default search action
Yuanyuan Zhang 0002
Person information
- affiliation: Shanghai Jiao Tong University, Shanghai, China
- affiliation (former): INRIA, INSA-Lyon, CITI laboratory, France
Other persons with the same name
- Yuanyuan Zhang (aka: Yuan-Yuan Zhang) — disambiguation page
- Yuanyuan Zhang 0001 — University of Kansas, USA
- Yuanyuan Zhang 0003 — University College London, UK
- Yuanyuan Zhang 0004 — University of Surrey, UK
- Yuanyuan Zhang 0005 — Zhengzhou University, Zhengzhou, China (and 1 more)
- Yuanyuan Zhang 0006 — Zhongguancun Laboratory, Beijing, China
- Yuanyuan Zhang 0007 (aka: YuanYuan Zhang 0007) — Sichuan University, College of Computer Science and Institute for Industrial Internet Research, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Yuanyuan Zhang, T. Aaron Gulliver, Huafeng Wu, Xiaojun Mei, Jiping Li, Fuqiang Lu, Weijun Wang:
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements. Pervasive Mob. Comput. 102: 101936 (2024) - [j21]Yuanyuan Zhang, Huafeng Wu, T. Aaron Gulliver, Xiaofang Li, Jiping Li, Jiangfeng Xian, Weijun Wang:
Real-time RSS-based target localization for UWSNs using an IDE-BP neural network. J. Supercomput. 80(14): 20150-20175 (2024) - [j20]Chen Lyu, Amit Pande, Yuanyuan Zhang, Dawu Gu, Prasant Mohapatra:
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections. IEEE Trans. Mob. Comput. 23(4): 3309-3327 (2024) - [c43]Dahan Pan, Jianqiang Wang, Yingpeng Chen, Donghui Yu, Wenbo Yang, Yuanyuan Zhang:
COMURICE: Closing Source Code Leakage in Cloud-Based Compiling via Enclave. CSCloud 2024: 126-131 - [c42]Haoran Fang, Kaikai Zhang, Donghui Yu, Yuanyuan Zhang:
DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling. ISSTA 2024: 832-843 - 2023
- [j19]Yuanyuan Zhang, Huafeng Wu, T. Aaron Gulliver, Jiangfeng Xian, Linian Liang:
Improved differential evolution for RSSD-based localization in Gaussian mixture noise. Comput. Commun. 206: 51-59 (2023) - [c41]Donghui Yu, Jianqiang Wang, Haoran Fang, Ya Fang, Yuanyuan Zhang:
SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis. RAID 2023: 485-498 - 2022
- [j18]Huafeng Wu, Linian Liang, Xiaojun Mei, Yuanyuan Zhang:
A Convex Optimization Approach For NLOS Error Mitigation in TOA-Based Localization. IEEE Signal Process. Lett. 29: 677-681 (2022) - [c40]Jianqiang Wang, Pouya Mahmoody, Ferdinand Brasser, Patrick Jauernig, Ahmad-Reza Sadeghi, Donghui Yu, Dahan Pan, Yuanyuan Zhang:
VirTEE: a full backward-compatible TEE with native live migration and secure I/O. DAC 2022: 241-246 - [c39]Runhan Feng, Ziyang Yan, Shiyan Peng, Yuanyuan Zhang:
Automated Detection of Password Leakage from Public GitHub Repositories. ICSE 2022: 175-186 - 2021
- [j17]Yuanyuan Zhang, Huafeng Wu, Xiaojun Mei, Jiangfeng Xian, Weijun Wang, Qiannan Zhang, Linian Liang:
Two-Phase Robust Target Localization in Ocean Sensor Networks Using Received Signal Strength Measurements. Sensors 21(5): 1724 (2021) - [j16]Yikun Hu, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. IEEE Trans. Software Eng. 47(6): 1241-1258 (2021) - [c38]Shuran Wang, Dahan Pan, Runhan Feng, Yuanyuan Zhang:
MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave. TrustCom 2021: 147-154 - 2020
- [j15]Huafeng Wu, Yuanyuan Zhang, Jun Wang, Weijun Wang, Jiangfeng Xian, Jing Chen, Xiangyi Zou, Prasant Mohapatra:
iOceanSee: A Novel Scheme for Ocean State Estimation Using 3D Mobile Convolutional Neural Network. IEEE Access 8: 153774-153786 (2020) - [j14]Jiangfeng Xian, Huafeng Wu, Xiaojun Mei, Yuanyuan Zhang, Huixing Chen, Jun Wang:
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack. Comput. Commun. 160: 623-635 (2020)
2010 – 2019
- 2019
- [j13]Yikun Hu, Yuanyuan Zhang, Dawu Gu:
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions. IEEE Access 7: 28170-28184 (2019) - [j12]Huafeng Wu, Jiangfeng Xian, Xiaojun Mei, Yuanyuan Zhang, Jun Wang, Junkuo Cao, Prasant Mohapatra:
Efficient target detection in maritime search and rescue wireless sensor network using data fusion. Comput. Commun. 136: 53-62 (2019) - [j11]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019) - [c37]Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:
SymSem: Symbolic Execution with Time Stamps for Deobfuscation. Inscrypt 2019: 225-245 - [c36]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c35]Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. SANER 2019: 344-354 - [i2]Yikun Hu, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. CoRR abs/1907.01374 (2019) - 2018
- [j10]Bodong Li, Yuanyuan Zhang, Juanru Li, Wenbo Yang, Dawu Gu:
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware. J. Syst. Softw. 140: 3-16 (2018) - [c34]Haohuang Wen, Juanru Li, Yuanyuan Zhang, Dawu Gu:
An Empirical Study of SDK Credential Misuse in iOS Apps. APSEC 2018: 258-267 - [c33]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c32]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis. ICSME 2018: 104-114 - [c31]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. NSS 2018: 46-63 - [c30]Chen Lyu, Amit Pande, Yuanyuan Zhang, Dawu Gu, Prasant Mohapatra:
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways. SECON 2018: 289-297 - [c29]Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. WISEC 2018: 1-11 - [i1]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis. CoRR abs/1808.06216 (2018) - 2017
