Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 1043 …, 2013 | 577 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 611-622, 2013 | 461 | 2013 |
Leakminer: Detect information leakage on android with static taint analysis Z Yang, M Yang 2012 Third World Congress on Software Engineering, 101-104, 2012 | 282 | 2012 |
Privacy Risks of General-Purpose Language Models X Pan, M Zhang, S Ji, M Yang 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020 | 268 | 2020 |
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang 27th ACM Conference on Computer and Communications Security (CCS 2020), 2020 | 190* | 2020 |
Uipicker: User-input privacy identification in mobile applications Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang 24th USENIX Security Symposium (USENIX Security 2015), 993-1008, 2015 | 184 | 2015 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018 | 164 | 2018 |
Modeling extreme events in time series prediction D Ding, M Zhang, X Pan, M Yang, X He 25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2019 …, 2019 | 157 | 2019 |
Detecting third-party libraries in Android applications with high precision and recall Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen 25th International Conference on Software Analysis, Evolution and …, 2018 | 104 | 2018 |
Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation X Pan, M Zhang, B Sheng, J Zhu, M Yang 31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022 | 90 | 2022 |
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang Network and Distributed System Security Symposium (NDSS 2018), 2018 | 81 | 2018 |
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang 27th USENIX Security Symposium (USENIX Security 2018), 1113-1128, 2018 | 80 | 2018 |
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ... 29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020 | 75 | 2020 |
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels Z Jiang,Y Zhang,J Xu,Q Wen,Z Wang,X Zhang,X Xing,M Yang, Z Yang 27th ACM Conference on Computer and Communications Security (CCS 2020), 2020 | 57* | 2020 |
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang 29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020 | 53 | 2020 |
Identity confusion in {WebView-based} mobile app-in-app ecosystems L Zhang, Z Zhang, A Liu, Y Cao, X Zhang, Y Chen, Y Zhang, G Yang, ... 31st USENIX Security Symposium (USENIX Security 22), 1597-1613, 2022 | 46 | 2022 |
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks K Shen, C Wang, M Guo, X Zheng, C Lu, B Liu, Y Zhao, S Hao, H Duan, ... 30th USENIX Security Symposium ( Security 21), 2021 | 46 | 2021 |
Permission use analysis for vetting undesirable behaviors in android apps Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014 | 46 | 2014 |
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR B. Liu, C. Lu, Y. Zhang, Z. Li, F. Zhang, H. Duan, Y. Liu, J. Chen, J. Liang ... Network and Distributed System Security Symposium (NDSS 2021), 2021 | 45* | 2021 |
ORDER: Object centRic DEterministic Replay for Java. Z Yang, M Yang, L Xu, H Chen, B Zang USENIX Annual Technical Conference (ATC 2011), 30-30, 2011 | 45 | 2011 |