default search action
Min Yang 0002
Person information
- affiliation: Fudan University, School of Computer Science, Shanghai Key Laboratory of Data Science, China
Other persons with the same name
- Min Yang — disambiguation page
- Min Yang 0001 — Wuhan University, Computer School, State Key Lab of Software Engineering, China
- Min Yang 0003 — Beijing Institute of Technology, School of Computer Science, Beijing Laboratory of Intelligent Information Technology, China
- Min Yang 0004 — Zhejiang University, College of Computer Science, China
- Min Yang 0005 — Hong Kong Institute of Education, Hong Kong
- Min Yang 0006 — Wuhan University, School of Resource and Environment Sciences, China
- Min Yang 0007 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, China (and 1 more)
- Min Yang 0008 — FalconStor Software, Melville, NY, USA (and 2 more)
- Min Yang 0009 — Yantai University, Yantai, China
- Min Yang 0010 — Sun Yat-sen University, School of Electronics and Information Technology, Guangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Keke Lian, Lei Zhang, Guangliang Yang, Shuo Mao, Xinjie Wang, Yuan Zhang, Min Yang:
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications. Proc. ACM Softw. Eng. 1(FSE): 70-91 (2024) - [j16]Shuai Li, Zhemin Yang, Yunteng Yang, Dingyi Liu, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. IEEE Trans. Inf. Forensics Secur. 19: 3135-3147 (2024) - [j15]Zhibo Zhang, Lei Zhang, Guangliang Yang, Yanjun Chen, Jiahao Xu, Min Yang:
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems. IEEE Trans. Inf. Forensics Secur. 19: 5434-5448 (2024) - [j14]Zhetao Li, Jianhui Wang, Saiqin Long, Jianming Fu, Min Yang, Jian Weng:
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks. IEEE Trans. Mob. Comput. 23(7): 7739-7752 (2024) - [c98]Xiaoyu You, Jianwei Xu, Mi Zhang, Zechen Gao, Min Yang:
RRL: Recommendation Reverse Learning. AAAI 2024: 9296-9304 - [c97]Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Zhaoxiang Wang, Min Yang:
CausalPC: Improving the Robustness of Point Cloud Classification by Causal Effect Identification. CVPR 2024: 19779-19789 - [c96]Yuanmin Huang, Mi Zhang, Daizong Ding, Erling Jiang, Qifan Xiao, Xiaoyu You, Yuan Tian, Min Yang:
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization. ESORICS (1) 2024: 24-44 - [c95]Jiarun Dai, Bufan Gao, Mingyuan Luo, Zongan Huang, Zhongrui Li, Yuan Zhang, Min Yang:
SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems. ICSE 2024: 50:1-50:13 - [c94]Zhongrui Li, Jiarun Dai, Zongan Huang, Nianhao You, Yuan Zhang, Min Yang:
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing. ISSTA 2024: 844-855 - [c93]Jiangrong Wu, Yuhong Nan, Luyi Xing, Jiatao Cheng, Zimin Lin, Zibin Zheng, Min Yang:
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem. NDSS 2024 - [c92]Kangzheng Gu, Yuan Zhang, Jiajun Cao, Xin Tan, Min Yang:
How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel. SIGSOFT FSE Companion 2024: 62-73 - [c91]Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang:
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. SP 2024: 735-751 - [c90]Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. SP 2024: 2124-2141 - [c89]Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. SP 2024: 3961-3978 - [c88]Xiaoyu You, Youhe Jiang, Jianwei Xu, Mi Zhang, Min Yang:
GNNFingers: A Fingerprinting Framework for Verifying Ownerships of Graph Neural Networks. WWW 2024: 652-663 - [c87]Guoyi Ye, Geng Hong, Yuan Zhang, Min Yang:
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets. WWW 2024: 1585-1595 - [c86]Youkun Shi, Yuan Zhang, Tianhao Bai, Lei Zhang, Xin Tan, Min Yang:
RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications. WWW 2024: 1746-1755 - [i14]Yining Wang, Junjie Sun, Chenyue Wang, Mi Zhang, Min Yang:
Navigate Beyond Shortcuts: Debiased Learning through the Lens of Neural Collapse. CoRR abs/2405.05587 (2024) - 2023
