Follow
Xiang Pan
Xiang Pan
Google
Verified email at u.northwestern.edu
Title
Cited by
Cited by
Year
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
V Rastogi, R Shao, Y Chen, X Pan, S Zou, RD Riley
NDSS, 2016
932016
Cspautogen: Black-box enforcement of content security policy upon real-world websites
X Pan, Y Cao, S Liu, Y Zhou, Y Chen, T Zhou
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
622016
{FlowCog}: Context-aware semantics extraction and analysis of information flow leaks in android apps
X Pan, Y Cao, X Du, B He, G Fang, R Shao, Y Chen
27th USENIX Security Symposium (USENIX Security 18), 1669-1685, 2018
502018
I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser
X Pan, Y Cao, Y Chen
Proceedings of the 2015 Annual Network and Distributed System Security …, 2015
502015
JShield: Towards real-time and vulnerability-based detection of polluted drive-by download attacks
Y Cao, X Pan, Y Chen, J Zhuge
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
342014
Understanding in-app ads and detecting hidden attacks through the mobile app-web interface
R Shao, V Rastogi, Y Chen, X Pan, G Guo, S Zou, R Riley
IEEE Transactions on Mobile Computing 17 (11), 2675-2688, 2018
242018
HogMap: Using SDNs to incentivize collaborative security monitoring
X Pan, V Yegneswaran, Y Chen, P Porras, S Shin
Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016
172016
Malicious code detection technologies
Y Cao, X Pan, Y Chen, J Zhuge, X Qian, J Fu
US Patent 9,213,839, 2015
142015
Learning based malicious web sites detection using suspicious URLs
H Liu, X Pan, Z Qu
Software Engineering, 2016
132016
Xuechao Du, Boyuan He, Gan Fang, Rui Shao, and Yan Chen. 2018. FlowCog: context-aware semantics extraction and analysis of information flow leaks in android apps
X Pan, Y Cao
27th {USENIX} Security Symposium ({USENIX} Security 18), 1669-1685, 0
9
SafePay: Protecting against credit card forgery with existing magnetic card readers
Y Cao, X Pan, Y Chen
2015 IEEE Conference on Communications and Network Security (CNS), 164-172, 2015
82015
Flowcog: Context-aware semantic extraction and analysis of information flow leaks in android apps
X Du, X Pan, Y Cao, B He, G Fan, Y Chen, D Xu
IEEE Transactions on Mobile Computing 22 (11), 6460-6476, 2022
42022
Detecting hidden attacks through the mobile app-web interfaces
V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley
2016 Network and Distributed System Security Symposium (NDSS), 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–13