default search action
Yuan Zhang 0009
Person information
- affiliation: Fudan University, China
Other persons with the same name
- Yuan Zhang (aka: Yu-an Zhang, Yuan-Zhang) — disambiguation page
- Yuan Zhang 0001 — Massachusetts Institute of Technology, Cambridge, MA, USA
- Yuan Zhang 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Yuan Zhang 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yuan Zhang 0004 — Nanjing University, State Key Laboratory for Novel Software Technology, China (and 1 more)
- Yuan Zhang 0005 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Yuan Zhang 0006 — University of Electronic Science and Technology of China, Center for Cyber Security, Chengdu, China
- Yuan Zhang 0007 — Southwest University, College of Electronic and Information Engineering, Chongqing, China (and 1 more)
- Yuan Zhang 0008 — Arizona State University, Tempe, AZ, USA
- Yuan Zhang 0010 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China (and 1 more)
- Yuan Zhang 0011 — University of New South Wales, School of Electrical Engineering and Telecommunications, Sydney, NSW, Australia
- Yuan Zhang 0012 — University of Texas at Dallas, Naveen Jindal School of Management, Richardson, TX, USA
- Yuan Zhang 0013 — Communication University of China, Beijing, China (and 1 more)
- Yuan Zhang 0014 — Chinese Academy and Sciences, Graduate School, China (and 1 more)
- Yuan Zhang 0015 — Westlake University, School of Engineering, Hangzhou, China (and 2 more)
- Yuan Zhang 0016 — Beijing Institute of Technology, School of Automation, China (and 1 more)
- Yuan Zhang 0017 — China University of Geosciences, Beijing, China
- Yuan Zhang 0018 — South China University of Technology, School of Mechanical and Automotive Engineering, Guangzhou, China
- Yuan Zhang 0019 — Southeast University, Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications, Nanjing, China
- Yuan Zhang 0020 — Peking University, Center on Frontiers of Computing Studies, Beijing, China
Other persons with a similar name
- Zhangyuan Chen (aka: Zhang-yuan Chen) — disambiguation page
- Yuanzhang Li (aka: YuanZhang Li, Yuan-zhang Li, Yuan-Zhang Li) — disambiguation page
- Chu Yuan Zhang
- Gaoyuan Zhang (aka: Gao Yuan Zhang)
- Yuan-Peng Zhang
- Yuan-Ting Zhang (aka: Yuanting Zhang) — City University of Hong Kong, Department of Biomedical Engineering, Hong Kong
- Yuan Lin Zhang
- Yuanyuan Zhang (aka: Yuan-Yuan Zhang) — disambiguation page
- Zhong-Yuan Zhang
- Yuanyuan Zhang 0008 (aka: Yuan-Yuan Zhang 0008) — Qingdao University of Technology, School of Information and Control Engineering, Shandong, China (and 1 more)
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Keke Lian, Lei Zhang, Guangliang Yang, Shuo Mao, Xinjie Wang, Yuan Zhang, Min Yang:
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications. Proc. ACM Softw. Eng. 1(FSE): 70-91 (2024) - [c36]Jiarun Dai, Bufan Gao, Mingyuan Luo, Zongan Huang, Zhongrui Li, Yuan Zhang, Min Yang:
SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems. ICSE 2024: 50:1-50:13 - [c35]Zhongrui Li, Jiarun Dai, Zongan Huang, Nianhao You, Yuan Zhang, Min Yang:
VioHawk: Detecting Traffic Violations of Autonomous Driving Systems through Criticality-Guided Simulation Testing. ISSTA 2024: 844-855 - [c34]Kangzheng Gu, Yuan Zhang, Jiajun Cao, Xin Tan, Min Yang:
How Well Industry-Level Cause Bisection Works in Real-World: A Study on Linux Kernel. SIGSOFT FSE Companion 2024: 62-73 - [c33]Bofei Chen, Lei Zhang, Xinyou Huang, Yinzhi Cao, Keke Lian, Yuan Zhang, Min Yang:
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction. SP 2024: 3961-3978 - [c32]Guoyi Ye, Geng Hong, Yuan Zhang, Min Yang:
Interface Illusions: Uncovering the Rise of Visual Scams in Cryptocurrency Wallets. WWW 2024: 1585-1595 - [c31]Youkun Shi, Yuan Zhang, Tianhao Bai, Lei Zhang, Xin Tan, Min Yang:
RecurScan: Detecting Recurring Vulnerabilities in PHP Web Applications. WWW 2024: 1746-1755 - 2023
- [j8]Xiaohan Zhang, Mi Zhang, Yuan Zhang, Ming Zhong, Xin Zhang, Yinzhi Cao, Min Yang:
Slowing Down the Aging of Learning-Based Malware Detectors With API Knowledge. IEEE Trans. Dependable Secur. Comput. 20(2): 902-916 (2023) - [c30]Peng Deng, Zhemin Yang, Lei Zhang, Guangliang Yang, Wenzheng Hong, Yuan Zhang, Min Yang:
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic. CCS 2023: 1272-1286 - [c29]Xin Tan, Yuan Zhang, Jiadong Lu, Xin Xiong, Zhuang Liu, Min Yang:
SyzDirect: Directed Greybox Fuzzing for Linux Kernel. CCS 2023: 1630-1644 - [c28]Zhibo Zhang, Zhangyue Zhang, Keke Lian, Guangliang Yang, Lei Zhang, Yuan Zhang, Min Yang:
TrustedDomain Compromise Attack in App-in-app Ecosystems. SaTS@CCS 2023: 51-57 - [c27]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [c26]Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang:
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. SP 2023: 2122-2137 - [c25]Yudi Zhao, Yuan Zhang, Min Yang:
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs. USENIX Security Symposium 2023: 3691-3708 - 2022
- [j7]Min Yang, Chao Zhang, Fu Song, Yuan Zhang:
