Yue Duan

Orcid: 0000-0003-1049-9645

According to our database1, Yue Duan authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Marco: A Stochastic Asynchronous Concolic Explorer.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Roll with the Punches: Expansion and Shrinkage of Soft Label Selection for Semi-supervised Fine-Grained Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

PG-LBO: Enhancing High-Dimensional Bayesian Optimization with Pseudo-Label and Gaussian Process Guidance.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
PG-LBO: Enhancing High-Dimensional Bayesian Optimization with Pseudo-Label and Gaussian Process Guidance.
CoRR, 2023

Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Semi-supervised Learning with Non-random Missing Labels.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Probabilistic Path Prioritization for Hybrid Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2022

MutexMatch: Semi-supervised Learning with Mutex-based Consistency Regularization.
CoRR, 2022

RDA: Reciprocal Distribution Alignment for Robust Semi-supervised Learning.
Proceedings of the Computer Vision - ECCV 2022, 2022

DC-SSL: Addressing Mismatched Class Distribution in Semi-supervised Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Medical image segmentation and reconstruction of prostate tumor based on 3D AlexNet.
Comput. Methods Programs Biomed., 2021

2020
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Discerning Code Changes From a Security Perspective.
PhD thesis, 2019

Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Evaluation of GF-3 Quad-Polarized SAR Imagery for Coastal Wetland Observation.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

2017
JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2015
Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015

Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Social Network Based Reputation Computation and Document Classification.
J. Univers. Comput. Sci., 2012

2011
Automatic Reputation Computation through Document Analysis: A Social Network Approach.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011


  Loading...