Effective and efficient malware detection at the end host. C Kolbitsch, PM Comparetti, C Kruegel, E Kirda, X Zhou, XF Wang USENIX security symposium 4 (1), 351-366, 2009 | 591 | 2009 |
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. R Schlegel, K Zhang, X Zhou, M Intwala, A Kapadia, XF Wang NDSS 11, 17-33, 2011 | 504 | 2011 |
Side-channel leaks in web applications: A reality today, a challenge tomorrow S Chen, R Wang, XF Wang, K Zhang 2010 IEEE Symposium on Security and Privacy, 191-206, 2010 | 424 | 2010 |
The tangled web of password reuse. A Das, J Bonneau, M Caesar, N Borisov, XF Wang NDSS 14 (2014), 23-26, 2014 | 416 | 2014 |
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services R Wang, S Chen, XF Wang 2012 IEEE Symposium on Security and Privacy, 365-379, 2012 | 286 | 2012 |
Defending against denial-of-service attacks with puzzle auctions XF Wang, MK Reiter 2003 Symposium on Security and Privacy, 2003., 78-92, 2003 | 276 | 2003 |
Reinforcement learning to play an optimal Nash equilibrium in team Markov games X Wang, T Sandholm Advances in neural information processing systems 15, 1603-1610, 2002 | 254 | 2002 |
Sedic: privacy-aware data intensive computing on hybrid clouds K Zhang, X Zhou, Y Chen, XF Wang, Y Ruan Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 248 | 2011 |
Learning your identity and disease from research papers: information leaks in genome wide association study R Wang, YF Li, XF Wang, H Tang, X Zhou Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 232 | 2009 |
Knowing your enemy: understanding and detecting malicious web advertising Z Li, K Zhang, Y Xie, F Yu, XF Wang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 225 | 2012 |
Privacy in the genomic era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015 | 202* | 2015 |
Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th {USENIX} Security Symposium ({USENIX} Security 15), 659-674, 2015 | 197 | 2015 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 191 | 2017 |
Identity, location, disease and more: Inferring your secrets from android public resources X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 187 | 2013 |
Privacy loss in apple's implementation of differential privacy on macos 10.12 J Tang, A Korolova, X Bai, X Wang, X Wang arXiv preprint arXiv:1709.02753, 2017 | 141 | 2017 |
How to Shop for Free Online--Security Analysis of Cashier-as-a-Service Based Web Stores R Wang, S Chen, XF Wang, S Qadeer Security and Privacy (SP), 2011 IEEE Symposium on, 465-480, 2011 | 136 | 2011 |
Upgrading your android, elevating my malware: Privilege escalation through mobile os updating L Xing, X Pan, R Wang, K Yuan, XF Wang 2014 IEEE Symposium on Security and Privacy, 393-408, 2014 | 132 | 2014 |
Mitigating bandwidth-exhaustion attacks using congestion puzzles XF Wang, MK Reiter Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 129 | 2004 |
The peril of fragmentation: Security hazards in android device driver customizations X Zhou, Y Lee, N Zhang, M Naveed, XF Wang 2014 IEEE Symposium on Security and Privacy, 409-423, 2014 | 125 | 2014 |
Screenmilker: How to Milk Your Android Screen for Secrets. CC Lin, H Li, X Zhou, XF Wang NDSS, 2014 | 120 | 2014 |