Yang Zhang

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, Beijing, China


According to our database1, Yang Zhang authored at least 20 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Tea: Program Repair Using Neural Network Based on Program Information Attention Matrix.
CoRR, 2021

Understanding and Mitigating Security Risks of Network on Medical Cyber Physical System.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Improving the Effectiveness of Grey-box Fuzzing By Extracting Program Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Mitigating network-layer security attacks on authentication-enhanced openICE.
SIGBED Rev., 2019

Optimizing seed inputs in fuzzing with machine learning.
CoRR, 2019

Tracking Sensitive Information and Operations in Integrated Clinical Environment.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Optimizing seed inputs in fuzzing with machine learning.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2017
Protecting interoperable clinical environment with authentication.
SIGBED Rev., 2017

An Algorithm Based Wavelet Entropy for Shadowing Effect of Human Detection Using Ultra-Wideband Bio-Radar.
Sensors, 2017

2015
Improving Accuracy of Static Integer Overflow Detection in Binary.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Operating System Security Policy Hardening via Capability Dependency Graphs.
Proceedings of the Information Security Practice and Experience, 2015

2014
Evaluating and comparing the quality of access control in different operating systems.
Comput. Secur., 2014

Systematic Analysis and Detection of Misconfiguration Vulnerabilities in Android Smartphones.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Quantitatively Measure Access Control Mechanisms across Different Operating Systems.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Measuring and Comparing the Protection Quality in Different Operating Systems.
Proceedings of the Network and System Security - 7th International Conference, 2013

Static Integer Overflow Vulnerability Detection in Windows Binary.
Proceedings of the Advances in Information and Computer Security, 2013

Heuristic Path Pruning Algorithm Based on Error Handling Pattern Recognition in Detecting Vulnerability.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Refining the Pointer Analysis by Exploiting Constraints on the CFL-Paths.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2011
Model checking security policy model using both UML static and dynamic diagrams.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis.
Proceedings of IEEE International Conference on Communications, 2011


  Loading...