Le Yu

Orcid: 0000-0003-1457-6329

Affiliations:
  • Hong Kong Polytechnic University, Department of Computing, Hong Kong
  • Nanjing University of Posts and Telecommunications, China (former)


According to our database1, Le Yu authored at least 33 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A comprehensive analysis of website fingerprinting defenses on Tor.
Comput. Secur., January, 2024

One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning.
CoRR, 2024

LLMIF: Augmented Large Language Model for Fuzzing IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Revisiting Automotive Attack Surfaces: a Practitioners' Perspective.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews.
IEEE Trans. Software Eng., April, 2023

TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023

Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Poster: DP-Reverser: Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
PackerGrind: An Adaptive Unpacking System for Android Apps.
IEEE Trans. Software Eng., 2022

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Proceedings of the 31st USENIX Security Symposium, 2022

SAID: State-aware Defense Against Injection Attacks on In-vehicle Network.
Proceedings of the 31st USENIX Security Symposium, 2022

A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies.
IEEE Trans. Software Eng., 2021

Structural Attack against Graph Based Android Malware Detection.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Resource Race Attacks on Android.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

STAN: Towards Describing Bytecodes of Smart Contract.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

2018
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy.
IEEE Trans. Software Eng., 2018

Localizing Function Errors in Mobile Apps with User Reviews.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Toward Automatically Generating Privacy Policy for Android Apps.
IEEE Trans. Inf. Forensics Secur., 2017

Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Adaptive unpacking of Android apps.
Proceedings of the 39th International Conference on Software Engineering, 2017

On Discovering Vulnerabilities in Android Applications.
Proceedings of the Mobile Security and Privacy, 2017

2016
Characterizing mobile <sup>*</sup>-box applications.
Comput. Networks, 2016

Revisiting the Description-to-Behavior Fidelity in Android Applications.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Can We Trust the Privacy Policies of Android Apps?
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2015
VulHunter: Toward Discovering Vulnerabilities in Android Applications.
IEEE Micro, 2015

AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications.
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015

2010
A study of PS-InSAR method for small area urban land subsidence.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

2006
Implementation of a Data Node in China's Spatial Information Grid Based on NWGISS.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

A Matching-Based Automatic Registration for Remotely Sensed Imagery.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006


  Loading...