A Measurement Study of P2P Live Video Streaming on WLANs

Qin Wang , Ke Lin , Kewen Lin , Dilin Mao
global communications conference 1 -5

2
2008
Efficient and Secure SMAP-Enabled Intra-process Memory Isolation

Z Wang , C Wu , M Xie , Y Zhang
41st IEEE Symposium on Security and Privacy (S&P 2020)

27
2020
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains

X Pan , M Zhang , Y Yan ,
Annual Computer Security Applications Conference (ACSAC)

12
2021
MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting

X Pan , M Zhang , YF Yan , M Yang
28th SIGKDD Conference On Knowledge Discovery and Data Mining(KDD 2022)

2022
Towards Backdoor Attack on Deep Learning based Time Series Classification

D Ding , M Zhang , Y Huang , X Pan
38th International Conference on Data Engineering(ICDE 2022)

2022
Analyzing Ground-Truth Data of Mobile Gambling Scam

G Hong , Z Yang , S Yang , X Liao
43rd IEEE Symposium on Security and Privacy(S&P 2022)

2022
Exploit The Last Straw that Breaks Android System

L Zhang , K Lian , H Xiao , Z Zhang
43rd IEEE Symposium on Security and Privacy(S&P 2022)

2022
UIPicker: user-input privacy identification in mobile applications

Guofei Gu , Zhemin Yang , Yuhong Nan , Shunfan Zhou
usenix security symposium 993 -1008

145
2015
Who Is Answering My Queries: Understanding and Characterizing Interception of the {DNS} Resolution Path

Haixin Duan , Zhou Li , Ying Liu , Shuang Hao
usenix security symposium 1113 -1128

52
2018
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of {CORS}

Vern Paxson , Haixin Duan , Shuo Chen , Tao Wan
usenix security symposium 1079 -1093

4
2018
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation

Jinfeng Li , Tianyu Du , Shouling Ji , Rong Zhang
usenix security symposium 1381 -1398

4
2020
BScout: Direct whole patch presence test for Java executables

Zhemin Yang , Xinyu Xing , Min Yang , Yuan Zhang
usenix security symposium 1147 -1164

2
2020
Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver.

Min Yang , Xudong Pan , Yifan Yan , Jiaming Zhu
arXiv: Cryptography and Security

15
2020
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels

Zhemin Yang , Xinyu Xing , Jun Xu , Min Yang
computer and communications security 1149 -1163

2020
Modeling Personalized Out-of-Town Distances in Location Recommendation

Xiangnan He , Mi Zhang , Min Yang , Daizong Ding
international conference on data mining 112 -121

2020
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR

Jinjin Liang , Haixin Duan , Zhou Li , Ying Liu
network and distributed system security symposium

2021
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking

Kangjie Lu , Min Yang , Yuan Zhang , Xin Tan
usenix security symposium

2021
Modeling Extreme Events in Time Series Prediction

Daizong Ding , Mi Zhang , Xudong Pan , Min Yang
knowledge discovery and data mining 1114 -1122

88
2019
LeakMiner: Detect Information Leakage on Android with Static Taint Analysis

Zhemin Yang , Min Yang
wri world congress on software engineering 101 -104

130
2012
Rethinking Permission Enforcement Mechanism on Mobile Systems

Yuan Zhang , Min Yang , Guofei Gu , Hao Chen
IEEE Transactions on Information Forensics and Security 11 ( 10) 2227 -2240

12
2016