Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems N Zhang, X Mi, X Feng, XF Wang, Y Tian, F Qian 2019 IEEE Symposium on Security and Privacy (SP), 1381-1396, 2019 | 299* | 2019 |
SmartAuth: User-Centered Authorization for the Internet of Things Y Tian, N Zhang, YH Lin, XF Wang, B Ur, XZ Guo, P Tague 26th {USENIX} Security Symposium ({USENIX} Security 17), 361-378, 2017 | 290 | 2017 |
Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 659-674, 2015 | 281 | 2015 |
The Peril of Fragmentation: Security Hazards in Android Device Driver Customizations X Zhou, Y Lee, N Zhang, M Naveed, XF Wang Security and Privacy (SP), 2014 IEEE Symposium on, 409-423, 2014 | 176 | 2014 |
Leave Me Alone: App-level Protection Against Runtime Information Gathering on Android N Zhang, K Yuan, M Naveed, X Zhou, XF Wang Security and Privacy (SP), 2015 IEEE Symposium on, 915-930, 2015 | 109 | 2015 |
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 84* | 2017 |
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ... arXiv preprint arXiv:1703.09809, 2017 | 79 | 2017 |
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References N Zhang, Y Aafer, Z Zhang, X Zhang, K Chen, XF Wang, X Zhou, W Du, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 69 | 2015 |
Unleashing the Walking Dead: Understanding Cross-App Remote Infections on Mobile WebViews T Li, X Wang, M Zha, K Chen, XF Wang, L Xing, X Bai, N Zhang, X Han Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 56 | 2017 |
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu Security and Privacy (SP), 2016 IEEE Symposium on, 2016 | 46 | 2016 |
Picking up my tab: Understanding and mitigating synchronized token lifting and spending in mobile payment X Bai, Z Zhou, XF Wang, Z Li, X Mi, N Zhang, T Li, SM Hu, K Zhang 26th {USENIX} Security Symposium ({USENIX} Security 17), 593-608, 2017 | 36 | 2017 |
Demystifying Hidden Privacy Settings in Mobile Apps Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ... 2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019 | 33 | 2019 |
Using Sonar for Liveness Detection to Protect Smart Speakers against Remote Attackers Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ... Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 32 | 2020 |
Ghost installer in the shadow: Security analysis of app installation on android Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 10 | 2017 |
Apple ZeroConf holes: How hackers can steal iPhone photos X Bai, L Xing, N Zhang, XF Wang, X Liao, T Li, SM Hu IEEE Security & Privacy 15 (2), 42-49, 2017 | 8 | 2017 |
Modeling and Analysis of Bifurcation in a Delayed Worm Propagation Model Y Yao, N Zhang, W Xiang, G Yu, F Gao Journal of Applied Mathematics 2013, 2013 | 6 | 2013 |
Non-invasive Privilege Escalation through Mobile and IoT System Interface: Threats and Mitigation N Zhang Indiana University, 2018 | | 2018 |
Bifurcation in a Delayed Worm Propagation Model with Birth and Death Rates Y Yao, N Zhang, FX Gao, G Yu Systems and Informatics (ICSAI), 2012 International Conference on, 1517-1521, 2012 | | 2012 |