关注
Min Yang (杨珉)
Min Yang (杨珉)
Professor, School of Computer Science and Technology, Fudan University
在 fudan.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 1043 …, 2013
5532013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 611-622, 2013
4512013
Leakminer: Detect information leakage on android with static taint analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 101-104, 2012
2682012
Privacy Risks of General-Purpose Language Models
X Pan, M Zhang, S Ji, M Yang
41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
1852020
Uipicker: User-input privacy identification in mobile applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 2015), 993-1008, 2015
1712015
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
156*2020
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018
1472018
Modeling extreme events in time series prediction
D Ding, M Zhang, X Pan, M Yang, X He
25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2019 …, 2019
1332019
Detecting third-party libraries in Android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
25th International Conference on Software Analysis, Evolution and …, 2018
852018
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium (USENIX Security 2018), 1113-1128, 2018
722018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
Network and Distributed System Security Symposium (NDSS 2018), 2018
682018
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020
582020
Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation
X Pan, M Zhang, B Sheng, J Zhu, M Yang
31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022
572022
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent
X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang
29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020
452020
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
452014
ORDER: Object centRic DEterministic Replay for Java.
Z Yang, M Yang, L Xu, H Chen, B Zang
USENIX Annual Technical Conference (ATC 2011), 30-30, 2011
452011
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
Z Jiang,Y Zhang,J Xu,Q Wen,Z Wang,X Zhang,X Xing,M Yang, Z Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
42*2020
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th USENIX Security Symposium ( Security 21), 2021
412021
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
15th Annual Conference on Mobile Systems, Applications, and Services …, 2017
402017
Identity confusion in {WebView-based} mobile app-in-app ecosystems
L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ...
31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022
362022
系统目前无法执行此操作,请稍后再试。
文章 1–20