- [j13]Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. IEEE Trans. Dependable Secur. Comput. 20(2): 902-916 (2023) - [j12]Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. IEEE Trans. Dependable Secur. Comput. 20(3): 1959-1978 (2023) - [j11]Mi Zhang, Daizong Ding, Xudong Pan, Min Yang:
Enhancing Time Series Predictors With Generalized Extreme Value Loss. IEEE Trans. Knowl. Data Eng. 35(2): 1473-1487 (2023) - [c85]Daizong Ding, Mi Zhang, Fuli Feng, Yuanmin Huang, Erling Jiang, Min Yang:
Black-Box Adversarial Attack on Time Series Classification. AAAI 2023: 7358-7368 - [c84]Shengyao Zhang, Xudong Pan, Mi Zhang, Min Yang:
SlowBERT: Slow-down Attacks on Input-adaptive Multi-exit BERT. ACL (Findings) 2023: 9992-10007 - [c83]Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. ACM TUR-C 2023: 133-135 - [c82]Guoyi Ye, Mengying Wu, Geng Hong, Min Yang:
Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets. ACM TUR-C 2023: 148-149 - [c81]Fenglu Zhang, Baojun Liu, Eihal Alowaisheq, Jianjun Chen, Chaoyi Lu, Linjian Song, Yong Ma, Ying Liu, Haixin Duan, Min Yang:
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers. CCS 2023: 296-310 - [c80]Zhenrui Zhang, Geng Hong, Xiang Li, Zhuoqun Fu, Jia Zhang, Mingxuan Liu, Chuhan Wang, Jianjun Chen, Baojun Liu, Haixin Duan, Chao Zhang, Min Yang:
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild. CCS 2023: 326-340 - [c79]Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. CCS 2023: 1272-1286 - [c78]Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang:
SyzDirect: Directed Greybox Fuzzing for Linux Kernel. CCS 2023: 1630-1644 - [c77]Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang:
Understanding and Detecting Abused Image Hosting Modules as Malicious Services. CCS 2023: 3213-3227 - [c76]Daizong Ding, Erling Jiang, Yuanmin Huang, Mi Zhang, Wenxuan Li, Min Yang:
CAP: Robust Point Cloud Classification via Semantic and Structural Modeling. CVPR 2023: 12260-12270 - [c75]Zhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng:
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. DSN 2023: 480-493 - [c74]Xudong Pan, Mi Zhang, Yifan Yan, Yining Wang, Min Yang:
Cracking White-box DNN Watermarks via Invariant Neuron Transforms. KDD 2023: 1783-1794 - [c73]Zhibo Zhang, Zhangyue Zhang, Keke Lian, Guangliang Yang, Lei Zhang, Yuan Zhang, Min Yang:
TrustedDomain Compromise Attack in App-in-app Ecosystems. SaTS@CCS 2023: 51-57 - [c72]Xiaohan Zhang, Haoqi Ye, Ziqi Huang, Xiao Ye, Yinzhi Cao, Yuan Zhang, Min Yang:
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective. SP 2023: 934-950 - [c71]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [c70]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [c69]Wenyu Zhu, Zhiyao Feng, Zihan Zhang, Jianjun Chen, Zhijian Ou, Min Yang, Chao Zhang:
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning. SP 2023: 2357-2374 - [c68]Yifan Yan, Xudong Pan, Mi Zhang, Min Yang:
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. USENIX Security Symposium 2023: 2347-2364 - [c67]Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang:
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. USENIX Security Symposium 2023: 2939-2956 - [c66]Yudi Zhao, Yuan Zhang, Min Yang:
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs. USENIX Security Symposium 2023: 3691-3708 - [c65]Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang:
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. USENIX Security Symposium 2023: 5485-5501 - [c64]Xiaoyu You, Chi Li, Daizong Ding, Mi Zhang, Fuli Feng, Xudong Pan, Min Yang:
Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model. WWW 2023: 938-948 - [c63]Xiaoyu You, Beina Sheng, Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Fuli Feng:
MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding. WWW 2023: 2000-2010 - [i13]Qifan Xiao, Xudong Pan, Yifan Lu, Mi Zhang, Jiarun Dai, Min Yang:
