Folgen
Jingyu Qian
Jingyu Qian
Bestätigte E-Mail-Adresse bei illinois.edu
Titel
Zitiert von
Zitiert von
Jahr
See no evil: phishing for permissions with false transparency
GS Tuncay, J Qian, CA Gunter
29th USENIX Security Symposium (USENIX Security 20), 415-432, 2020
222020
A survey on common threats in npm and pypi registries
B Kaplan, J Qian
Deployable Machine Learning for Security Defense: Second International …, 2021
182021
Dedos: Defusing dos with dispersion oriented software
HM Demoulin, T Vaidya, I Pedisich, B DiMaiolo, J Qian, C Shah, Y Zhang, ...
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
132018
A survey on sentiment classification in face recognition
J Qian
Journal of Physics: Conference Series 960 (1), 012030, 2018
82018
Attacks on visualization-based malware detection: Balancing effectiveness and executability
H Benkraouda, J Qian, HQ Tran, B Kaplan
International Workshop on Deployable Machine Learning for Security Defense …, 2021
42021
A demonstration of the dedos platform for defusing asymmetric ddos attacks in data centers
HM Demoulin, T Vaidya, I Pedisich, N Sultana, B Wang, J Qian, Y Zhang, ...
Proceedings of the SIGCOMM Posters and Demos, 71-73, 2017
42017
A Tagging Solution to Discover IoT Devices in Apartments
B Kaplan, IJ Lopez-Toledo, C Gunter, J Qian
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
2023
Designing and Evaluating a Testbed for the Matter Protocol: Insights into User Experience
R Mangar, J Qian, W Zegeye, A AlRabah, B Civjan, S Sundram, S Yuan, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–8