Social network based reputation computation and document classification

Joo Young Lee , Yue Duan , Jae C Oh , Wenliang Du
Journal of Universal Computer Science 18 ( 4) 532 -553

8
2012
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

Mu Zhang , Yue Duan , Heng Yin , Zhiruo Zhao
computer and communications security 1105 -1116

554
2014
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.

Xiaorui Pan , Xueqiang Wang , Yue Duan , XiaoFeng Wang
network and distributed system security symposium

71
2017
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.

Yue Duan , Mu Zhang , Abhishek Vasisht Bhaskar , Heng Yin
network and distributed system security symposium

36
2018
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing

Lei Zhao , Yue Duan , Heng Yin , Jifeng Xuan
Proceedings 2019 Network and Distributed System Security Symposium

106
2019
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing

Yue Duan , Xuezixiang Li , Jinghan Wang , Heng Yin
Proceedings 2020 Network and Distributed System Security Symposium

97
2020
Towards Automatic Generation of Security-Centric Descriptions for Android Apps

Mu Zhang , Yue Duan , Qian Feng , Heng Yin
computer and communications security 518 -529

51
2015
Automatic Reputation Computation through Document Analysis: A Social Network Approach

JooYoung Lee , Yue Duan , Jae C Oh , Wenliang Du
advances in social networks analysis and mining 559 -560

8
2011
Towards automated safety vetting of smart contracts in decentralized applications

Yue Duan , Xin Zhao , Yu Pan , Shucheng Li
Smpte Journal 921 -935

2022
{Privacy-Preserving} Offloading of Mobile App to the Public Cloud

Yue Duan , Mu Zhang , Heng Yin , Yuzhe Tang
7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15)

14
2015
Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud

Yue Duan , Mu Zhang , Heng Yin , Yuzhe Tang
Syracuse University

1
2015
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing

Jinghan Wang , Yue Duan , Wei Song , Heng Yin
22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019)

89
2019
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications

Yue Duan , Lian Gao , Jie Hu , Heng Yin
22nd International Symposium on Research in Attacks, Intrusions and Defenses ({RAID} 2019)

6
2019
Marco: A Stochastic Asynchronous Concolic Explorer

Jie Hu , Yue Duan , Heng Yin
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE) 693 -704

2024
SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing

Lian Gao , Yu Qu , Sheng Yu , Yue Duan
Network and Distributed System Security Symposium

2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection

Shenao Yan , Shen Wang , Yue Duan , Hanbin Hong
Proceedings of the 33rd USENIX Security Symposium (USENIX Security)

2024
Jsforce: A forced execution engine for malicious javascript detection

Xunchao Hu , Yao Cheng , Yue Duan , Andrew Henderson
Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings 13 704 -720

25
2018
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains

William E Bodell III , Sajad Meisami , Yue Duan
32nd USENIX Security Symposium (USENIX Security 23)

12
2023
Probabilistic Path Prioritization for Hybrid Fuzzing

Lei Zhao , Pengcheng Cao , Yue Duan , Heng Yin
IEEE Transactions on Dependable and Secure Computing (TDSC)

5
2022