Min Yang

Affiliations:
  • Fudan University, School of Computer Science, Shanghai Key Laboratory of Data Science, China


According to our database1, Min Yang authored at least 50 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.
Proceedings of the 30th USENIX Security Symposium, 2021

Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Facilitating Vulnerability Assessment through PoC Migration.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Proceedings of the 29th USENIX Security Symposium, 2020

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Proceedings of the 29th USENIX Security Symposium, 2020

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

BScout: Direct Whole Patch Presence Test for Java Executables.
Proceedings of the 29th USENIX Security Symposium, 2020

SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Privacy Risks of General-Purpose Language Models.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

How Android developers handle evolution-induced API compatibility issues: a large-scale study.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
App in the Middle: Demystify Application Virtualization in Android and its Security Threats.
Proc. ACM Meas. Anal. Comput. Syst., 2019

Modeling Extreme Events in Time Series Prediction.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
Detecting third-party libraries in Android applications with high precision and recall.
Proceedings of the 25th International Conference on Software Analysis, 2018

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Proceedings of the 27th USENIX Security Symposium, 2018

Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Proceedings of the 27th USENIX Security Symposium, 2018

We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of the 27th USENIX Security Symposium, 2018

Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Invetter: Locating Insecure Input Validations in Android Services.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
IEEE Trans. Inf. Forensics Secur., 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
Rethinking Permission Enforcement Mechanism on Mobile Systems.
IEEE Trans. Inf. Forensics Secur., 2016

A survey of privacy protection techniques for mobile devices.
J. Commun. Inf. Networks, 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

2015
UIPicker: User-Input Privacy Identification in Mobile Applications.
Proceedings of the 24th USENIX Security Symposium, 2015

FineDroid: Enforcing Permissions with System-Wide Application Execution Context.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
IEEE Trans. Inf. Forensics Secur., 2014

Cost-Based Join Algorithm Selection in Hadoop.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2013
Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Swift: a register-based JIT compiler for embedded JVMs.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

2011
ORDER: Object centRic DEterministic Replay for Java.
Proceedings of the 2011 USENIX Annual Technical Conference, 2011

2010
Constructing and Counting Boolean Functions on Even Variables with Maximum Algebraic Immunity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2008
A Measurement Study of P2P Live Video Streaming on WLANs.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
P2P Multimedia Sharing over MANET.
Proceedings of the Advances in Multimedia Modeling, 2007

Optimizing software cache performance of packet processing applications.
Proceedings of the 2007 ACM SIGPLAN/SIGBED Conference on Languages, 2007

2006
Using a Depth Tree Framework to Evaluate Change Impacts of Modifications to IT Infrastructure.
Proceedings of the ICE-B 2006, 2006

2005
A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

PICC: A Secure Mobile Agent Framework Based on Garbled Circuit.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

ECLS: An Efficient Cooperative Localization Scheme For Wireless Sensor and Actor Networks.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
iOmS: An Agent-Based P2P Framework for Ubiquitous Workflow.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...