Follow
Min Yang (杨珉)
Min Yang (杨珉)
Professor, School of Computer Science and Technology, Fudan University
Verified email at fudan.edu.cn
Title
Cited by
Cited by
Year
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 1043 …, 2013
5572013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 611-622, 2013
4522013
Leakminer: Detect information leakage on android with static taint analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 101-104, 2012
2712012
Privacy Risks of General-Purpose Language Models
X Pan, M Zhang, S Ji, M Yang
41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
1782020
Uipicker: User-input privacy identification in mobile applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th USENIX Security Symposium (USENIX Security 2015), 993-1008, 2015
1712015
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware
X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
155*2020
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018
1472018
Modeling extreme events in time series prediction
D Ding, M Zhang, X Pan, M Yang, X He
25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2019 …, 2019
1342019
Detecting third-party libraries in Android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
25th International Conference on Software Analysis, Evolution and …, 2018
862018
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path
B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang
27th USENIX Security Symposium (USENIX Security 2018), 1113-1128, 2018
732018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
Network and Distributed System Security Symposium (NDSS 2018), 2018
692018
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem
S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ...
29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020
572020
Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation
X Pan, M Zhang, B Sheng, J Zhu, M Yang
31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022
552022
ORDER: Object centRic DEterministic Replay for Java.
Z Yang, M Yang, L Xu, H Chen, B Zang
USENIX Annual Technical Conference (ATC 2011), 30-30, 2011
462011
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
452014
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels
Z Jiang,Y Zhang,J Xu,Q Wen,Z Wang,X Zhang,X Xing,M Yang, Z Yang
27th ACM Conference on Computer and Communications Security (CCS 2020), 2020
44*2020
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent
X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang
29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020
442020
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
15th Annual Conference on Mobile Systems, Applications, and Services …, 2017
402017
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ...
30th USENIX Security Symposium ( Security 21), 2021
392021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR
B. Liu, C. Lu, Y. Zhang, Z. Li, F. Zhang, H. Duan, Y. Liu, J. Chen, J. Liang ...
Network and Distributed System Security Symposium (NDSS 2021), 2021
36*2021
The system can't perform the operation now. Try again later.
Articles 1–20