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks. CoRR abs/2303.09731 (2023) - [i12]Yifan Yan, Xudong Pan, Mi Zhang, Min Yang:
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation. CoRR abs/2303.09732 (2023) - [i11]Xiaohan Zhang, Yang Wang, Xin Zhang, Ziqi Huang, Lei Zhang, Min Yang:
Understanding Privacy Over-collection in WeChat Sub-app Ecosystem. CoRR abs/2306.08391 (2023) - [i10]Yifan Lu, Wenxuan Li, Mi Zhang, Xudong Pan, Min Yang:
MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks. CoRR abs/2309.03466 (2023) - [i9]Mi Zhang, Xudong Pan, Min Yang:
JADE: A Linguistics-based Safety Evaluation Platform for LLM. CoRR abs/2311.00286 (2023) - [i8]Huming Qiu, Junjie Sun, Mi Zhang, Xudong Pan, Min Yang:
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting. CoRR abs/2312.04902 (2023) - 2022
- [j10]Min Yang, Chao Zhang, Fu Song, Yuan Zhang:
Preface to Special Issue on System Software Security. Int. J. Softw. Informatics 12(3): 259-261 (2022) - [j9]Xudong Pan, Mi Zhang, Daizong Ding, Min Yang:
A Geometrical Perspective on Image Style Transfer With Adversarial Learning. IEEE Trans. Pattern Anal. Mach. Intell. 44(1): 63-75 (2022) - [c62]Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c61]Daizong Ding, Mi Zhang, Yuanmin Huang, Xudong Pan, Fuli Feng, Erling Jiang, Min Yang:
Towards Backdoor Attack on Deep Learning based Time Series Classification. ICDE 2022: 1274-1287 - [c60]Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. ASE 2022: 76:1-76:13 - [c59]Xudong Pan, Yifan Yan, Mi Zhang, Min Yang:
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting. KDD 2022: 1327-1336 - [c58]Xudong Pan, Shengyao Zhang, Mi Zhang, Yifan Yan, Min Yang:
House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography. NeurIPS 2022 - [c57]Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan:
Analyzing Ground-Truth Data of Mobile Gambling Scams. SP 2022: 2176-2193 - [c56]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c55]Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang:
Identity Confusion in WebView-based Mobile App-in-app Ecosystems. USENIX Security Symposium 2022: 1597-1613 - [c54]Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang:
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. USENIX Security Symposium 2022: 1993-2010 - [c53]Shujiang Wu, Jianjia Yu, Min Yang, Yinzhi Cao:
Rendering Contention Channel Made Practical in Web Browsers. USENIX Security Symposium 2022: 3183-3199 - [c52]Xudong Pan, Mi Zhang, Beina Sheng, Jiaming Zhu, Min Yang:
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation. USENIX Security Symposium 2022: 3611-3628 - [c51]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [c50]Xin Tan, Yuan Zhang, Jiajun Cao, Kun Sun, Mi Zhang, Min Yang:
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects. WWW 2022: 767-777 - [i7]Yifan Yan, Xudong Pan, Yining Wang, Mi Zhang, Min Yang:
Cracking White-box DNN Watermarks via Invariant Neuron Transforms. CoRR abs/2205.00199 (2022) - [i6]Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang:
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model. CoRR abs/2206.14371 (2022) - [i5]Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang:
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling. CoRR abs/2207.08556 (2022) - 2021
- [c49]Xudong Pan, Mi Zhang, Yifan Yan, Min Yang:
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains. ACSAC 2021: 634-645 - [c48]Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang:
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. CCS 2021: 3282-3299 - [c47]Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:
Facilitating Vulnerability Assessment through PoC Migration. CCS 2021: 3300-3317 - [c46]Daizong Ding, Mi Zhang, Hanrui Wang, Xudong Pan, Min Yang, Xiangnan He:
A Deep Learning Framework for Self-evolving Hierarchical Community Detection. CIKM 2021: 372-381 - [c45]Xudong Pan, Mi Zhang, Yifan Lu, Min Yang:
