Seguir
Yuan Zhang
Yuan Zhang
Professor, School of Computer Science, Fudan University
Dirección de correo verificada de fudan.edu.cn - Página principal
Título
Citado por
Citado por
Año
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5742013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4602013
Enhancing state-of-the-art classifiers with api semantics to detect evolved android malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
1812020
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1582018
Detecting third-party libraries in android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
992018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
792018
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020
702020
Pdiff: Semantic-based patch presence testing for downstream kernels
Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang, X Zhang, X Xing, M Yang, Z Yang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
542020
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
462014
Identity confusion in {WebView-based} mobile app-in-app ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ...
31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022
412022
How Android developers handle evolution-induced API compatibility issues: a large-scale study
H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, ...
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
412020
Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking
X Tan, Y Zhang, C Mi, J Cao, K Sun, Y Lin, M Yang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
382021
{BScout}: Direct whole patch presence test for java executables
J Dai, Y Zhang, Z Jiang, Y Zhou, J Chen, X Xing, X Zhang, X Tan, M Yang, ...
29th USENIX Security Symposium (USENIX Security 20), 1147-1164, 2020
362020
TextExerciser: feedback-driven text input exercising for android applications
Y He, L Zhang, Z Yang, Y Cao, K Lian, S Li, W Yang, Z Zhang, M Yang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1071-1087, 2020
342020
Invetter: Locating insecure input validations in android services
L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
302018
Hybrid malware detection approach with feedback-directed machine learning
Y Zhang, Z Wang
Information Sciences 63 (139103), 1-139103, 2020
282020
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
272016
Rethinking permission enforcement mechanism on mobile systems
Y Zhang, M Yang, G Gu, H Chen
IEEE Transactions on Information Forensics and Security 11 (10), 2227-2240, 2016
252016
App in the middle: Demystify application virtualization in Android and its security threats
L Zhang, Z Yang, Y He, M Li, S Yang, M Yang, Y Zhang, Z Qian
Proceedings of the ACM on Measurement and Analysis of Computing Systems 3 (1 …, 2019
242019
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
X Zhang, Y Zhang, Q Mo, H Xia, Z Yang, M Yang, X Wang, L Long, ...
In Proceedings of the 27th USENIX Security Symposium, Security’18, Baltimore …, 2018
242018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20