Yuanyuan Zhang
Orcid: 0000-0002-6682-2264Affiliations:
- Shanghai Jiao Tong University, Shanghai, China
- INRIA, INSA-Lyon, CITI laboratory, France (former)
According to our database1,
Yuanyuan Zhang
authored at least 66 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
3
1
1
2
2
3
1
1
1
2
2
1
1
1
3
1
2
1
3
6
8
6
4
5
1
1
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Supercomput., September, 2024
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements.
Pervasive Mob. Comput., 2024
Enhancing Effective Bidirectional Isolation for Function Fusion in Serverless Architectures.
Proceedings of the 25th International Middleware Conference, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024
2023
Improved differential evolution for RSSD-based localization in Gaussian mixture noise.
Comput. Commun., 2023
SEnFuzzer: Detecting SGX Memory Corruption via Information Feedback and Tailored Interface Analysis.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
2022
IEEE Signal Process. Lett., 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
2021
IEEE Trans. Software Eng., 2021
Two-Phase Robust Target Localization in Ocean Sensor Networks Using Received Signal Strength Measurements.
Sensors, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
2020
NMTLAT: A New robust mobile Multi-Target Localization and Tracking Scheme in marine search and rescue wireless sensor networks under Byzantine attack.
Comput. Commun., 2020
iOceanSee: A Novel Scheme for Ocean State Estimation Using 3D Mobile Convolutional Neural Network.
IEEE Access, 2020
2019
J. Inf. Secur. Appl., 2019
Efficient target detection in maritime search and rescue wireless sensor network using data fusion.
Comput. Commun., 2019
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018
2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 25th International Conference on Program Comprehension, 2017
Proceedings of the Information Security - 20th International Conference, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
J. Netw. Comput. Appl., 2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
How network coding system constrains packet pollution attacks in wireless sensor networks.
Int. J. Grid Util. Comput., 2013
Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
J. Comput. Networks Commun., 2012
2011
Proceedings of the 5th International Conference on Network and System Security, 2011
2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
2008
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008