Min Yang

Orcid: 0000-0001-9714-5545

Affiliations:
  • Fudan University, School of Computer Science, Shanghai Key Laboratory of Data Science, China


According to our database1, Min Yang authored at least 124 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks.
IEEE Trans. Mob. Comput., July, 2024

The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems.
IEEE Trans. Inf. Forensics Secur., 2024

Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2024

Towards Practical Backdoor Attacks on Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2024

Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications.
Proc. ACM Softw. Eng., 2024

Navigate Beyond Shortcuts: Debiased Learning through the Lens of Neural Collapse.
CoRR, 2024

GNNFingers: A Fingerprinting Framework for Verifying Ownerships of Graph Neural Networks.
Proceedings of the ACM on Web Conference 2024, 2024

Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets.
Proceedings of the ACM on Web Conference 2024, 2024

RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications.
Proceedings of the ACM on Web Conference 2024, 2024

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024

Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization.
Proceedings of the Computer Security - ESORICS 2024, 2024

CausalPC: Improving the Robustness of Point Cloud Classification by Causal Effect Identification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

RRL: Recommendation Reverse Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Enhancing Time Series Predictors With Generalized Extreme Value Loss.
IEEE Trans. Knowl. Data Eng., 2023

Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge.
IEEE Trans. Dependable Secur. Comput., 2023

Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware.
IEEE Trans. Dependable Secur. Comput., 2023

JADE: A Linguistics-based Safety Evaluation Platform for LLM.
CoRR, 2023

MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks.
CoRR, 2023

Understanding Privacy Over-collection in WeChat Sub-app Ecosystem.
CoRR, 2023

MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023

Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model.
Proceedings of the ACM Web Conference 2023, 2023

Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

TrustedDomain Compromise Attack in App-in-app Ecosystems.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Cracking White-box DNN Watermarks via Invariant Neuron Transforms.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

CAP: Robust Point Cloud Classification via Semantic and Structural Modeling.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SyzDirect: Directed Greybox Fuzzing for Linux Kernel.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Revealing and Analyzing the Visual Scams of Cryptocurrency Wallets.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

SlowBERT: Slow-down Attacks on Input-adaptive Multi-exit BERT.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Black-Box Adversarial Attack on Time Series Classification.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Geometrical Perspective on Image Style Transfer With Adversarial Learning.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Preface to Special Issue on System Software Security.
Int. J. Softw. Informatics, 2022

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling.
CoRR, 2022

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model.
CoRR, 2022

Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Proceedings of the 31st USENIX Security Symposium, 2022

Rendering Contention Channel Made Practical in Web Browsers.
Proceedings of the 31st USENIX Security Symposium, 2022

Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Proceedings of the 31st USENIX Security Symposium, 2022

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
Proceedings of the 31st USENIX Security Symposium, 2022

Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Proceedings of the 31st USENIX Security Symposium, 2022

Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Exploit the Last Straw That Breaks Android Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Precise (Un)Affected Version Analysis for Web Vulnerabilities.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Towards Backdoor Attack on Deep Learning based Time Series Classification.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
iCallee: Recovering Call Graphs for Binaries.
CoRR, 2021

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.
Proceedings of the 30th USENIX Security Symposium, 2021

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Deep Learning Framework for Self-evolving Hierarchical Community Detection.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Facilitating Vulnerability Assessment through PoC Migration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver.
CoRR, 2020

Hybrid malware detection approach with feedback-directed machine learning.
Sci. China Inf. Sci., 2020

An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Proceedings of the 29th USENIX Security Symposium, 2020

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Proceedings of the 29th USENIX Security Symposium, 2020

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

BScout: Direct Whole Patch Presence Test for Java Executables.
Proceedings of the 29th USENIX Security Symposium, 2020

SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Privacy Risks of General-Purpose Language Models.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Modeling Personalized Out-of-Town Distances in Location Recommendation.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Modeling Extreme Events in Time Series Prediction.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018

We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Inf. Forensics Secur., 2016

A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

2015
UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Inf. Forensics Secur., 2014

Cost-Based Join Algorithm Selection in Hadoop.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2013
Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Swift: a register-based JIT compiler for embedded JVMs.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

2011
ORDER: Object centRic DEterministic Replay for Java.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2010
Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2008
A Measurement Study of P2P Live Video Streaming on WLANs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
P2P Multimedia Sharing over MANET.
Proceedings of the Advances in Multimedia Modeling, 2007

Optimizing software cache performance of packet processing applications.
Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, 2007

2006
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure.
Proceedings of the ICE-B 2006, 2006

2005
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

PICC: A Secure Mobile Agent Framework Based on Garbled Circuit.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

ECLS: An Efficient Cooperative Localization Scheme For Wireless Sensor and Actor Networks.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...