| Explainable machine learning in deployment U Bhatt, A Xiang, S Sharma, A Weller, A Taly, Y Jia, J Ghosh, R Puri, ... Proceedings of the 2020 conference on fairness, accountability, and …, 2020 | 952 | 2020 |
| ContexloT: Towards providing contextual integrity to appified IoT platforms. YJ Jia, QA Chen, S Wang, A Rahmati, E Fernandes, ZM Mao, A Prakash, ... ndss 2 (2), 2-2, 2017 | 469 | 2017 |
| Dirty road can attack: Security of deep learning based automated lane centering under {Physical-World} attack T Sato, J Shen, N Wang, Y Jia, X Lin, QA Chen 30th USENIX security symposium (USENIX Security 21), 3309-3326, 2021 | 188 | 2021 |
| Fooling detection alone is not enough: Adversarial attack against multiple object tracking Y Jia, Y Lu, J Shen, QA Chen, H Chen, Z Zhong, T Wei International conference on learning representations, 2020 | 145 | 2020 |
| Enhancing cross-task black-box transferability of adversarial examples with dispersion reduction Y Lu, Y Jia, J Wang, B Li, W Chai, L Carin, S Velipasalar Proceedings of the IEEE/CVF conference on Computer Vision and Pattern …, 2020 | 118 | 2020 |
| Trafficnet: An open naturalistic driving scenario library D Zhao, Y Guo, YJ Jia 2017 IEEE 20th International Conference on Intelligent Transportation …, 2017 | 83 | 2017 |
| The misuse of android unix domain sockets and security implications Y Shao, J Ott, YJ Jia, Z Qian, ZM Mao Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 52 | 2016 |
| Static detection of packet injection vulnerabilities: A case for identifying attacker-controlled implicit information leaks QA Chen, Z Qian, YJ Jia, Y Shao, ZM Mao Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 52 | 2015 |
| Open doors for bob and mallory: Open port usage in android apps and security implications YJ Jia, QA Chen, Y Lin, C Kong, ZM Mao 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 190-203, 2017 | 49 | 2017 |
| Fooling detection alone is not enough: First adversarial attack against multiple object tracking Y Jia, Y Lu, J Shen, QA Chen, Z Zhong, T Wei arXiv preprint arXiv:1905.11026, 2019 | 46 | 2019 |
| Dissecting VOD services for cellular: performance, root causes and best practices S Xu, S Sen, ZM Mao, Y Jia Proceedings of the 2017 Internet Measurement Conference, 220-234, 2017 | 35 | 2017 |
| Performance characterization and call reliability diagnosis support for voice over lte YJ Jia, QA Chen, ZM Mao, J Hui, K Sontinei, A Yoon, S Kwong, K Lau Proceedings of the 21st Annual International Conference on Mobile Computing …, 2015 | 30 | 2015 |
| Security of deep learning based lane keeping system under physical-world adversarial attack T Sato, J Shen, N Wang, YJ Jia, X Lin, QA Chen arXiv preprint arXiv:2003.01782, 2020 | 24 | 2020 |
| Hold tight and never let go: Security of deep learning based automated lane centering under physical-world attack T Sato, J Shen, N Wang, YJ Jia, X Lin, QA Chen arXiv preprint arXiv:2009.06701 2, 2020 | 22 | 2020 |
| Machine learning-based troubleshooting of VoLTE calls J Hui, Y Jia, Y Guo, A Yoon, A Tran, K Sontineni, ZM Mao US Patent 10,339,456, 2019 | 21 | 2019 |
| Towards practical lottery ticket hypothesis for adversarial training B Li, S Wang, Y Jia, Y Lu, Z Zhong, L Carin, S Jana arXiv preprint arXiv:2003.05733, 2020 | 17 | 2020 |
| Towards secure and safe appified automated vehicles YJ Jia, D Zhao, QA Chen, ZM Mao 2017 IEEE Intelligent Vehicles Symposium (IV), 705-711, 2017 | 13 | 2017 |
| Mapping global mobile performance trends with Mobilyzer and MobiPerf S Rosen, H Yao, A Nikravesh, Y Jia, D Choffnes, ZM Mao Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 13 | 2014 |
| Enhancing cross-task transferability of adversarial examples with dispersion reduction Y Jia, Y Lu, S Velipasalar, Z Zhong, T Wei arXiv preprint arXiv:1905.03333, 2019 | 12 | 2019 |
| Indoor/outdoor coverage detection based on sensor inputs JS Yoon, J Hui, M Mitchell, ZM Mao, Y Jia, C Kong US Patent 10,506,372, 2019 | 11 | 2019 |