Obserwuj
Yi Chen
Tytuł
Cytowane przez
Cytowane przez
Rok
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1112016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
382019
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
252017
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
212019
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
152019
Bookworm game: Automatic discovery of LTE vulnerabilities through documentation analysis
Y Chen, Y Yao, XF Wang, D Xu, C Yue, X Liu, K Chen, H Tang, B Liu
2021 IEEE Symposium on Security and Privacy (SP), 1197-1214, 2021
92021
Practical and Efficient in-Enclave Verification of Privacy Compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
22021
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
12020
Seeing the Forest for the Trees: Understanding Security Hazards in the {3GPP} Ecosystem through Intelligent Analysis on Change Requests
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao
31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022
2022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–9