Seguir
Min Yang (杨珉)
Min Yang (杨珉)
Professor, School of Computer Science and Technology, Fudan University
Dirección de correo verificada de fudan.edu.cn
Título
Citado por
Citado por
Año
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 1043 …, 2013
5772013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 611-622, 2013
4612013
Leakminer: Detect information leakage on android with static taint analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 101-104, 2012
2802012
Privacy Risks of General-Purpose Language Models
X Pan, M Zhang, S Ji, M Yang
41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
2672020
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
190*2020
Uipicker: User-input privacy identification in mobile applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 2015), 993-1008, 2015
1842015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018
1632018
Modeling extreme events in time series prediction
D Ding, M Zhang, X Pan, M Yang, X He
25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2019 …, 2019
1562019
Detecting third-party libraries in Android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
25th International Conference on Software Analysis, Evolution and …, 2018
1042018
Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation
X Pan, M Zhang, B Sheng, J Zhu, M Yang
31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022
892022
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
Network and Distributed System Security Symposium (NDSS 2018), 2018
812018
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium (USENIX Security 2018), 1113-1128, 2018
802018
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020
752020
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
Z Jiang,Y Zhang,J Xu,Q Wen,Z Wang,X Zhang,X Xing,M Yang, Z Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
57*2020
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent
X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang
29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020
532020
Identity confusion in {WebView-based} mobile app-in-app ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ...
31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022
462022
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th USENIX Security Symposium ( Security 21), 2021
462021
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
462014
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
B. Liu, C. Lu, Y. Zhang, Z. Li, F. Zhang, H. Duan, Y. Liu, J. Chen, J. Liang ...
Network and Distributed System Security Symposium (NDSS 2021), 2021
45*2021
ORDER: Object centRic DEterministic Replay for Java.
Z Yang, M Yang, L Xu, H Chen, B Zang
USENIX Annual Technical Conference (ATC 2011), 30-30, 2011
452011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20