Side-channel leaks in web applications: A reality today, a challenge tomorrow S Chen, R Wang, XF Wang, K Zhang Security and Privacy (SP), 2010 IEEE Symposium on, 191-206, 2010 | 549 | 2010 |
Signing me onto your accounts through Facebook and Google: a traffic-guided security study of commercially deployed single-sign-on web services R Wang, S Chen, XF Wang Security and Privacy (SP), 2012 IEEE Symposium on, 365-379, 2012 | 347 | 2012 |
Learning your identity and disease from research papers: information leaks in genome wide association study R Wang, YF Li, XF Wang, H Tang, X Zhou Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 334 | 2009 |
How to shop for free online--Security analysis of cashier-as-a-service based Web stores R Wang, S Chen, XF Wang, S Qadeer Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011 | 179 | 2011 |
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating L Xing, X Pan, R Wang, K Yuan, XF Wang Security and Privacy (SP), 2014 IEEE Symposium on, 393-408, 2014 | 169 | 2014 |
Brahmastra: Driving Apps to Test the Security of Third-Party Components. R Bhoraskar, S Han, J Jeon, T Azim, S Chen, J Jung, S Nath, R Wang, ... USENIX Security, 1021-1036, 2014 | 156 | 2014 |
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. R Wang, Y Zhou, S Chen, S Qadeer, D Evans, Y Gurevich USENIX Security 13, 2013 | 129 | 2013 |
Unauthorized origin crossing on mobile platforms: Threats and mitigation R Wang, L Xing, XF Wang, S Chen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 127 | 2013 |
Privacy-preserving genomic computation through program specialization R Wang, XF Wang, Z Li, H Tang, MK Reiter, Z Dong Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 109 | 2009 |
Sidebuster: automated detection and quantification of side-channel leaks in web application development K Zhang, Z Li, R Wang, XF Wang, S Chen Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 85 | 2010 |
Solving the app-level classification problem of P2P traffic via optimized support vector machines R Wang, Y Liu, Y Yang, X Zhou Intelligent Systems Design and Applications, 2006. ISDA'06. Sixth …, 2006 | 68 | 2006 |
Solving p2p traffic identification problems via optimized support vector machines Y Yang, R Wang, Y Liu, X Zhou Computer Systems and Applications, 2007. AICCSA'07. IEEE/ACS International …, 2007 | 34 | 2007 |
An improvement of one-against-one method for multi-class support vector machine Y Liu, R Wang, YS Zeng Machine Learning and Cybernetics, 2007 International Conference on 5, 2915-2920, 2007 | 31 | 2007 |
Towards automatic reverse engineering of software security configurations R Wang, XF Wang, K Zhang, Z Li Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 29 | 2008 |
Identifying implicit assumptions associated with a software product R Wang, Y Zhou, S Chen, S Qadeer, Y Gurevich US Patent 9,372,785, 2016 | 25 | 2016 |
Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software. R Wang, XF Wang, Z Li USENIX Security Symposium, 291-306, 2008 | 24 | 2008 |
Applying support vector machine to P2P traffic identification with smooth processing Y Liu, R Wang, H Huang, Y Zeng, H He Signal Processing, 2006 8th International Conference on 3, 2006 | 20 | 2006 |
P2P 流量检测技术初探 王逸欣, 王锐, 樊爱华, 唐川 计算机与数字工程 34 (6), 161-164, 2006 | 18 | 2006 |
Securing multiparty online services via certification of symbolic transactions EY Chen, S Chen, S Qadeer, R Wang Security and Privacy (SP), 2015 IEEE Symposium on, 833-849, 2015 | 16 | 2015 |
一种跨层 P2P 流量检测方法 王锐, 王逸欣, 樊爱华, 杨岳湘 计算机应用, 30-32, 2006 | 10 | 2006 |