Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale K Chen, P Wang, Y Lee, XF Wang, N Zhang, H Huang, W Zou, P Liu 24th USENIX Security Symposium (USENIX Security 15), 2015 | 281 | 2015 |
The peril of fragmentation: Security hazards in android device driver customizations X Zhou, Y Lee, N Zhang, M Naveed, XF Wang 2014 IEEE Symposium on Security and Privacy, 409-423, 2014 | 176 | 2014 |
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ... 2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016 | 135 | 2016 |
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 84* | 2017 |
Mayhem in the push clouds: Understanding and mitigating security hazards in mobile push-messaging services T Li, X Zhou, L Xing, Y Lee, M Naveed, XF Wang, X Han Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 58 | 2014 |
Using sonar for liveness detection to protect smart speakers against remote attackers Y Lee, Y Zhao, J Zeng, K Lee, N Zhang, FH Shezan, Y Tian, K Chen, ... Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2020 | 32 | 2020 |
Mass discovery of android traffic imprints through instantiated partial execution Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 30 | 2017 |
Understanding {iOS-based} Crowdturfing Through Hidden {UI} Analysis Y Lee, X Wang, K Lee, X Liao, XF Wang, T Li, X Mi 28th USENIX Security Symposium (USENIX Security 19), 765-781, 2019 | 15 | 2019 |
Ghost installer in the shadow: Security analysis of app installation on android Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 10 | 2017 |
Echo-guard: Acoustic-based anomaly detection system for smart manufacturing environments CB Seo, G Lee, Y Lee, SH Seo International Conference on Information Security Applications, 64-75, 2021 | 5 | 2021 |
Understanding illicit UI in iOS apps through hidden UI analysis Y Lee, X Wang, X Liao, XF Wang IEEE Transactions on Dependable and Secure Computing 18 (5), 2390-2402, 2019 | 5 | 2019 |
What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources S Demetriou, X Zhou, M Naveed, Y Lee, X Yuan, W Kan, C Gunter NDSS, 2015 | 5 | 2015 |
Image-based artificial intelligence technology for diagnosing middle ear diseases: a systematic review D Song, T Kim, Y Lee, J Kim Journal of Clinical Medicine 12 (18), 5831, 2023 | 3 | 2023 |
Aliasing Backdoor Attacks on Pre-trained Models C Wei, Y Lee, K Chen, G Meng, P Lv 32nd USENIX Security Symposium (USENIX Security 23), 2707-2724, 2023 | 2 | 2023 |
Toward better ear disease diagnosis: A multi-modal multi-fusion model using endoscopic images of the tympanic membrane and pure-tone audiometry T Kim, S Kim, J Kim, Y Lee, J Choi IEEE Access, 2023 | 1 | 2023 |
Semantic Decomposition and Anomaly Detection of Tympanic Membrane Endoscopic Images D Song, IS Song, J Kim, J Choi, Y Lee Applied Sciences 12 (22), 11677, 2022 | 1 | 2022 |
A Survey on Satellite Communication System Security M Kang, S Park, Y Lee Sensors 24 (9), 2897, 2024 | | 2024 |
STATION: Gesture-Based Authentication for Voice Interfaces S Park, X Wang, K Chen, Y Lee IEEE Internet of Things Journal, 2024 | | 2024 |
Development of ResNet152 UNet++-based segmentation algorithm for the tympanic membrane and affected areas T Kim, K Oh, J Kim, Y Lee, J Choi IEEE Access, 2023 | | 2023 |
Detection Techniques for Chinese Jargon: A Survey L Zhang, Y Lee 한국통신학회 학술대회논문집, 1348-1349, 2023 | | 2023 |