Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
View all
All
Since 2019
Citations
645
363
h-index
12
9
i10-index
12
9
0
120
60
30
90
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
3
27
57
79
109
78
85
63
62
44
31
Public access
View all
View all
7 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Zhenkai Liang
School of Computing, National University of Singapore
Verified email at comp.nus.edu.sg
Prateek Saxena
National University of Singapore
Verified email at comp.nus.edu.sg
Hong Hu
Pennsylvania State University
Verified email at psu.edu
Guangdong Bai
Associate Professor of The University of Queensland
Verified email at uq.edu.au
Tarik Moataz
Brown University
Verified email at brown.edu
Roland Yap
National University of Singapore
Verified email at comp.nus.edu.sg
Zheng Leong Chua
Advanca
Verified email at iiyume.org
Xinshu Dong
Follow
Yaoqi Jia
Ph.D Student of Computer Science,
National University of Singapore
Verified email at comp.nus.edu.sg -
Homepage
System Security
Web Security & Privacy
Articles
Cited by
Public access
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{CoVisor}: a compositional hypervisor for {software-defined} networks
X Jin, J Gossels, J Rexford, D Walker
12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …
, 2015
228
2015
Droidvault: A trusted data vault for android devices
X Li, H Hu, G Bai, Y Jia, Z Liang, P Saxena
2014 19th International Conference on Engineering of Complex Computer …
, 2014
65
2014
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
Y Jia, Y Chen, X Dong, P Saxena, J Mao, Z Liang
computers & security 55, 62-80
, 2015
59
2015
I know where you've been: Geo-inference attacks via the browser cache
Y Jia, X Dong, Z Liang, P Saxena
IEEE Internet Computing 19 (1), 44-53
, 2014
57
2014
Web-to-application injection attacks on android: Characterization and detection
B Hassanshahi, Y Jia, RHC Yap, P Saxena, Z Liang
Computer Security--ESORICS 2015: 20th European Symposium on Research in …
, 2015
53
2015
" The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing
Y Jia, ZL Chua, H Hu, S Chen, P Saxena, Z Liang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …
, 2016
37
2016
Abusing CDNs for fun and profit: Security issues in CDNs' origin validation
R Guo, J Chen, B Liu, J Zhang, C Zhang, H Duan, T Wan, J Jiang, S Hao, ...
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), 1-10
, 2018
31
2018
{PRO-ORAM}: Practical {Read-Only} Oblivious {RAM}
S Tople, Y Jia, P Saxena
22nd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2019
20
2019
Detecting injected behaviors in HTML5-based Android applications
J Mao, R Wang, Y Chen, Y Jia
Journal of High Speed Networks 22 (1), 15-34
, 2016
15
2016
You can’t be me: Enabling trusted paths and user sub-origins in web browsers
E Budianto, Y Jia, X Dong, P Saxena, Z Liang
Research in Attacks, Intrusions and Defenses: 17th International Symposium …
, 2014
14
2014
Traffickstop: Detecting and measuring illicit traffic monetization through large-scale dns analysis
B Liu, Z Li, P Zong, C Lu, H Duan, Y Liu, S Alrwais, X Wang, S Hao, Y Jia, ...
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 560-575
, 2019
12
2019
Toward exposing timing-based probing attacks in web applications
J Mao, Y Chen, F Shi, Y Jia, Z Liang
Sensors 17 (3), 464
, 2017
12
2017
Automatic permission inference for hybrid mobile apps
J Mao, H Ma, Y Chen, Y Jia, Z Liang
Journal of High Speed Networks 22 (1), 55-64
, 2016
9
2016
Anonymity in peer-assisted CDNs: Inference attacks and mitigation
Y Jia, G Bai, P Saxena, Z Liang
Proceedings on Privacy Enhancing Technologies
, 2016
8
2016
Robust detection of android UI similarity
J Mao, J Bian, H Ma, Y Jia, Z Liang, X Jiang
2018 IEEE International Conference on Communications (ICC), 1-6
, 2018
7
2018
Robust Synchronous P2P Primitives Using SGX Enclaves.
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
IACR Cryptol. ePrint Arch. 2017, 180
, 2017
6
2017
PRO-ORAM: Constant latency read-only oblivious RAM
S Tople, Y Jia, P Saxena
Cryptology ePrint Archive
, 2018
5
2018
Robust {P2P} Primitives Using {SGX} Enclaves
Y Jia, S Tople, T Moataz, D Gong, P Saxena, Z Liang
23rd International Symposium on Research in Attacks, Intrusions and Defenses …
, 2020
4
2020
A function-level behavior model for anomalous behavior detection in hybrid mobile applications
J Mao, R Wang, Y Chen, Y Xiao, Y Jia, Z Liang
2016 International Conference on Identification, Information and Knowledge …
, 2016
3
2016
I Know Where You’ve Been
Y Jia, X Dong, Z Liang, P Saxena
The system can't perform the operation now. Try again later.
Articles 1–20
Show more
Privacy
Terms
Help
About Scholar
Search help