Min Yang
Orcid: 0000-0001-9714-5545Affiliations:
- Fudan University, School of Computer Science, Shanghai Key Laboratory of Data Science, China
According to our database1,
Min Yang
authored at least 124 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., July, 2024
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications.
Proc. ACM Softw. Eng., 2024
CoRR, 2024
GNNFingers: A Fingerprinting Framework for Verifying Ownerships of Graph Neural Networks.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
CausalPC: Improving the Robustness of Point Cloud Classification by Causal Effect Identification.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks.
CoRR, 2023
MaSS: Model-agnostic, Semantic and Stealthy Data Poisoning Attack on Knowledge Graph Embedding.
Proceedings of the ACM Web Conference 2023, 2023
Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model.
Proceedings of the ACM Web Conference 2023, 2023
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Proceedings of the 32nd USENIX Security Symposium, 2023
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Int. J. Softw. Informatics, 2022
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling.
CoRR, 2022
CoRR, 2022
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
House of Cans: Covert Transmission of Internal Datasets via Capacity-Aware Neuron Steganography.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020
Sci. China Inf. Sci., 2020
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 20th IEEE International Conference on Data Mining, 2020
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
J. Commun. Inf. Networks, 2016
Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the Security and Privacy in Communication Networks, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014
Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014
2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012
2011
Proceedings of the 2011 USENIX Annual Technical Conference, 2011
2010
Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Proceedings of the Advances in Multimedia Modeling, 2007
Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, 2007
2006
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure.
Proceedings of the ICE-B 2006, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
ECLS: An Efficient Cooperative Localization Scheme For Wireless Sensor and Actor Networks.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Proceedings of the Grid and Cooperative Computing, 2004