Follow
Yue Li
Title
Cited by
Cited by
Year
A study of personal information in human-chosen passwords and its security implications
Y Li, H Wang, K Sun
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
1022016
Personal information in passwords and its security implications
Y Li, H Wang, K Sun
IEEE Transactions on Information Forensics and Security 12 (10), 2320-2333, 2017
602017
Application impersonation: problems of OAuth and API design in online social networks
P Hu, R Yang, Y Li, WC Lau
Proceedings of the second ACM conference on Online social networks, 271-278, 2014
412014
Amnesia: A bilateral generative password manager
L Wang, Y Li, K Sun
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
242016
Determining driver phone use leveraging smartphone sensors
Y Li, G Zhou, Y Li, D Shen
Multimedia Tools and Applications 75 (24), 16959-16981, 2016
142016
PathMarker: protecting web contents against inside crawlers
S Wan, Y Li, K Sun
Cybersecurity 2 (1), 1-17, 2019
132019
Email as a master key: Analyzing account recovery in the wild
Y Li, H Wang, K Sun
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1646-1654, 2018
132018
Protecting web contents against persistent distributed crawlers
S Wan, Y Li, K Sun
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
62017
Bluepass: A secure hand-free password manager
Y Li, H Wang, K Sun
Security and Privacy in Communication Networks: 13th International …, 2018
52018
Substation one-line diagram automatic generation and visualization
J Hong, Y Li, Y Xu, C Yuan, H Fan, G Liu, R Dai
2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1086-1091, 2019
32019
User input enrichment via sensing devices
Y Tang, Y Li, Q Li, K Sun, H Wang, Z Qin
Computer Networks 196, 108262, 2021
22021
Understanding account recovery in the wild and its security implications
Y Li, Z Chen, H Wang, K Sun, S Jajodia
IEEE Transactions on Dependable and Secure Computing 19 (1), 620-634, 2020
22020
Your neighbors are listening: Evaluating postmessage use in oauth
C Guan, Y Li, K Sun
2017 IEEE Symposium on Privacy-Aware Computing (PAC), 210-211, 2017
22017
A measurement study on Amazon wishlist and its privacy exposure
Y Li, N Zheng, H Wang, K Sun, H Fang
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
22017
BluePass: A Mobile Device Assisted Password Manager
Y Li, H Wang, K Sun
EAI Endorsed Transactions on Security and Safety 5 (17), e3-e3, 2018
12018
Remotely controlling TrustZone applications? A study on securely and resiliently receiving remote commands
S Wan, K Sun, N Zhang, Y Li
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
2021
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs
Y Li, Z Wu, H Wang, K Sun, Z Li, K Jee, J Rhee, H Chen
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
2021
On Enhancing Security of Password-Based Authentication
Y Li
2019
The system can't perform the operation now. Try again later.
Articles 1–18