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks. ESORICS (1) 2021: 542-562 - [c44]Chaoyi Lu, Baojun Liu, Yiming Zhang, Zhou Li, Fenglu Zhang, Haixin Duan, Ying Liu, Joann Qiongna Chen, Jinjin Liang, Zaifeng Zhang, Shuang Hao, Min Yang:
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR. NDSS 2021 - [c43]Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang:
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. USENIX Security Symposium 2021: 2471-2488 - [c42]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. USENIX Security Symposium 2021: 3201-3217 - [e1]Min Yang, Chao Chen, Yang Liu:
Network and System Security - 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings. Lecture Notes in Computer Science 13041, Springer 2021, ISBN 978-3-030-92707-3 [contents] - [i4]Wenyu Zhu, Zhiyao Feng, Zihan Zhang, Zhijian Ou, Min Yang, Chao Zhang:
iCallee: Recovering Call Graphs for Binaries. CoRR abs/2111.01415 (2021) - 2020
- [j8]Zhetao Li, Wenlin Li, Fuyuan Lin, Yi Sun, Min Yang, Yuan Zhang, Zhibo Wang:
Hybrid malware detection approach with feedback-directed machine learning. Sci. China Inf. Sci. 63(3) (2020) - [j7]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE Trans. Mob. Comput. 19(12): 2946-2964 (2020) - [c41]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning. AAAI 2020: 3791-3800 - [c40]Kun Du, Hao Yang, Yubao Zhang, Haixin Duan, Haining Wang, Shuang Hao, Zhou Li, Min Yang:
Understanding Promotion-as-a-Service on GitHub. ACSAC 2020: 597-610 - [c39]Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang:
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. CCS 2020: 757-770 - [c38]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c37]Mingming Zhang, Xiaofeng Zheng, Kaiwen Shen, Ziqiao Kong, Chaoyi Lu, Yu Wang, Haixin Duan, Shuang Hao, Baojun Liu, Min Yang:
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks. CCS 2020: 1939-1952 - [c36]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Modeling Personalized Out-of-Town Distances in Location Recommendation. ICDM 2020: 112-121 - [c35]Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. ICSE 2020: 886-898 - [c34]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang:
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. SP 2020: 592-607 - [c33]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. SP 2020: 1071-1087 - [c32]Xudong Pan, Mi Zhang, Shouling Ji, Min Yang:
Privacy Risks of General-Purpose Language Models. SP 2020: 1314-1331 - [c31]Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. USENIX Security Symposium 2020: 1147-1164 - [c30]Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang:
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. USENIX Security Symposium 2020: 1381-1398 - [c29]Xudong Pan, Mi Zhang, Duocai Wu, Qifan Xiao, Shouling Ji, Min Yang:
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. USENIX Security Symposium 2020: 1641-1658 - [c28]Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. USENIX Security Symposium 2020: 2793-2810 - [i3]Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Min Yang:
Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver. CoRR abs/2010.13356 (2020) - [i2]Kaiwen Shen, Chuhan Wang, Minglei Guo, Xiaofeng Zheng, Chaoyi Lu, Baojun Liu, Yuxuan Zhao, Shuang Hao, Haixin Duan, Qingfeng Pan, Min Yang:
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks. CoRR abs/2011.08420 (2020)
2010 – 2019
- 2019
- [j6]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 17:1-17:24 (2019) - [c27]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who is answering my queries: understanding and characterizing interception of the DNS resolution path. ANRW 2019: 15-16 - [c26]Daizong Ding, Mi Zhang, Xudong Pan, Min Yang, Xiangnan He:
Modeling Extreme Events in Time Series Prediction. KDD 2019: 1114-1122 - [c25]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. SIGMETRICS (Abstracts) 2019: 75-76 - 2018
