Yutian Yang

Orcid: 0000-0003-2899-0117

According to our database1, Yutian Yang authored at least 18 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels.
IEEE Trans. Dependable Secur. Comput., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

Enhancing Medical Imaging with GANs Synthesizing Realistic Images from Limited Data.
CoRR, 2024

Application of Multimodal Fusion Deep Learning Model in Disease Recognition.
CoRR, 2024

Research on Feature Extraction Data Processing System For MRI of Brain Diseases Based on Computer Deep Learning.
CoRR, 2024

Application of Computer Deep Learning Model in Diagnosis of Pulmonary Nodules.
CoRR, 2024

Adapting LLMs for Efficient Context Processing through Soft Prompt Compression.
CoRR, 2024

2023
Efficient charge transfer in WS2/WxMo1-xS2 heterostructure empowered by energy level hybridization.
Sci. China Inf. Sci., February, 2023

Demystifying Pointer Authentication on Apple M1.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation.
ACM Comput. Surv., 2021

Securing middlebox policy enforcement in SDN.
Comput. Networks, 2021

Security Challenges in the Container Cloud.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019

2018
What's (Not) Validating Network Paths: A Survey.
CoRR, 2018

Fastlane-ing more flows with less bandwidth for software-Defined networking.
Comput. Networks, 2018

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018


  Loading...