Zhemin Yang

Orcid: 0000-0002-1854-639X

According to our database1, Zhemin Yang authored at least 28 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2024

Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Proceedings of the 31st USENIX Security Symposium, 2022

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Proceedings of the 29th USENIX Security Symposium, 2020

BScout: Direct Whole Patch Presence Test for Java Executables.
Proceedings of the 29th USENIX Security Symposium, 2020

TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019

2018
Security Matters: A Survey on Adversarial Machine Learning.
CoRR, 2018

Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

2016
A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016

2015
UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Inf. Forensics Secur., 2014

2013
Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Swift: a register-based JIT compiler for embedded JVMs.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

2011
ORDER: Object centRic DEterministic Replay for Java.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011


  Loading...