Yuan Niu
Yuan Niu
Verifierad e-postadress på google.com
Titel
Citeras av
Citeras av
År
Implicit authentication through learning user behavior
E Shi, Y Niu, M Jakobsson, R Chow
International Conference on Information Security, 99-113, 2010
3092010
Authentication in the clouds: a framework and its application to mobile users
R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010
1912010
Spam double-funnel: connecting web spammers with advertisers
YM Wang, M Ma, Y Niu, H Chen
Proceedings of the 16th international conference on World Wide Web, 291-300, 2007
1242007
A Quantitative Study of Forum Spamming Using Context-based Analysis.
Y Niu, H Chen, F Hsu, YM Wang, M Ma
NDSS, 2007
1102007
iPhish: Phishing Vulnerabilities on Consumer Electronics.
Y Niu, F Hsu, H Chen
UPSEC, 2008
452008
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
382016
Gesture authentication with touch input for mobile devices
Y Niu, H Chen
International Conference on Security and Privacy in Mobile Information and …, 2011
262011
Three years of the Right to be Forgotten
T Bertram, E Bursztein, S Caro, H Chao, RC Feman, P Fleischer, ...
Google, Inc, 1-17, 2018
122018
Five Years of the Right to be Forgotten
T Bertram, E Bursztein, S Caro, H Chao, R Chin Feman, P Fleischer, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
62019
Strider honeymonkeys: Active, client-side honeypots for finding malicious websites
YM Wang, Y Niu, H Chen, D Beck, X Jiang, R Roussev, C Verbowski, ...
See http://research. microsoft. com/users/shuochen/HM. PDF, 2007
52007
Visual preference authentication
Y Niu, M Jakobsson, G Rydstedt, D Tamir
na, 2012
22012
Solutions to the Problem
R Chow, E Shi, M Jakobsson, P Golle, R Masuoka, J Molina, Y Niu, ...
The Death of the Internet, 245-329, 2012
2012
Navigating the malweb: authentication schemes for mobile devices
Y Niu
University of California, Davis, 2011
2011
Automated Discovery of Functional Aspects in Imperative Programs
C Franke, Y Niu, D Zinn
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–14