Yuanyuan Zhang

Orcid: 0000-0002-6682-2264

Affiliations:
  • Shanghai Jiao Tong University, Shanghai, China
  • INRIA, INSA-Lyon, CITI laboratory, France (former)


According to our database1, Yuanyuan Zhang authored at least 66 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
3
1
1
2
2
3
1
1
1
2
2
1
1
1
3
1
2
1
3
6
8
6
4
5
1
1
1
2

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Real-time RSS-based target localization for UWSNs using an IDE-BP neural network.
J. Supercomput., September, 2024

Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024

An efficient estimator for source localization in WSNs using RSSD and TDOA measurements.
Pervasive Mob. Comput., 2024

Enhancing Effective Bidirectional Isolation for Function Fusion in Serverless Architectures.
Proceedings of the 25th International Middleware Conference, 2024

DDGF: Dynamic Directed Greybox Fuzzing with Path Profiling.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

COMURICE: Closing Source Code Leakage in Cloud-Based Compiling via Enclave.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

2023
Improved differential evolution for RSSD-based localization in Gaussian mixture noise.
Comput. Commun., 2023

SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
A Convex Optimization Approach For NLOS Error Mitigation in TOA-Based Localization.
IEEE Signal Process. Lett., 2022

Automated Detection of Password Leakage from Public GitHub Repositories.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison.
IEEE Trans. Software Eng., 2021

Two-Phase Robust Target Localization in Ocean Sensor Networks Using Received Signal Strength Measurements.
Sensors, 2021

MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack.
Comput. Commun., 2020

iOceanSee: A Novel Scheme for Ocean State Estimation Using 3D Mobile Convolutional Neural Network.
IEEE Access, 2020

2019
Security analysis of third-party in-app payment in mobile applications.
J. Inf. Secur. Appl., 2019

Efficient target detection in maritime search and rescue wireless sensor network using data fusion.
Comput. Commun., 2019

Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

SymSem: Symbolic Execution with Time Stamps for Deobfuscation.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Burn After Reading: Expunging Execution Footprints of Android Apps.
Proceedings of the Network and System Security - 12th International Conference, 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
How network coding system constrains packet pollution attacks in wireless sensor networks.
Int. J. Grid Util. Comput., 2013

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
J. Comput. Networks Commun., 2012

2011
Flooding attacks against network coding and countermeasures.
Proceedings of the 5th International Conference on Network and System Security, 2011

2009
Architecture Support for Memory Confidentiality and Integrity in Embedded Systems.
Int. J. Distributed Sens. Networks, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

2008
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...