The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved W Zhou, Y Jia, A Peng, Y Zhang, P Liu IEEE Internet of things Journal 6 (2), 1606-1616, 2018 | 536 | 2018 |
Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang 28th USENIX security symposium (USENIX security 19), 1133-1150, 2019 | 179 | 2019 |
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang 2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020 | 72 | 2020 |
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang 29th USENIX security symposium (USENIX security 20), 1183-1200, 2020 | 55 | 2020 |
Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution Y Yao, W Zhou, Y Jia, L Zhu, P Liu, Y Zhang Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 33 | 2019 |
Reviewing IoT security via logic bugs in IoT platforms and systems W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ... IEEE Internet of Things Journal 8 (14), 11621-11639, 2021 | 23 | 2021 |
Who's in control? On security risks of disjointed IoT device management channels Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 20 | 2021 |
物联网操作系统安全研究综述 彭安妮, 周威, 贾岩, 张玉清 Journal on Communication/Tongxin Xuebao 39 (3), 2018 | 12 | 2018 |
Survey of the Internet of things operating system security AN Peng, W ZHOU, Y Jia, Y Zhang Journal on Communications 39 (3), 22-34, 2018 | 11 | 2018 |
An incentive mechanism in expert-decision-based crowdsensing networks B Jia, H Gong, Z Zong, T Zhou, T Baker, A Al-Shamma’a, Y Jia Applied Soft Computing 122, 108834, 2022 | 9 | 2022 |
A whole-process WiFi security perception software system H Huang, Y Hu, Y Ja, S Ao 2017 International conference on circuits, system and simulation (ICCSS …, 2017 | 8 | 2017 |
P-verifier: Understanding and mitigating security risks in cloud-based iot access policies Z Jin, L Xing, Y Fang, Y Jia, B Yuan, Q Liu Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 7 | 2022 |
Birds of a feather flock together: How set bias helps to deanonymize you via revealed intersection sizes X Guo, Y Han, Z Liu, D Wang, Y Jia, J Li 31st USENIX Security Symposium (USENIX Security 22), 1487-1504, 2022 | 5 | 2022 |
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion Y Liu, Y Jia, Q Tan, Z Liu, L Xing 31st USENIX Security Symposium (USENIX Security 22), 863-880, 2022 | 5 | 2022 |
Security analysis of smart home based on life cycle Y Mao, X Li, Y Jia, S Zhao, Y Zhang 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019 | 4 | 2019 |
智能家居安全综述 王基策, 李意莲, 贾岩, 周威, 王宇成, 王鹤, 张玉清 计算机研究与发展 55 (10), 2111-2124, 2018 | 4 | 2018 |
Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure G Xu, X Ding, S Xu, Y Jia, S Liu, S Feng, X Zheng IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |
Towards comprehensively understanding the run-time security of programmable logic controllers: A 3-year empirical study R Ma, Q Wei, J Wang, S Zhu, S Ji, P Cheng, Y Jia, Q Wang arXiv preprint arXiv:2212.14296, 2022 | 2 | 2022 |
HTML5 新特性安全研究综述 张玉清, 贾岩, 雷柯楠, 吕少卿, 乐洪舟 计算机研究与发展 53 (10), 2163-2172, 2016 | 2 | 2016 |
Fuzzing Drone Control System Configurations Based on Quality-Diversity Enhanced Genetic Algorithm Z Chang, H Zhang, Y Yang, Y Jia, S Xu, T Li, Z Liu International Conference on Artificial Intelligence Security and Privacy …, 2023 | 1 | 2023 |