.
IEEE Secur. Priv., 2020

Model-Targeted Poisoning Attacks: Provable Convergence and Certified Bounds.
CoRR, 2020

Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks.
Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems, 2020

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited Queries.
Proceedings of the 29th USENIX Security Symposium, 2020

Trade-offs and Guarantees of Adversarial Representation Learning for Information Obfuscation.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

TKPERM: Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

PolicyQA: A Reading Comprehension Dataset for Privacy Policies.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Adversarial Task-Specific Privacy Preservation under Attribute Attack.
CoRR, 2019

Hardware/Software Security Patches for Internet of Trillions of Things.
CoRR, 2019

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019

Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Demystifying Hidden Privacy Settings in Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Side Channel Attacks in Computation Offloading Systems with GPU Virtualization.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Detecting Abnormal Behaviors in Smart Home.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

OAUTHLINT: An Empirical Study on OAuth Bugs in Android Applications.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Flame and Smoke Detection in Substation Based on Wavelet Analysis and Convolution Neural Network.
Proceedings of the ICIAI 2019: The 3rd International Conference on Innovation in Artificial Intelligence, 2019

StopGuessing: Using Guessed Passwords to Thwart Online Guessing.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2018
Privacy Preserving Information Sharing in Modern and Emerging Platforms.
PhD thesis, 2018

Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase.
CoRR, 2018

Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home.
CoRR, 2018

Sensibility Testbed: Automated IRB Policy Enforcement in Mobile Research Apps.
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
Query-limited Black-box Attacks to Classifiers.
CoRR, 2017

Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

SmartAuth: User-Centered Authorization for the Internet of Things.
Proceedings of the 26th USENIX Security Symposium, 2017

IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

EchoSafe: Sonar-based Verifiable Interaction with Intelligent Digital Agents.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

2016
Swords and shields: a study of mobile game hacks and existing defenses.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

The Activity Platform.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Supporting Privacy-Conscious App Update Decisions with User Reviews.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2014
PrivateDroid: Private Browsing Mode for Android.
Proceedings of the 13th IEEE International Conference on Trust, 2014

All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Analyzing the dangers posed by Chrome extensions.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

OAuth Demystified for Mobile Application Developers.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

UnLocIn: Unauthorized location inference on smartphones without being caught.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013


  Loading...