Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 1043 …, 2013 | 547 | 2013 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang ACM SIGSAC conference on Computer & Communications Security (CCS 2013), 611-622, 2013 | 444 | 2013 |
Leakminer: Detect information leakage on android with static taint analysis Z Yang, M Yang 2012 Third World Congress on Software Engineering, 101-104, 2012 | 265 | 2012 |
Uipicker: User-input privacy identification in mobile applications Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang 24th USENIX Security Symposium (USENIX Security 2015), 993-1008, 2015 | 161 | 2015 |
How you get shot in the back: A systematical study about cryptojacking in the real world G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ... ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018 | 137 | 2018 |
Privacy Risks of General-Purpose Language Models X Pan, M Zhang, S Ji, M Yang 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020 | 126 | 2020 |
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware X Zhang, Y Zhang, M Zhong, D Ding, Y Cao, Y Zhang, M Zhang, M Yang 27th ACM Conference on Computer and Communications Security (CCS 2020), 2020 | 125* | 2020 |
Modeling extreme events in time series prediction D Ding, M Zhang, X Pan, M Yang, X He 25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining (KDD 2019 …, 2019 | 114 | 2019 |
Detecting third-party libraries in Android applications with high precision and recall Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen 25th International Conference on Software Analysis, Evolution and …, 2018 | 74 | 2018 |
Who is answering my queries: Understanding and characterizing interception of the DNS resolution path B Liu, C Lu, H Duan, Y Liu, Z Li, S Hao, M Yang 27th USENIX Security Symposium (USENIX Security 2018), 1113-1128, 2018 | 69 | 2018 |
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang Network and Distributed System Security Symposium (NDSS 2018), 2018 | 62 | 2018 |
ORDER: Object centRic DEterministic Replay for Java. Z Yang, M Yang, L Xu, H Chen, B Zang USENIX Annual Technical Conference (ATC 2011), 30-30, 2011 | 46 | 2011 |
An ever-evolving game: Evaluation of real-world attacks and defenses in ethereum ecosystem S Zhou, M Möser, Z Yang, B Adida, T Holz, J Xiang, S Goldfeder, Y Cao, ... 29th USENIX Security Symposium (USENIX Security 20), 2793-2810, 2020 | 45 | 2020 |
Permission use analysis for vetting undesirable behaviors in android apps Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014 | 45 | 2014 |
Justinian's {GAAvernor}: Robust Distributed Learning with Gradient Aggregation Agent X Pan, M Zhang, D Wu, Q Xiao, S Ji, Z Yang 29th USENIX Security Symposium (USENIX Security 20), 1641-1658, 2020 | 39 | 2020 |
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu 15th Annual Conference on Mobile Systems, Applications, and Services …, 2017 | 36 | 2017 |
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels Z Jiang,Y Zhang,J Xu,Q Wen,Z Wang,X Zhang,X Xing,M Yang, Z Yang 27th ACM Conference on Computer and Communications Security (CCS 2020), 2020 | 34* | 2020 |
Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation X Pan, M Zhang, B Sheng, J Zhu, M Yang 31st USENIX Security Symposium (USENIX Security 22), 3611-3628, 2022 | 33 | 2022 |
TEXTSHIELD: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang 29th USENIX Security Symposium (Security 2020), 2020 | 28 | 2020 |
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS J Chen, J Jiang, H Duan, T Wan, S Chen, V Paxson, M Yang 27th USENIX Security Symposium (USENIX Security 2018), 1079-1093, 2018 | 28 | 2018 |