- [c24]Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. CCS 2018: 1165-1178 - [c23]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c22]Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS 2018 - [c21]Jianjun Chen, Jian Jiang, Hai-Xin Duan, Tao Wan, Shuo Chen, Vern Paxson, Min Yang:
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. USENIX Security Symposium 2018: 1079-1093 - [c20]Baojun Liu, Chaoyi Lu, Hai-Xin Duan, Ying Liu, Zhou Li, Shuang Hao, Min Yang:
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path. USENIX Security Symposium 2018: 1113-1128 - [c19]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - [c18]Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, Hao Chen:
Detecting third-party libraries in Android applications with high precision and recall. SANER 2018: 141-152 - 2017
- [j5]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - [c17]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MobiSys 2017: 225-238 - 2016
- [j4]Lei Zhang, Donglai Zhu, Zhemin Yang, Limin Sun, Min Yang:
A survey of privacy protection techniques for mobile devices. J. Commun. Inf. Networks 1(4): 86-92 (2016) - [j3]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
Rethinking Permission Enforcement Mechanism on Mobile Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2227-2240 (2016) - [i1]Lannan Luo, Qiang Zeng, Chen Cao, Kai Chen, Jian Liu, Limin Liu, Neng Gao, Min Yang, Xinyu Xing, Peng Liu:
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation. CoRR abs/1611.00837 (2016) - 2015
- [c16]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. SecureComm 2015: 3-22 - [c15]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008 - 2014
- [j2]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - [c14]Shu Peng, Jun Gu, Xiaoyang Sean Wang, Weixiong Rao, Min Yang, Yu Cao:
Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse. APWeb 2014: 559-567 - [c13]Jun Gu, Shu Peng, Xiaoyang Sean Wang, Weixiong Rao, Min Yang, Yu Cao:
Cost-Based Join Algorithm Selection in Hadoop. WISE (2) 2014: 246-261 - 2013
- [c12]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c11]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - 2012
- [c10]Yuan Zhang, Min Yang, Bo Zhou, Zhemin Yang, Weihua Zhang, Binyu Zang:
Swift: a register-based JIT compiler for embedded JVMs. VEE 2012: 63-74 - 2011
- [c9]Zhemin Yang, Min Yang, Lvcai Xu, Haibo Chen, Binyu Zang:
ORDER: Object centRic DEterministic Replay for Java. USENIX ATC 2011 - 2010
- [j1]Yuan Li, Min Yang, Haibin Kan:
Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(3): 640-643 (2010)
2000 – 2009
- 2008
- [c8]Qin Wang, Ke Lin, Kewen Lin, Dilin Mao, Min Yang:
A Measurement Study of P2P Live Video Streaming on WLANs. GLOBECOM 2008: 1514-1518 - 2007
- [c7]Qin Wang, Junpu Chen, Weihua Zhang, Min Yang, Binyu Zang:
Optimizing software cache performance of packet processing applications. LCTES 2007: 227-236 - [c6]Huafeng Wu, Han Peng, Qiang Zhou, Min Yang, Bing Sun, Bo Yu:
P2P Multimedia Sharing over MANET. MMM (2) 2007: 635-642 - 2006
- [c5]Min Yang, Mi Zhang, Peng Han, Haiguang Chen, Xi Zhou, Dilin Mao, Chuanshan Gao:
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure. ICE-B 2006: 88-92 - 2005
- [c4]Peng Han, Chuanshan Gao, Min Yang, Dilin Mao, Bo Yu:
ECLS: An Efficient Cooperative Localization Scheme For Wireless Sensor and Actor Networks. CIT 2005: 396-400 - [c3]Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao:
PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. AINA 2005: 357-362 - [c2]Bo Yu, Haiguang Chen, Min Yang, Dilin Mao, Chuanshan Gao:
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks. ISPA 2005: 757-768 - 2004
- [c1]Min Yang, Zunping Cheng, Ning Shang, Mi Zhang, Min Li, Jing Dai, Wei Wang, Dilin Mao, Chuanshan Gao:
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow. GCC 2004: 997-1000
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 22:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint