A study of personal information in human-chosen passwords and its security implications Y Li, H Wang, K Sun IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 102 | 2016 |
Personal information in passwords and its security implications Y Li, H Wang, K Sun IEEE Transactions on Information Forensics and Security 12 (10), 2320-2333, 2017 | 60 | 2017 |
Application impersonation: problems of OAuth and API design in online social networks P Hu, R Yang, Y Li, WC Lau Proceedings of the second ACM conference on Online social networks, 271-278, 2014 | 41 | 2014 |
Amnesia: A bilateral generative password manager L Wang, Y Li, K Sun 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 24 | 2016 |
Determining driver phone use leveraging smartphone sensors Y Li, G Zhou, Y Li, D Shen Multimedia Tools and Applications 75 (24), 16959-16981, 2016 | 14 | 2016 |
PathMarker: protecting web contents against inside crawlers S Wan, Y Li, K Sun Cybersecurity 2 (1), 1-17, 2019 | 13 | 2019 |
Email as a master key: Analyzing account recovery in the wild Y Li, H Wang, K Sun IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1646-1654, 2018 | 13 | 2018 |
Protecting web contents against persistent distributed crawlers S Wan, Y Li, K Sun 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 6 | 2017 |
Bluepass: A secure hand-free password manager Y Li, H Wang, K Sun Security and Privacy in Communication Networks: 13th International …, 2018 | 5 | 2018 |
Substation one-line diagram automatic generation and visualization J Hong, Y Li, Y Xu, C Yuan, H Fan, G Liu, R Dai 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 1086-1091, 2019 | 3 | 2019 |
User input enrichment via sensing devices Y Tang, Y Li, Q Li, K Sun, H Wang, Z Qin Computer Networks 196, 108262, 2021 | 2 | 2021 |
Understanding account recovery in the wild and its security implications Y Li, Z Chen, H Wang, K Sun, S Jajodia IEEE Transactions on Dependable and Secure Computing 19 (1), 620-634, 2020 | 2 | 2020 |
Your neighbors are listening: Evaluating postmessage use in oauth C Guan, Y Li, K Sun 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 210-211, 2017 | 2 | 2017 |
A measurement study on Amazon wishlist and its privacy exposure Y Li, N Zheng, H Wang, K Sun, H Fang 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 2 | 2017 |
BluePass: A Mobile Device Assisted Password Manager Y Li, H Wang, K Sun EAI Endorsed Transactions on Security and Safety 5 (17), e3-e3, 2018 | 1 | 2018 |
Remotely controlling TrustZone applications? A study on securely and resiliently receiving remote commands S Wan, K Sun, N Zhang, Y Li Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | | 2021 |
UTrack: Enterprise User Tracking Based on OS-Level Audit Logs Y Li, Z Wu, H Wang, K Sun, Z Li, K Jee, J Rhee, H Chen Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | | 2021 |
On Enhancing Security of Password-Based Authentication Y Li | | 2019 |