Follow
Tamjid Al Rahat
Title
Cited by
Cited by
Year
Oauthlint: An empirical study on oauth bugs in android applications
T Al Rahat, Y Feng, Y Tian
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
332019
Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations
TA Rahat, Y Feng, Y Tian
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12*2022
Is Your Policy Compliant? A Deep Learning-based Empirical Study of Privacy Policies' Compliance with GDPR
TA Rahat, M Long, Y Tian
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 89-102, 2022
12*2022
Maximizing Reverse k-Nearest Neighbors for Trajectories
T Al Rahat, A Arman, ME Ali
Databases Theory and Applications: 29th Australasian Database Conference …, 2018
52018
ML-FEED: Machine Learning Framework for Efficient Exploit Detection
T Saha, T Al Rahat, N Aaraj, Y Tian, NK Jha
IEEE International Conference on Trust, Privacy and Security in Intelligent …, 2022
3*2022
Poster: Attack the dedicated short-range communication for connected vehicles
T Le, I ElSayed-Aly, W Jin, S Ryu, G Verrier, T Al Rahat, BB Park, Y Tian
Poster presented at the 40th IEEE Symposium on Security and Privacy, 2019
12019
AuthSaber: Automated Safety Verification of OpenID Connect Programs
TA Rahat, Y Feng, Y Tian
2024 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024
2024
Using Program Knowledge Graph to Uncover Software Vulnerabilities
M Xie, T Rahat, W Wang, Y Tian
Annual Computer Security Applications Conference (ACSAC), 2023, 2023
2023
Evaluating the Dedicated Short-range Communication for Connected Vehicles against Network Security Attacks.
T Le, I Elsayed-Aly, W Jin, S Ryu, G Verrier, T Al Rahat, BB Park, Y Tian
VEHITS, 37-44, 2020
2020
ML-FEED: Machine Learning Framework for Efficient Exploit Detection (Full version)
T Saha, T Al Rahat, N Aaraj, Y Tian, NK Jha
The system can't perform the operation now. Try again later.
Articles 1–10