What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yan Jia
Google Scholar
13
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Gradient Inversion of Text-Modal Data in Distributed Learning.
Zipeng Ye
Wenjian Luo
Qi Zhou
Yubo Tang
Zhenqian Zhu
Yuhui Shi
Yan Jia
2025
journals/tches
Improved Attacks Against Lattice-Based KEMs Using Hints From Hertzbleed.
Zhiwei Li
Jun Xu
Jun Song
Haomeng Xu
Yan Jia
Yanli Zou
Lei Hu
2024
conf/sp
MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations.
Bin Yuan
Zhanxiang Song
Yan Jia
Zhenyu Lu
Deqing Zou
Hai Jin
Luyi Xing
2024
conf/ndss
Maginot Line: Assessing a New Cross-app Threat to PII-as-Factor Authentication in Chinese Mobile Apps.
Fannv He
Yan Jia
Jiayu Zhao
Yue Fang
Jice Wang
Mengyue Feng
Peng Liu
Yuqing Zhang
2023
conf/uss
Union under Duress: Understanding Hazards of Duplicate Resource Mismediation in Android Software Supply Chain.
Xueqiang Wang
Yifan Zhang
XiaoFeng Wang
Yan Jia
Luyi Xing
2022
conf/ccs
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Ze Jin
Luyi Xing
Yiwei Fang
Yan Jia
Bin Yuan
Qixu Liu
2022
conf/uss
How Are Your Zombie Accounts? Understanding Users' Practices and Expectations on Mobile App Account Deletion.
Yijing Liu
Yan Jia
Qingyin Tan
Zheli Liu
Luyi Xing
2022
conf/uss
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Xiaojie Guo
Ye Han
Zheli Liu
Ding Wang
Yan Jia
Jin Li
2021
conf/ccs
Who's In Control? On Security Risks of Disjointed IoT Device Management Channels.
Yan Jia
Bin Yuan
Luyi Xing
Dongfang Zhao
Yifan Zhang
XiaoFeng Wang
Yijing Liu
Kaimin Zheng
Peyton Crnjak
Yuqing Zhang
Deqing Zou
Hai Jin
2020
conf/uss
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
2020
conf/sp
Burglars' IoT Paradise: Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.
Yan Jia
Luyi Xing
Yuhang Mao
Dongfang Zhao
XiaoFeng Wang
Shangru Zhao
Yuqing Zhang
2019
conf/uss
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms.
Wei Zhou
Yan Jia
Yao Yao
Lipeng Zhu
Le Guan
Yuhang Mao
Peng Liu
Yuqing Zhang
2019
conf/esorics
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution.
Yao Yao
Wei Zhou
Yan Jia
Lipeng Zhu
Peng Liu
Yuqing Zhang
Coauthors
Bin Yuan
(4)
Deqing Zou
(3)
Ding Wang
(1)
Dongfang Zhao
(3)
Fannv He
(1)
Hai Jin
(3)
Haomeng Xu
(1)
Jiayu Zhao
(1)
Jice Wang
(1)
Jin Li
(1)
Jun Song
(1)
Jun Xu
(1)
Kaimin Zheng
(1)
Le Guan
(1)
Lei Hu
(1)
Lipeng Zhu
(2)
Luyi Xing
(7)
Mengyue Feng
(1)
Peng Liu
(3)
Peyton Crnjak
(1)
Qi Zhou
(1)
Qingyin Tan
(1)
Qixu Liu
(1)
Shangru Zhao
(1)
Wei Zhou
(2)
Wenjian Luo
(1)
XiaoFeng Wang
(4)
Xiaojie Guo
(1)
Xueqiang Wang
(1)
Yan Jia
(13)
Yanli Zou
(1)
Yao Yao
(2)
Ye Han
(1)
Yifan Zhang
(2)
Yijing Liu
(2)
Yiwei Fang
(1)
Yubo Tang
(1)
Yue Fang
(1)
Yuhang Mao
(2)
Yuhui Shi
(1)
Yuqing Zhang
(6)
Ze Jin
(1)
Zhanxiang Song
(1)
Zheli Liu
(2)
Zhenqian Zhu
(1)
Zhenyu Lu
(1)
Zhiwei Li
(1)
Zipeng Ye
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to