Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Dave Jing Tian"'
Autor:
Tuba Yavuz, Farhaan Fowze, Grant Hernandez, Ken Yihang Bai, Kevin R. B. Butler, Dave Jing Tian
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 20:1577-1595
Autor:
Taegyu Kim, Aolin Ding, Sriharsha Etigowni, Pengfei Sun, Jizhou Chen, Luis Garcia, Saman Zonouz, Dongyan Xu, Dave (Jing) Tian
Publikováno v:
Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services.
Autor:
Sungwoo Kim, Gisu Yeo, Taegyu Kim, Junghwan \\'John\\' Rhee, Yuseok Jeon, Antonio Bianchi, Dongyan Xu, Dave (Jing) Tian
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Kyungtae Kim, Taegyu Kim, Ertza Warraich, Byoungyoung Lee, Kevin R. B. Butler, Antonio Bianchi, Dave Jing Tian
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Arslan Khan, Joseph I. Choi, Dave Jing Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong
Publikováno v:
2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).
Publikováno v:
2021 IEEE Secure Development Conference (SecDev).
Autor:
Logan Blue, Luis Vargas, Dave (Jing) Tian, Nolen Scaife, Kevin R. B. Butler, Bradley Reaves, Patrick Traynor
Publikováno v:
ACM Transactions on Privacy and Security. 22:1-31
Recent years have seen the Short Message Service (SMS) become a critical component of the security infrastructure, assisting with tasks including identity verification and second-factor authentication. At the same time, this messaging infrastructure
Publikováno v:
CCS
For system logs to aid in security investigations, they must be beyond the reach of the adversary. Unfortunately, attackers that have escalated privilege on a host are typically able to delete and modify log events at will. In response to this threat
Autor:
Junghwan \\'John\\' Rhee, Dave (Jing) Tian, Xiao Yu, Kyungtae Kim, Byoungyoung Lee, Haifeng Chen, Chung Hwan Kim
Publikováno v:
SoCC
Deep learning systems on the cloud are increasingly targeted by attacks that attempt to steal sensitive data. Intel SGX has been proven effective to protect the confidentiality and integrity of such data during computation. However, state-of-the-art