Yuan Niu
Cited by
Cited by
Implicit authentication through learning user behavior
E Shi, Y Niu, M Jakobsson, R Chow
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
Authentication in the clouds: a framework and its application to mobile users
R Chow, M Jakobsson, R Masuoka, J Molina, Y Niu, E Shi, Z Song
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 1-6, 2010
Spam double-funnel: Connecting web spammers with advertisers
YM Wang, M Ma, Y Niu, H Chen
Proceedings of the 16th international conference on World Wide Web, 291-300, 2007
A Quantitative Study of Forum Spamming Using Context-based Analysis.
Y Niu, H Chen, F Hsu, YM Wang, M Ma
NDSS, 2007
Remedying web hijacking: Notification effectiveness and webmaster comprehension
F Li, G Ho, E Kuan, Y Niu, L Ballard, K Thomas, E Bursztein, V Paxson
Proceedings of the 25th International Conference on World Wide Web, 1009-1019, 2016
iPhish: Phishing Vulnerabilities on Consumer Electronics.
Y Niu, F Hsu, H Chen
UPSEC 8, 10, 2008
Five years of the right to be forgotten
T Bertram, E Bursztein, S Caro, H Chao, R Chin Feman, P Fleischer, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Gesture authentication with touch input for mobile devices
Y Niu, H Chen
Security and Privacy in Mobile Information and Communication Systems: Third …, 2012
Three years of the Right to be Forgotten
T Bertram, E Bursztein, S Caro, H Chao, RC Feman, P Fleischer, ...
Google, Inc, 1-17, 2018
Strider honeymonkeys: Active, client-side honeypots for finding malicious websites
YM Wang, Y Niu, H Chen, D Beck, X Jiang, R Roussev, C Verbowski, ...
See http://research. microsoft. com/users/shuochen/HM. PDF, 2007
Visual preference authentication
Y Niu, M Jakobsson, G Rydstedt, D Tamir
na, 2012
Solutions to the Problem
R Chow, E Shi, M Jakobsson, P Golle, R Masuoka, J Molina, Y Niu, ...
The Death of the Internet, 245-329, 2012
Navigating the Malweb: Authentication Schemes for Mobile Devices
Y Niu
University of California, Davis, 2011
Spam double-funnel
YM Wang, M Ma, Y Niu, H Chen
Proceedings of the 16th international conference on World Wide Web, 2007
Hao Chen
GM Hsu, Y Niu, Y Rong, R Stevens, M Van Gundy, J Vronsky
University of California, Berkeley 8, 2004-06, 1998
Automated Discovery of Functional Aspects in Imperative Programs
C Franke, Y Niu, D Zinn
The system can't perform the operation now. Try again later.
Articles 1–16