Yuqiong Sun

According to our database1, Yuqiong Sun authored at least 14 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference.
Proceedings of the 32nd USENIX Security Symposium, 2023

2020
Learning Context-Aware Policies from Multiple Smart Homes via Federated Multi-Task Learning.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

2019
Looking from the Mirror: Evaluating IoT Device Security through Mobile Companion Apps.
Proceedings of the 28th USENIX Security Symposium, 2019

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Security Namespace: Making Linux Security Frameworks Available to Containers.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Aware: Controlling App Access to I/O Devices on Mobile Platforms.
CoRR, 2016

Pileus: protecting user resources from vulnerable cloud services.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Security-as-a-Service for Microservices-Based Cloud Applications.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Inevitable Failure: The Flawed Trust Assumption in the Cloud.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds.
Proceedings of the IEEE Ninth World Congress on Services, 2013

2010
Design and Implementation of Dual AIK Signing Scheme in Virtual TPM.
Proceedings of the Third International Symposium on Parallel Architectures, 2010


  Loading...