default search action
Ke Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Amit Krishan Kumar, Nguyen Ngoc Mai, Ke Tian, Yuanqing Xia:
Isochronous Temporal Metric for Neighbourhood Analysis in Classification Tasks. SN Comput. Sci. 4(6): 807 (2023) - 2022
- [j8]Danfeng Daphne Yao, Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Miles Frantz, Ke Tian, Na Meng, Cristina Cifuentes, Yang Zhao, Nicholas Allen, Nathan Keynes, Barton P. Miller, Elisa Heymann, Murat Kantarcioglu, Fahad Shaon:
Being the Developers' Friend: Our Experience Developing a High-Precision Tool for Secure Coding. IEEE Secur. Priv. 20(6): 43-52 (2022) - 2021
- [j7]Long Cheng, Ke Tian, Danfeng Daphne Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 18(2): 825-842 (2021) - [c24]Shengchen Li, Ke Tian, Rui Wang:
Unsupervised Heart Abnormality Detection Based on Phonocardiogram Analysis with Beta Variational Auto-Encoders. ICASSP 2021: 8353-8357 - [c23]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. RAID 2021: 442-455 - [c22]Ke Tian, Hua Chen:
aiai at the FinSBD-3 task: Structure Boundary Detection of Noisy Financial Texts in English and French Using Data Augmentation and Hybrid Deep Learning Model. WWW (Companion Volume) 2021: 283-287 - [c21]Ke Tian, Hua Chen:
aiai at the FinSim-2 task: Finance Domain Terms Automatic Classification Via Word Ontology and Embedding. WWW (Companion Volume) 2021: 320-322 - [i5]Shengchen Li, Ke Tian, Rui Wang:
Unsupervised heart abnormality detection based on phonocardiogram analysis with Beta Variational Auto-Encoders. CoRR abs/2101.05443 (2021) - [i4]Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt:
Living-Off-The-Land Command Detection Using Active Learning. CoRR abs/2111.15039 (2021) - 2020
- [j6]Ke Tian, Gang Tan, Barbara G. Ryder, Danfeng (Daphne) Yao:
Prioritizing data flows and sinks for app security transformation. Comput. Secur. 92: 101750 (2020) - [j5]Dejun Liu, Wei Li, Qiang Wu, Haoyu Zhao, Fengzi Ling, Ke Tian, Changyu Shen, Fangfang Wei, Wei Han, Gerald Farrell, Yuliya Semenova, Pengfei Wang:
Negative Curvature Hollow Core Fiber Based All-Fiber Interferometer and Its Sensing Applications to Temperature and Strain. Sensors 20(17): 4763 (2020) - [j4]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan, Guojun Peng:
Detection of Repackaged Android Malware with Code-Heterogeneity Features. IEEE Trans. Dependable Secur. Comput. 17(1): 64-77 (2020) - [c20]Ke Tian, Jiajun Zhang:
Quality Estimation for Machine Translation with Multi-granularity Interaction. CCMT 2020: 55-65 - [c19]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Deployment-quality and Accessible Solutions for Cryptography Code Development. CODASPY 2020: 174-176
2010 – 2019
- 2019
- [c18]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Fahad Shaon, Ke Tian, Miles Frantz, Murat Kantarcioglu, Danfeng (Daphne) Yao:
CryptoGuard: High Precision Detection of Cryptographic Vulnerabilities in Massive-sized Java Projects. CCS 2019: 2455-2472 - [c17]Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao:
Poster: Deployment-quality and Accessible Solutions for Cryptography Code Development. CCS 2019: 2545-2547 - 2018
- [b1]Ke Tian:
Learning-based Cyber Security Analysis and Binary Customization for Security. Virginia Tech, Blacksburg, VA, USA, 2018 - [c16]Ke Tian, Steve T. K. Jan, Hang Hu, Danfeng Yao, Gang Wang:
Needle in a Haystack: Tracking Down Elite Phishing Domains in the Wild. Internet Measurement Conference 2018: 429-442 - [c15]Ke Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao:
