Yue Zhang

Orcid: 0000-0002-7786-0231

Affiliations:
  • Drexel University, Philadelphia, PA, USA
  • Ohio State University, Columbus OH, USA (former)
  • Jinan University, College of Information Science and Technology, Guangzhou, China (former)


According to our database1, Yue Zhang authored at least 38 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
One Size Does Not Fit All: Uncovering and Exploiting Cross Platform Discrepant APIs in WeChat.
Proceedings of the 32nd USENIX Security Symposium, 2023

Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Don't Leak Your Keys: Understanding, Measuring, and Exploiting the AppSecret Leaks in Mini-Programs.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Uncovering and Exploiting Hidden APIs in Mobile Super Apps.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Peripheral-Free Device Pairing by Randomly Switching Power.
IEEE Trans. Dependable Secur. Comput., 2022

DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022

FUME: Fuzzing Message Queuing Telemetry Transport Brokers.
Proceedings of the IEEE INFOCOM 2022, 2022

Implication of Animation on Android Security.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Cross Miniapp Request Forgery: Root Causes, Attacks, and Vulnerability Detection.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

When Good Becomes Evil: Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive.
IEEE Trans. Dependable Secur. Comput., 2021

Looking Back! Using Early Versions of Android Apps as Attack Vectors.
IEEE Trans. Dependable Secur. Comput., 2021

A Measurement Study of Wechat Mini-Apps.
Proc. ACM Meas. Anal. Comput. Syst., 2021

On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems.
IEEE Internet Things J., 2021

Prison Break of Android Reflection Restriction and Defense.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

On Private Data Collection of Hyperledger Fabric.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2020
An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks.
IEEE Trans. Veh. Technol., 2020

SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles.
CoRR, 2020

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

BLESS: A BLE Application Security Scanning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020

2019
BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET.
IEEE Trans. Veh. Technol., 2019

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distributed Syst., 2019

Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications.
CoRR, 2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019

Secure Software-Defined Networking Based on Blockchain.
CoRR, 2019

Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Microcontroller Based IoT System Firmware Security: Case Studies.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

On Misconception of Hardware and Cost in IoT Security and Privacy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018

DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive.
IACR Cryptol. ePrint Arch., 2018

2016
Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense.
Intell. Autom. Soft Comput., 2016


  Loading...