- [j9]Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. ACM Trans. Embed. Comput. Syst. 16(2): 61:1-61:22 (2017) - [c28]Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:
Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. CANS 2017: 373-389 - [c27]Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices. IoT S&P@CCS 2017: 13-18 - [c26]Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. Inscrypt 2017: 301-320 - [c25]Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu:
MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation. DSC 2017: 98-106 - [c24]Xuewen Zhang, Yuanyuan Zhang, Juanru Li, Yikun Hu, Huayi Li, Dawu Gu:
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices. ICSME 2017: 47-57 - [c23]Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Nightingale: Translating Embedded VM Code in x86 Binary Executables. ISC 2017: 387-404 - [c22]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Binary code clone detection across architectures and compiling configurations. ICPC 2017: 88-98 - [c21]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu:
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. NDSS 2017 - 2016
- [j8]Chen Lyu, Shifeng Sun, Yuanyuan Zhang, Amit Pande, Haining Lu, Dawu Gu:
Privacy-preserving data sharing scheme over cloud for social applications. J. Netw. Comput. Appl. 74: 44-55 (2016) - [c20]Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu:
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. ACSAC 2016: 167-176 - [c19]Hui Liu, Yuanyuan Zhang, Juanru Li, Hui Wang, Dawu Gu:
Open Sesame! Web Authentication Cracking via Mobile App Analysis. APWeb (2) 2016: 483-487 - [c18]Yesheng Zhi, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Security Testing of Software on Embedded Devices Using x86 Platform. CollaborateCom 2016: 497-504 - [c17]Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu:
Security Analysis of Vendor Customized Code in Firmware of Embedded Device. SecureComm 2016: 722-739 - [c16]Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:
New Exploit Methods against Ptmalloc of GLIBC. Trustcom/BigDataSE/ISPA 2016: 646-653 - [c15]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. SANER 2016: 57-67 - 2015
- [j7]Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yuanyuan Zhang, Amit Pande:
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 59: 37-51 (2015) - [j6]Shifeng Sun, Chen Lyu, Dawu Gu, Yuanyuan Zhang, Yanli Ren:
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations. Int. J. Distributed Sens. Networks 11: 857405:1-857405:15 (2015) - [c14]Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu:
Vulnerability Assessment of OAuth Implementations in Android Applications. ACSAC 2015: 61-70 - [c13]Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu:
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS 2015: 414-425 - [c12]Bodong Li, Yuanyuan Zhang, Chen Lyu, Juanru Li, Dawu Gu:
SSG: Sensor Security Guard for Android Smartphones. CollaborateCom 2015: 221-233 - [c11]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu:
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015: 359-381 - 2014
- [c10]Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu, Dawu Gu:
DIAS: Automated Online Analysis for Android Applications. CIT 2014: 307-314 - [c9]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu:
APKLancet: tumor payload diagnosis and purification for android applications. AsiaCCS 2014: 483-494 - [c8]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Android App Protection via Interpretation Obfuscation. DASC 2014: 63-68 - [c7]Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu:
TagDroid: Hybrid SSL Certificate Verification in Android. ICICS 2014: 120-131 - [c6]Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu:
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. NSS 2014: 349-362 - 2013
- [j5]Chen Lyu, Dawu Gu, Yuanyuan Zhang, Tingting Lin, Xiaomei Zhang:
Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Yuanyuan Zhang, Marine Minier:
How network coding system constrains packet pollution attacks in wireless sensor networks. Int. J. Grid Util. Comput. 4(2/3): 197-203 (2013) - [c5]Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang:
Automatic Detection and Analysis of Encrypted Messages in Malware. Inscrypt 2013: 101-117 - 2012
- [j3]Yuanyuan Zhang, Marine Minier:
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures. J. Comput. Networks Commun. 2012: 184783:1-184783:14 (2012) - 2011
- [c4]Yuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier:
Flooding attacks against network coding and countermeasures. NSS 2011: 305-309
2000 – 2009
- 2009
- [j2]Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng, Tao Cheng:
Architecture Support for Memory Confidentiality and Integrity in Embedded Systems. Int. J. Distributed Sens. Networks 5(1): 96 (2009) - [c3]Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang, Tao Cheng:
Design and Implementation of Self-securing Disk. NAS 2009: 405-412 - 2008
- [j1]Yuanyuan Zhang, Dawu Gu, Juanru Li:
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks. Comput. Commun. 31(13): 2959-2971 (2008) - [c2]Yuanyuan Zhang, Dawu Gu, Bart Preneel:
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks. EUC (1) 2008: 272-279 - [c1]Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang, NingNan Song:
Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. HPCC 2008: 964-970
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint