Yunhan Jia
Yunhan Jia
ByteDance AI Lab
Verifierad e-postadress på - Startsida
TitelCiteras avÅr
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms.
YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ...
NDSS, 2017
The misuse of android unix domain sockets and security implications
Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Static detection of packet injection vulnerabilities: A case for identifying attacker-controlled implicit information leaks
QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Open doors for bob and mallory: Open port usage in android apps and security implications
YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017
Trafficnet: An open naturalistic driving scenario library
D Zhao, Y Guo, YJ Jia
2017 IEEE 20th International Conference on Intelligent Transportation …, 2017
Performance characterization and call reliability diagnosis support for voice over lte
YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau
Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015
Dissecting VOD services for cellular: performance, root causes and best practices
S Xu, S Sen, ZM Mao, Y Jia
Proceedings of the 2017 Internet Measurement Conference, 220-234, 2017
Mapping global mobile performance trends with Mobilyzer and MobiPerf
S Rosen, H Yao, A Nikravesh, Y Jia, D Choffnes, ZM Mao
Proceedings of the 12th annual international conference on Mobile systems …, 2014
Towards secure and safe appified automated vehicles
YJ Jia, D Zhao, QA Chen, ZM Mao
2017 IEEE Intelligent Vehicles Symposium (IV), 705-711, 2017
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking
Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei
arXiv preprint arXiv:1905.11026, 2019
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction
Y Jia, Y Lu, S Velipasalar, Z Zhong, T Wei
arXiv preprint arXiv:1905.03333, 2019
Pathway-based data interruption detection
J Hui, Y Jia, S Satpathy, K Lau, K Sontineni, SKS Kwong
US Patent 9,843,948, 2017
Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield
D Goodman, X Hao, Y Wang, J Tang, Y Jia, T Wei
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
Machine learning-based troubleshooting of VoLTE calls
J Hui, Y Jia, Y Guo, A Yoon, A Tran, K Sontineni, ZM Mao
US Patent 10,339,456, 2019
Monitoring Wireless Data Consumption
Y Jia, JS Yoon, J Hui, SKS Kwong, K Lau, S Mendoza, ZM Mao
US Patent App. 15/797,936, 2018
Cross-Layer Link Failure Alerts
J Hui, Y Jia, J Liu, K Sontineni
US Patent App. 15/791,824, 2018
Indoor/outdoor coverage detection based on sensor inputs
JS Yoon, J Hui, M Mitchell, ZM Mao, Y Jia, C Kong
US Patent App. 15/584,261, 2017
Cross-layer link failure alerts
J Hui, Y Jia, J Liu, K Sontineni
US Patent 9,825,828, 2017
Monitoring wireless data consumption
Y Jia, JS Yoon, J Hui, SKS Kwong, K Lau, S Mendoza, ZM Mao
US Patent 9,807,058, 2017
Poster: Securing Appified Automated Vehicles With AVGUARD
YJ Jia, D Zhao, QA Chen, ZM Mao
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20