Min Yang
Min Yang
Professor, School of Computer Science and Technology, Fudan University
Email verificata su fudan.edu.cn
TitoloCitata daAnno
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Leakminer: Detect information leakage on android with static taint analysis
Z Yang, M Yang
2012 Third World Congress on Software Engineering, 101-104, 2012
Uipicker: User-input privacy identification in mobile applications
Y Nan, M Yang, Z Yang, S Zhou, G Gu, XF Wang
24th {USENIX} Security Symposium ({USENIX} Security 15), 993-1008, 2015
ORDER: Object centRic DEterministic Replay for Java.
Z Yang, M Yang, L Xu, H Chen, B Zang
USENIX Annual Technical Conference, 30-30, 2011
How you get shot in the back: A systematical study about cryptojacking in the real world
G Hong, Z Yang, S Yang, L Zhang, Y Nan, Z Zhang, M Yang, Y Zhang, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
Permission use analysis for vetting undesirable behaviors in android apps
Y Zhang, M Yang, Z Yang, G Gu, P Ning, B Zang
IEEE transactions on information forensics and security 9 (11), 1828-1842, 2014
俞波, 杨珉, 王治, 高传善
计算机学报 29 (9), 1542-1552, 2006
国内 Android 应用商城中程序隐私泄露分析
杨珉, 王晓阳, 张涛, 张建军
清华大学学报: 自然科学版 52 (10), 1420-1426, 2012
Detecting third-party libraries in Android applications with high precision and recall
Y Zhang, J Dai, X Zhang, S Huang, Z Yang, M Yang, H Chen
2018 IEEE 25th International Conference on Software Analysis, Evolution andá…, 2018
Rethinking permission enforcement mechanism on mobile systems
Y Zhang, M Yang, G Gu, H Chen
IEEE Transactions on Information Forensics and Security 11 (10), 2227-2240, 2016
Finedroid: Enforcing permissions with system-wide application execution context
Y Zhang, M Yang, G Gu, H Chen
International Conference on Security and Privacy in Communication Systems, 3-22, 2015
Constructing and counting Boolean functions on even variables with maximum algebraic immunity
Y Li, M Yang, H Kan
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications andá…, 2010
A light-weight multicast schema for wireless sensor network with multi-sinks
Y Min, H Peng, Y Bo, M Xiaofeng, M Dilin, G Chuanshan
2006 International Conference on Wireless Communications, Networking andá…, 2006
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps
Y Nan, Z Yang, X Wang, Y Zhang, D Zhu, M Yang
Network and Distributed System Security Symposium (NDSS 2018), 2018
System service call-oriented symbolic execution of android framework with applications to vulnerability discovery and exploit generation
L Luo, Q Zeng, C Cao, K Chen, J Liu, L Liu, N Gao, M Yang, X Xing, P Liu
Proceedings of the 15th Annual International Conference on Mobile Systemsá…, 2017
Swift: a register-based JIT compiler for embedded JVMs
Y Zhang, M Yang, B Zhou, Z Yang, W Zhang, B Zang
ACM SIGPLAN Notices 47 (7), 63-74, 2012
林科文, 杨珉, 毛迪林
小型微型计算机系统 32 (5), 924-930, 2011
利用硬件加速层优化 Android 显示系统
董剑, 张源, 杨珉
小型微型计算机系统, 1546-1550, 2012
Optimizing software cache performance of packet processing applications
Q Wang, J Chen, W Zhang, M Yang, B Zang
ACM SIGPLAN Notices 42 (7), 227-236, 2007
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20