default search action
Zhemin Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j5]Shuai Li, Zhemin Yang, Yunteng Yang, Dingyi Liu, Min Yang:
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale. IEEE Trans. Inf. Forensics Secur. 19: 3135-3147 (2024) - 2019
- [j4]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 17:1-17:24 (2019) - 2017
- [j3]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - 2016
- [j2]Lei Zhang, Donglai Zhu, Zhemin Yang, Limin Sun, Min Yang:
A survey of privacy protection techniques for mobile devices. J. Commun. Inf. Networks 1(4): 86-92 (2016) - 2014
- [j1]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014)
Conference and Workshop Papers
- 2024
- [c23]Xiaolin Du, Zhemin Yang, Jiapeng Lin, Yinzhi Cao, Min Yang:
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps. SP 2024: 735-751 - 2023
- [c22]Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. CCS 2023: 1272-1286 - [c21]Shuai Li, Zhemin Yang, Guangliang Yang, Hange Zhang, Nan Hua, Yurui Huang, Min Yang:
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. USENIX Security Symposium 2023: 5485-5501 - 2022
- [c20]Shuai Li, Zhemin Yang, Nan Hua, Peng Liu, Xiaohan Zhang, Guangliang Yang, Min Yang:
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps. CCS 2022: 1887-1900 - [c19]Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan:
Analyzing Ground-Truth Data of Mobile Gambling Scams. SP 2022: 2176-2193 - [c18]Xudong Pan, Mi Zhang, Yifan Yan, Jiaming Zhu, Zhemin Yang:
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. USENIX Security Symposium 2022: 3989-4006 - [c17]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - 2020
- [c16]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c15]Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. ICSE 2020: 886-898 - [c14]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. SP 2020: 1071-1087 - [c13]Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. USENIX Security Symposium 2020: 1147-1164 - [c12]Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. USENIX Security Symposium 2020: 2793-2810 - 2019
- [c11]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. SIGMETRICS (Abstracts) 2019: 75-76 - 2018
- [c10]Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. CCS 2018: 1165-1178 - [c9]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c8]Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS 2018 - [c7]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - [c6]Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, Hao Chen:
Detecting third-party libraries in Android applications with high precision and recall. SANER 2018: 141-152 - 2015
- [c5]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008 - 2013
- [c4]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c3]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - 2012
- [c2]Yuan Zhang, Min Yang, Bo Zhou, Zhemin Yang, Weihua Zhang, Binyu Zang:
Swift: a register-based JIT compiler for embedded JVMs. VEE 2012: 63-74 - 2011
- [c1]Zhemin Yang, Min Yang, Lvcai Xu, Haibo Chen, Binyu Zang:
ORDER: Object centRic DEterministic Replay for Java. USENIX ATC 2011
Informal and Other Publications
- 2018
- [i1]Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen:
Security Matters: A Survey on Adversarial Machine Learning. CoRR abs/1810.07339 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint