P3DB 3.0: from plant phosphorylation sites to protein networks Q Yao, H Ge, S Wu, N Zhang, W Chen, C Xu, J Gao, JJ Thelen, D Xu Nucleic Acids Research 42 (D1), D1206-D1213, 2014 | 82 | 2014 |
Symcerts: Practical symbolic execution for exposing noncompliance in X. 509 certificate validation implementations SY Chau, O Chowdhury, E Hoque, H Ge, A Kate, C Nita-Rotaru, N Li 2017 IEEE symposium on security and privacy (SP), 503-520, 2017 | 75 | 2017 |
Influence of privacy priming and security framing on mobile app selection I Chong, H Ge, N Li, RW Proctor Computers & Security 78, 143-154, 2018 | 33 | 2018 |
Display of major risk categories for android apps. J Chen, H Ge, S Moore, W Yang, N Li, RW Proctor Journal of Experimental Psychology: Applied 24 (3), 306, 2018 | 15 | 2018 |
Cybersecurity for android applications: Permissions in android 5 and 6 SR Moore, H Ge, N Li, RW Proctor International Journal of Human–Computer Interaction 35 (7), 630-640, 2019 | 14 | 2019 |
Koinonia: verifiable e-voting with long-term privacy H Ge, SY Chau, VE Gonsalves, H Li, T Wang, X Zou, N Li Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 12 | 2019 |
Influence of privacy priming and security framing on Android app selection I Chong, H Ge, N Li, RW Proctor Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61 (1 …, 2017 | 6 | 2017 |
Adaptive deterrence of dns cache poisoning SY Chau, O Chowdhury, V Gonsalves, H Ge, W Yang, S Fahmy, N Li Security and Privacy in Communication Networks: 14th International …, 2018 | 5 | 2018 |
On the security and usability of segment-based visual cryptographic authentication protocols T Wang, H Ge, O Chowdhury, HK Maji, N Li Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 4 | 2016 |
What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors J Chen, H Ge, N Li, RW Proctor Human factors 64 (8), 1331-1350, 2022 | 2 | 2022 |
MoNet: Impressionism As A Defense Against Adversarial Examples H Ge, SY Chau, N Li 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 1 | 2020 |
Random spiking and systematic evaluation of defenses against adversarial examples H Ge, SY Chau, B Ribeiro, N Li Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 1 | 2020 |
Safety Priming and Subsequent App Selection Behaviors I Chong, H Ge, RW Proctor, N Li Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62 (1 …, 2018 | 1 | 2018 |
Using Randomness to Defend Against Adversarial Examples in Computer Vision H Ge Purdue University, 2022 | | 2022 |
Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation A Xiong, H Ge, W Zou, N Li, RW Proctor Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61 (1 …, 2017 | | 2017 |
Display of Major Risk Categories for Mobile Apps J Chen, H Ge, RW Proctor, N Li, W Yang Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60 (1 …, 2016 | | 2016 |
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-7281-8543-9/20/$31.00© 2020 IEEE| DOI: 10.1109 … S Abuadbba, A Abusnaina, GJ Ahn, A Al-Alaj, M Anisetti, CA Ardagna, ... | | |
Recall Accuracy of Self-generated Passwords with and without Generation Criteria Reminders Q Zhong, H Ge, J Blocki, N Li, RW Proctor | | |
An Empirical Study of Mnemonic Password Recall Errors A Xiong, H Ge, RW Proctor, J Blocki, N Li | | |