Preface to Special Issue on System Software Security. Int. J. Softw. Informatics 12(3): 259-261 (2022) - [j6]Xin Tan, Xiyu Yang, Jiajun Cao, Yuan Zhang:
Refcount Field Identification for Linux Kernel Based on Deep Learning. Int. J. Softw. Informatics 12(3): 309-329 (2022) - [c24]Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. ASE 2022: 76:1-76:13 - [c23]Lei Zhang, Keke Lian, Haoyu Xiao, Zhibo Zhang, Peng Liu, Yuan Zhang, Min Yang, Haixin Duan:
Exploit the Last Straw That Breaks Android Systems. SP 2022: 2230-2247 - [c22]Lei Zhang, Zhibo Zhang, Ancong Liu, Yinzhi Cao, Xiaohan Zhang, Yanjun Chen, Yuan Zhang, Guangliang Yang, Min Yang:
Identity Confusion in WebView-based Mobile App-in-app Ecosystems. USENIX Security Symposium 2022: 1597-1613 - [c21]Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Yinzhi Cao, Ziwen Wang, Yudi Zhao, Zongan Huang, Min Yang:
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches. USENIX Security Symposium 2022: 1993-2010 - [c20]Xin Tan, Yuan Zhang, Jiajun Cao, Kun Sun, Mi Zhang, Min Yang:
Understanding the Practice of Security Patch Management across Multiple Branches in OSS Projects. WWW 2022: 767-777 - 2021
- [c19]Xin Tan, Yuan Zhang, Chenyuan Mi, Jiajun Cao, Kun Sun, Yifan Lin, Min Yang:
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking. CCS 2021: 3282-3299 - [c18]Jiarun Dai, Yuan Zhang, Hailong Xu, Haiming Lyu, Zicheng Wu, Xinyu Xing, Min Yang:
Facilitating Vulnerability Assessment through PoC Migration. CCS 2021: 3300-3317 - [c17]Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, Min Yang:
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. USENIX Security Symposium 2021: 2471-2488 - 2020
- [j5]Zhetao Li, Wenlin Li, Fuyuan Lin, Yi Sun, Min Yang, Yuan Zhang, Zhibo Wang:
Hybrid malware detection approach with feedback-directed machine learning. Sci. China Inf. Sci. 63(3) (2020) - [c16]Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang:
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware. CCS 2020: 757-770 - [c15]Zheyue Jiang, Yuan Zhang, Jun Xu, Qi Wen, Zhenghe Wang, Xiaohan Zhang, Xinyu Xing, Min Yang, Zhemin Yang:
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels. CCS 2020: 1149-1163 - [c14]Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. ICSE 2020: 886-898 - [c13]Yuyu He, Lei Zhang, Zhemin Yang, Yinzhi Cao, Keke Lian, Shuai Li, Wei Yang, Zhibo Zhang, Min Yang, Yuan Zhang, Haixin Duan:
TextExerciser: Feedback-driven Text Input Exercising for Android Applications. SP 2020: 1071-1087 - [c12]Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang:
BScout: Direct Whole Patch Presence Test for Java Executables. USENIX Security Symposium 2020: 1147-1164 - [c11]Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang:
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. USENIX Security Symposium 2020: 2793-2810
2010 – 2019
- 2019
- [j4]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. Proc. ACM Meas. Anal. Comput. Syst. 3(1): 17:1-17:24 (2019) - [c10]Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian:
App in the Middle: Demystify Application Virtualization in Android and its Security Threats. SIGMETRICS (Abstracts) 2019: 75-76 - 2018
- [c9]Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang:
Invetter: Locating Insecure Input Validations in Android Services. CCS 2018: 1165-1178 - [c8]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c7]Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS 2018 - [c6]Xiaohan Zhang, Yuan Zhang, Qianqian Mo, Hao Xia, Zhemin Yang, Min Yang, Xiaofeng Wang, Long Lu, Hai-Xin Duan:
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. USENIX Security Symposium 2018: 1183-1198 - [c5]Yuan Zhang, Jiarun Dai, Xiaohan Zhang, Sirong Huang, Zhemin Yang, Min Yang, Hao Chen:
Detecting third-party libraries in Android applications with high precision and recall. SANER 2018: 141-152 - 2017
- [j3]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - 2016
- [j2]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
Rethinking Permission Enforcement Mechanism on Mobile Systems. IEEE Trans. Inf. Forensics Secur. 11(10): 2227-2240 (2016) - 2015
- [c4]Yuan Zhang, Min Yang, Guofei Gu, Hao Chen:
FineDroid: Enforcing Permissions with System-Wide Application Execution Context. SecureComm 2015: 3-22 - 2014
- [j1]Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, Binyu Zang:
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE Trans. Inf. Forensics Secur. 9(11): 1828-1842 (2014) - 2013
- [c3]Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang, Binyu Zang:
Vetting undesirable behaviors in android apps with permission use analysis. CCS 2013: 611-622 - [c2]Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, Xiaoyang Sean Wang:
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection. CCS 2013: 1043-1054 - 2012
- [c1]Yuan Zhang, Min Yang, Bo Zhou, Zhemin Yang, Weihua Zhang, Binyu Zang:
Swift: a register-based JIT compiler for embedded JVMs. VEE 2012: 63-74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint