Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 721 | 2009 |
The tangled web of password reuse. A Das, J Bonneau, M Caesar, N Borisov, XF Wang NDSS 14 (2014), 23-26, 2014 | 634 | 2014 |
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang NDSS 11, 17-33, 2011 | 591 | 2011 |
Side-channel leaks in web applications: A reality today, a challenge tomorrow S Chen, R Wang, XF Wang, K Zhang 2010 IEEE Symposium on Security and Privacy, 191-206, 2010 | 549 | 2010 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 439 | 2017 |
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ... NDSS, 2018 | 397 | 2018 |
Reinforcement learning to play an optimal Nash equilibrium in team Markov games X Wang, T Sandholm Advances in neural information processing systems 15, 2002 | 377 | 2002 |
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services R Wang, S Chen, XF Wang 2012 IEEE Symposium on Security and Privacy, 365-379, 2012 | 347 | 2012 |
Privacy in the genomic era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015 | 345 | 2015 |
Acing the ioc game: Toward automatic discovery and analysis of open-source cyber threat intelligence X Liao, K Yuan, XF Wang, Z Li, L Xing, R Beyah Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 340 | 2016 |
Learning your identity and disease from research papers: information leaks in genome wide association study R Wang, YF Li, XF Wang, H Tang, X Zhou Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 334 | 2009 |
Privacy loss in apple's implementation of differential privacy on macos 10.12 J Tang, A Korolova, X Bai, X Wang, X Wang arXiv preprint arXiv:1709.02753, 2017 | 327 | 2017 |
Understanding membership inferences on well-generalized learning models Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ... arXiv preprint arXiv:1802.04889, 2018 | 324* | 2018 |
Knowing your enemy: understanding and detecting malicious web advertising Z Li, K Zhang, Y Xie, F Yu, XF Wang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 321 | 2012 |
Defending against denial-of-service attacks with puzzle auctions XF Wang, MK Reiter 2003 Symposium on Security and Privacy, 2003., 78-92, 2003 | 305 | 2003 |
Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian 2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019 | 299* | 2019 |
{SmartAuth}:{User-Centered} authorization for the internet of things Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague 26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017 | 290 | 2017 |
Finding unknown malice in 10 seconds: Mass vetting for new threats at the {Google-Play} scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015 | 281 | 2015 |
Sedic: privacy-aware data intensive computing on hybrid clouds K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 280 | 2011 |
{CommanderSong}: A systematic approach for practical adversarial voice recognition X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ... 27th USENIX security symposium (USENIX security 18), 49-64, 2018 | 277 | 2018 |