​
Login / Signup
Kan Yuan
Publication Activity (10 Years)
Years Active: 2009-2019
Publications (10 Years): 10
Top Topics
Mobile Apps
Ciphertext
Attribute Based Encryption
Information Gathering
Top Venues
IEEE Symposium on Security and Privacy
NDSS
USENIX Security Symposium
CCS
</>
Publications
</>
Kan Yuan
,
Di Tang
,
Xiaojing Liao
,
XiaoFeng Wang
,
Xuan Feng
,
Yi Chen
,
Menghan Sun
,
Haoran Lu
,
Kehuan Zhang
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
IEEE Symposium on Security and Privacy
(2019)
Yi Chen
,
Mingming Zha
,
Nan Zhang
,
Dandan Xu
,
Qianqian Zhao
,
Xuan Feng
,
Kan Yuan
,
Fnu Suya
,
Yuan Tian
,
Kai Chen
,
XiaoFeng Wang
,
Wei Zou
Demystifying Hidden Privacy Settings in Mobile Apps.
IEEE Symposium on Security and Privacy
(2019)
Kan Yuan
,
Haoran Lu
,
Xiaojing Liao
,
XiaoFeng Wang
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces.
USENIX Security Symposium
(2018)
Peng Wang
,
Xianghang Mi
,
Xiaojing Liao
,
XiaoFeng Wang
,
Kan Yuan
,
Feng Qian
,
Raheem A. Beyah
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
NDSS
(2018)
Xiaojing Liao
,
Sumayah A. Alrwais
,
Kan Yuan
,
Luyi Xing
,
XiaoFeng Wang
,
Shuang Hao
,
Raheem Beyah
Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur.
1 (1) (2018)
Nan Zhang
,
Soteris Demetriou
,
Xianghang Mi
,
Wenrui Diao
,
Kan Yuan
,
Peiyuan Zong
,
Feng Qian
,
XiaoFeng Wang
,
Kai Chen
,
Yuan Tian
,
Carl A. Gunter
,
Kehuan Zhang
,
Patrick Tague
,
Yue-Hsun Lin
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR
(2017)
Xiaojing Liao
,
Sumayah A. Alrwais
,
Kan Yuan
,
Luyi Xing
,
XiaoFeng Wang
,
Shuang Hao
,
Raheem A. Beyah
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
CCS
(2016)
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhongyu Pei
,
Hao Yang
,
Jianjun Chen
,
Hai-Xin Duan
,
Kun Du
,
Eihal Alowaisheq
,
Sumayah A. Alrwais
,
Luyi Xing
,
Raheem A. Beyah
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
IEEE Symposium on Security and Privacy
(2016)
Xiaojing Liao
,
Kan Yuan
,
XiaoFeng Wang
,
Zhou Li
,
Luyi Xing
,
Raheem A. Beyah
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
CCS
(2016)
Sumayah A. Alrwais
,
Kan Yuan
,
Eihal Alowaisheq
,
Xiaojing Liao
,
Alina Oprea
,
XiaoFeng Wang
,
Zhou Li
Catching predators at watering holes: finding and understanding strategically compromised websites.
ACSAC
(2016)
Nan Zhang
,
Kan Yuan
,
Muhammad Naveed
,
Xiao-yong Zhou
,
XiaoFeng Wang
Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android.
IEEE Symposium on Security and Privacy
(2015)
Soteris Demetriou
,
Xiao-yong Zhou
,
Muhammad Naveed
,
Yeonjoon Lee
,
Kan Yuan
,
XiaoFeng Wang
,
Carl A. Gunter
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
NDSS
(2015)
Sumayah A. Alrwais
,
Kan Yuan
,
Eihal Alowaisheq
,
Zhou Li
,
XiaoFeng Wang
Understanding the Dark Side of Domain Parking.
USENIX Security Symposium
(2014)
Luyi Xing
,
Xiaorui Pan
,
Rui Wang
,
Kan Yuan
,
XiaoFeng Wang
Upgrading Your Android, Elevating My Malware: Privilege Escalation through Mobile OS Updating.
IEEE Symposium on Security and Privacy
(2014)
Kan Yuan
,
Dawu Gu
,
Zheng Guo
,
Sigang Bao
A Highly Efficient Correlation Power Analysis on PRINT Cipher.
CIS
(2012)
Xiaohui Li
,
Dawu Gu
,
Yanli Ren
,
Ning Ding
,
Kan Yuan
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
IDCS
(2012)
Kan Yuan
,
Shousong Hu
Modeling of Self-Repairing Aircraft Based on Multi-agent System.
ICNC (5)
(2009)