Follow
Yan Jia
Title
Cited by
Cited by
Year
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
W Zhou, Y Jia, A Peng, Y Zhang, P Liu
IEEE Internet of things Journal 6 (2), 1606-1616, 2018
5122018
Discovering and understanding the security hazards in the interactions between {IoT} devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
28th USENIX security symposium (USENIX security 19), 1133-1150, 2019
1662019
Burglars’ iot paradise: Understanding and mitigating security risks of general messaging protocols on iot clouds
Y Jia, L Xing, Y Mao, D Zhao, XF Wang, S Zhao, Y Zhang
2020 IEEE Symposium on Security and Privacy (SP), 465-481, 2020
652020
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
B Yuan, Y Jia, L Xing, D Zhao, XF Wang, Y Zhang
29th USENIX security symposium (USENIX security 20), 1183-1200, 2020
472020
Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution
Y Yao, W Zhou, Y Jia, L Zhu, P Liu, Y Zhang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
312019
Who's in control? On security risks of disjointed IoT device management channels
Y Jia, B Yuan, L Xing, D Zhao, Y Zhang, XF Wang, Y Liu, K Zheng, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
192021
Reviewing IoT security via logic bugs in IoT platforms and systems
W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ...
IEEE Internet of Things Journal 8 (14), 11621-11639, 2021
182021
物联网操作系统安全研究综述
彭安妮, 周威, 贾岩, 张玉清
Journal on Communication/Tongxin Xuebao 39 (3), 2018
122018
Survey of the Internet of things operating system security
AN Peng, W ZHOU, Y Jia, Y Zhang
Journal on Communications 39 (3), 22-34, 2018
112018
A whole-process WiFi security perception software system
H Huang, Y Hu, Y Ja, S Ao
2017 International conference on circuits, system and simulation (ICCSS …, 2017
92017
An incentive mechanism in expert-decision-based crowdsensing networks
B Jia, H Gong, Z Zong, T Zhou, T Baker, A Al-Shamma’a, Y Jia
Applied Soft Computing 122, 108834, 2022
82022
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion
Y Liu, Y Jia, Q Tan, Z Liu, L Xing
31st USENIX Security Symposium (USENIX Security 22), 863-880, 2022
42022
Security analysis of smart home based on life cycle
Y Mao, X Li, Y Jia, S Zhao, Y Zhang
2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2019
42019
智能家居安全综述
王基策, 李意莲, 贾岩, 周威, 王宇成, 王鹤, 张玉清
计算机研究与发展 55 (10), 2111-2124, 2018
42018
P-verifier: Understanding and mitigating security risks in cloud-based iot access policies
Z Jin, L Xing, Y Fang, Y Jia, B Yuan, Q Liu
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
32022
Real-Time Diagnosis of Configuration Errors for Software of AI Server Infrastructure
G Xu, X Ding, S Xu, Y Jia, S Liu, S Feng, X Zheng
IEEE Transactions on Dependable and Secure Computing, 2023
22023
Birds of a feather flock together: How set bias helps to deanonymize you via revealed intersection sizes
X Guo, Y Han, Z Liu, D Wang, Y Jia, J Li
31st USENIX Security Symposium (USENIX Security 22), 1487-1504, 2022
22022
HTML5 新特性安全研究综述
张玉清, 贾岩, 雷柯楠, 吕少卿, 乐洪舟
计算机研究与发展 53 (10), 2163-2172, 2016
22016
Towards comprehensively understanding the run-time security of programmable logic controllers: A 3-year empirical study
R Ma, Q Wei, J Wang, S Zhu, S Ji, P Cheng, Y Jia, Q Wang
arXiv preprint arXiv:2212.14296, 2022
12022
A Survey on Consumer IoT Traffic: Security and Privacy
Y Jia, Y Song, Z Liu, Q Tan, F Wang, Y Zhang, Z Liu
arXiv preprint arXiv:2403.16149, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20