Seungyeop Han
Seungyeop Han
Rubrik, Inc.
Verified email at - Homepage
Cited by
Cited by
Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, S Han, V Tendulkar, BG Chun, LP Cox, J Jung, ...
ACM Transactions on Computer Systems (TOCS) 32 (2), 1-29, 2014
Tor Instead of IP
V Liu, S Han, A Krishnamurthy, T Anderson
Analysis of topological characteristics of huge online social networking services
YY Ahn, S Han, H Kwak, S Moon, H Jeong
Proceedings of the 16th international conference on World Wide Web, 835-844, 2007
Mcdnn: An approximation-based execution framework for deep stream processing under resource constraints
S Han, H Shen, M Philipose, S Agarwal, A Wolman, A Krishnamurthy
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Exploring cyberbullying and other toxic behavior in team competition online games
H Kwak, J Blackburn, S Han
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
These aren't the droids you're looking for: retrofitting android to protect data from imperious applications
P Hornyack, S Han, J Jung, S Schechter, D Wetherall
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Sslshader: cheap ssl acceleration with commodity processors
K Jang, S Han, S Han, S Moon, K Park
Proceedings of the 8th USENIX conference on Networked systems design and …, 2011
Facilitating development of a spoken natural language interface
YC Ju, M Philipose, S Han
US Patent 9,330,659, 2016
Brahmastra: Driving Apps to Test the Security of Third-Party Components.
R Bhoraskar, S Han, J Jeon, T Azim, S Chen, J Jung, S Nath, R Wang, ...
Usenix Security, 2014
Collaborative verification of information flow for a high-assurance app store
MD Ernst, R Just, S Millstein, W Dietl, S Pernsteiner, F Roesner, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Structured learning of Gaussian graphical models
K Mohan, M Chung, S Han, D Witten, SI Lee, M Fazel
Advances in neural information processing systems 25, 2012
Fast video classification via adaptive cascading of deep models
H Shen, S Han, M Philipose, A Krishnamurthy
Proceedings of the IEEE conference on computer vision and pattern …, 2017
Short paper: enhancing mobile application permissions with runtime feedback and constraints
J Jung, S Han, D Wetherall
Proceedings of the second ACM workshop on Security and privacy in …, 2012
A Study of Third-Party Tracking by Mobile Apps in the Wild
S Han, J Jung, D Wetherall
MetaSync: File Synchronization Across Multiple Untrusted Storage Services
S Han, H Shen, T Kim, A Krishnamurthy, T Anderson, D Wetherall
Collaborative blog spam filtering using adaptive percolation search
S Han, YY Ahn, S Moon, H Jeong
Proceedings of the Workshop on the Weblogging Ecosystem, 2006
Privacy revelations for web and mobile apps
D Wetherall, D Choffnes, B Greenstein, S Han, P Hornyack, J Jung, ...
13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011
Expressive Privacy Control with Pseudonyms
S Han, V Liu, Q Pu, S Peter, T Anderson, A Krishnamurthy, D Wetherall
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013
GlimpseData: Towards continuous vision-based personal analytics
S Han, R Nandakumar, M Philipose, A Krishnamurthy, D Wetherall
Proceedings of the 2014 workshop on physical analytics, 31-36, 2014
Accelerating ssl with gpus
K Jang, S Han, S Han, S Moon, KS Park
ACM SIGCOMM Computer Communication Review 40 (4), 437-438, 2010
The system can't perform the operation now. Try again later.
Articles 1–20