A practical and compatible cryptographic solution to ADS-B security H Yang, Q Zhou, M Yao, R Lu, H Li, X Zhang IEEE Internet of Things Journal 6 (2), 3322-3334, 2018 | 87 | 2018 |
LHCSAS: A lightweight and highly-compatible solution for ADS-B security H Yang, M Yao, Z Xu, B Liu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 33 | 2017 |
Privacy-preserving extraction of hog features based on integer vector homomorphic encryption H Yang, Y Huang, Y Yu, M Yao, X Zhang Information Security Practice and Experience: 13th International Conference …, 2017 | 20 | 2017 |
Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware M Yao, J Fuller, RP Sridhar, S Agarwal, AK Sikder, B Saltaformaggio | 3* | |
Pulling off the mask: Forensic analysis of the deceptive creator wallets behind smart contract fraud M Yao, R Zhang, H Xu, SH Chou, VC Paturi, AK Sikder, B Saltaformaggio 2024 IEEE Symposium on Security and Privacy (SP), 209-209, 2024 | 1 | 2024 |
Invited Tutorial: Counteracting Web Application Abuse in Malware M Yao, J Fuller, RP Sridhar, S Agarwal, AK Sikder, B Saltaformaggio 2023 IEEE Secure Development Conference (SecDev), 1-2, 2023 | | 2023 |
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware H Xu, M Yao, R Zhang, MM Dawoud, J Park, B Saltaformaggio | | |