关注
Le Yu
Le Yu
Nanjing University of Posts and Telecommunications, School of Computer Science
在 polyu.edu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Can We Trust the Privacy Policies of Android Apps?
L Yu, X Luo, X Liu, T Zhang
46th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2016
1222016
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
Proceedings of the 39th International Conference on Software Engineering …, 2017
942017
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
M Fan, L Yu, S Chen, H Zhou, X Luo, S Li, Y Liu, J Liu, T Liu
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
752020
Enhancing the description-to-behavior fidelity in android apps with privacy policy
L Yu, X Luo, C Qian, S Wang, HKN Leung
IEEE Transactions on Software Engineering 44 (9), 834-854, 2018
722018
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
L Yu, T Zhang, X Luo, L Xue
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
692015
Toward Automatically Generating Privacy Policy for Android Apps
L Yu, T Zhang, X Luo, L Xue, H Chang
IEEE Transactions on Information Forensics and Security 12 (4), 2017
572017
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Yu, G Gu
IEEE Micro 35 (1), 44-53, 2015
552015
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies
L Yu, X Luo, J Chen, H Zhou, T Zhang, H Chang, HKN Leung
IEEE Transactions on Software Engineering, 2021
522021
Structural Attack against Graph Based Android Malware Detection
K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
432021
Revisiting the Description-to-Behavior Fidelity in Android Applications
L Yu, X Luo, C Qian, S Wang
23rd International Conference on Software Analysis, Evolution, and …, 2016
402016
Packergrind: An adaptive unpacking system for android apps
L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, X Ma
IEEE Transactions on Software Engineering 48 (2), 551-570, 2020
272020
Stan: Towards describing bytecodes of smart contract
X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
212020
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification
H Zhang, L Yu, X Xiao, Q Li, F Mercaldo, X Luo, Q Liu
Proceedings of the ACM Web Conference 2023, 2066-2075, 2023
162023
{SAID}: State-aware Defense Against Injection Attacks on In-vehicle Network
L Xue, Y Liu, T Li, K Zhao, J Li, L Yu, X Luo, Y Zhou, G Gu
31st USENIX Security Symposium (USENIX Security 22), 1921-1938, 2022
132022
Towards automatically reverse engineering vehicle diagnostic protocols
L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ...
31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022
132022
Localizing Function Errors in Mobile Apps with User Reviews
L Yu, J Chen, H Zhou, X Luo, K Liu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
132018
Is what you measure what you expect? factors affecting smartphone-based mobile network measurement
L Xue, X Ma, X Luo, L Yu, S Wang, T Chen
INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017
132017
Android malware detection: A survey
M Fan, T Liu, J Liu, X Luo, L Yu, X Guan
Scientia Sinica Informationis 50 (8), 1148-1177, 2020
122020
Characterizing mobile*-box applications
X Luo, H Zhou, L Yu, L Xue, Y Xie
Computer Networks 103, 228-239, 2016
122016
Ui obfuscation and its effects on automated ui analysis for android apps
H Zhou, T Chen, H Wang, L Yu, X Luo, T Wang, W Zhang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
92020
系统目前无法执行此操作,请稍后再试。
文章 1–20