FrameHanger: Evaluating and Classifying Iframe Injection at Large Scale. SecureComm (2) 2018: 311-331 - [i3]Long Cheng, Ke Tian, Danfeng Yao, Lui Sha, Raheem A. Beyah:
Checking is Believing: Event-Aware Program Anomaly Detection in Cyber-Physical Systems. CoRR abs/1805.00074 (2018) - [i2]Sazzadur Rahaman, Ya Xiao, Ke Tian, Fahad Shaon, Murat Kantarcioglu, Danfeng Yao:
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. CoRR abs/1806.06881 (2018) - 2017
- [c14]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ACSAC 2017: 315-326 - [c13]Ke Tian, Gang Tan, Danfeng Daphne Yao, Barbara G. Ryder:
ReDroid: Prioritizing Data Flows and Sinks for App Security Transformation. FEAST@CCS 2017: 35-41 - [c12]Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
POSTER: Detection of CPS Program Anomalies by Enforcing Cyber-Physical Execution Semantics. CCS 2017: 2483-2485 - [i1]Xiaokui Shu, Ke Tian, Andrew Ciambrone, Danfeng Yao:
Breaking the Target: An Analysis of Target Data Breach and Lessons Learned. CoRR abs/1701.04940 (2017) - 2016
- [c11]Kui Xu, Ke Tian, Danfeng Yao, Barbara G. Ryder:
A Sharper Sense of Self: Probabilistic Reasoning of Program Behaviors for Anomaly Detection with Context Sensitivity. DSN 2016: 467-478 - [c10]Ke Tian, Danfeng Yao, Barbara G. Ryder, Gang Tan:
Analysis of Code Heterogeneity for High-Precision Classification of Repackaged Malware. IEEE Symposium on Security and Privacy Workshops 2016: 262-271 - 2015
- [c9]Kui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian:
Probabilistic Program Modeling for High-Precision Anomaly Classification. CSF 2015: 497-511 - 2014
- [j3]Ke Tian, Mamoru Endo, Mayu Urata, Katsuhiro Mouri, Takami Yasuda:
Lunar Observation Support System Using Smartphone AR for Astronomy Education. Int. J. Interact. Mob. Technol. 8(1): 32-39 (2014) - [j2]Ke Tian, Mamoru Endo, Mayu Urata, Katsuhiro Mouri, Takami Yasuda:
Multi-viewpoint Smartphone AR-based Learning System for Solar Movement Observations. Int. J. Interact. Mob. Technol. 8(3): 11-18 (2014) - [c8]Ke Tian, Mamoru Endo, Mayu Urata, Katsuhiro Mouri, Takami Yasuda:
M-VSARL system in secondary school science education: Lunar phase class case study. GCCE 2014: 321-322 - 2013
- [c7]Ke Tian, Mamoru Endo, Mayu Urata, Katsuhiro Mouri, Takami Yasuda:
Development of a Multi-viewpoint AR-Based Mobile Learning System for Supporting Lunar Observation. SITIS 2013: 1034-1041 - 2012
- [j1]Yan Yan, Ke Tian, Kui Huang, Baoxian Zhang, Jun Zheng:
D-ODMRP: a destination-driven on-demand multicast routing protocol for mobile ad hoc networks. IET Commun. 6(9): 1025-1031 (2012) - 2010
- [c6]Shuai Yang, Huaiming Li, Ke Tian:
Research on Unified Authorized Management Platform in E-government. ChinaGrid 2010: 214-217 - [c5]Ke Tian, Baoxian Zhang, Kui Huang, Jian Ma:
Data Gathering Protocols for Wireless Sensor Networks with Mobile Sinks. GLOBECOM 2010: 1-6 - [c4]Jinghua Xie, Ke Tian, Dawei Yang:
The Effect of TBM Hydraulic Piping System Parameters on FSI Vibration. ICIRA (1) 2010: 363-371
2000 – 2009
- 2009
- [c3]Huaiming Li, Ke Tian, Shuai Yang, Xuehua Wang, Qiuyan Zhong:
Research of Reliability-Based Four Layers Access Control Model. Web Intelligence/IAT Workshops 2009: 385-388 - [c2]Ke Tian, Baoxian Zhang, Hussein T. Mouftah, Zhuang Zhao, Jian Ma:
Destination-Driven On-Demand Multicast Routing Protocol for Wireless Ad Hoc Networks. ICC 2009: 1-5 - 2008
- [c1]Huaiming Li, Ke Tian, Yingying Gao:
Research on Dynamic Delegation Model. Web Intelligence/IAT Workshops 2008: 244-247
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 18:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint