Follow
Zhemin Yang
Zhemin Yang
Verified email at fudan.edu.cn
Title
Cited by
Cited by
Year
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5022013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4152013
Leakminer: Detect information leakage on android with static taint analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 101-104, 2012
2402012
{UIPicker}:{User-Input} Privacy Identification in Mobile Applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 15), 993-1008, 2015
1272015
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
962018
Detecting third-party libraries in android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
2018 IEEE 25th International Conference on Software Analysis, Evolution and …, 2018
502018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
NDSS, 2018
442018
{ORDER}: Object {centRic}{DEterministic} Replay for Java
Z Yang, M Yang, L Xu, H Chen, B Zang
2011 USENIX Annual Technical Conference (USENIX ATC 11), 2011
442011
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
372014
Security matters: A survey on adversarial machine learning
G Li, P Zhu, J Li, Z Yang, N Cao, Z Chen
arXiv preprint arXiv:1810.07339, 2018
212018
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020
202020
Invetter: Locating insecure input validations in android services
L Zhang, Z Yang, Y He, Z Zhang, Z Qian, G Hong, Y Zhang, M Yang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
202018
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent
X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang
29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020
182020
App in the middle: Demystify application virtualization in Android and its security threats
L Zhang, Z Yang, Y He, M Li, S Yang, M Yang, Y Zhang, Z Qian
Proceedings of the ACM on Measurement and Analysis of Computing Systems 3 (1 …, 2019
182019
Identifying user-input privacy in mobile applications at a large scale
Y Nan, Z Yang, M Yang, S Zhou, Y Zhang, G Gu, X Wang, L Sun
IEEE Transactions on Information Forensics and Security 12 (3), 647-661, 2016
182016
Pdiff: Semantic-based patch presence testing for downstream kernels
Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang, X Zhang, X Xing, M Yang, Z Yang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
122020
Swift: a register-based JIT compiler for embedded JVMs
Y Zhang, M Yang, B Zhou, Z Yang, W Zhang, B Zang
Proceedings of the 8th ACM SIGPLAN/SIGOPS conference on Virtual Execution …, 2012
122012
An empirical study of web resource manipulation in real-world mobile applications
X Zhang, Y Zhang, Q Mo, H Xia, Z Yang, M Yang, X Wang, L Lu, H Duan
27th USENIX Security Symposium (USENIX Security 18), 1183-1198, 2018
92018
How android developers handle evolution-induced api compatibility issues: A large-scale study
H Xia, Y Zhang, Y Zhou, X Chen, Y Wang, X Zhang, S Cui, G Hong, ...
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
72020
TextExerciser: feedback-driven text input exercising for android applications
Y He, L Zhang, Z Yang, Y Cao, K Lian, S Li, W Yang, Z Zhang, M Yang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1071-1087, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20