Search Results - "Yang, Zhemin"
-
1
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps
Published in IEEE transactions on information forensics and security (01-11-2014)“…The android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time,…”
Get full text
Journal Article -
2
Identifying User-Input Privacy in Mobile Applications at a Large Scale
Published in IEEE transactions on information forensics and security (01-03-2017)“…Identifying sensitive user inputs is a prerequisite for privacy protection in mobile applications. When it comes to today's program analysis systems, however,…”
Get full text
Journal Article -
3
LeakMiner: Detect Information Leakage on Android with Static Taint Analysis
Published in 2012 Third World Congress on Software Engineering (01-11-2012)“…With the growing popularity of Android platform, Android application market becomes a major distribution center where Android users download apps. Unlike most…”
Get full text
Conference Proceeding -
4
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale
Published in IEEE transactions on information forensics and security (2024)“…With the characteristics of free installation and rich functionalities, mobile mini-apps have become more and more popular in people's daily life. A large…”
Get full text
Journal Article -
5
A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction
Published in IEEE transactions on dependable and secure computing (06-07-2024)“…As a collaborative and open network, billions of devices can be free to join the IoT-based data collection network for data perception and transmission. Along…”
Get full text
Journal Article -
6
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19-05-2024)“…Popular privacy regulations such as General Data Protection Regulation (GDPR) often allow consumers to withdraw from providing data, e.g., the famous right to…”
Get full text
Conference Proceeding -
7
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study
Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01-10-2020)“…As Android platform evolves in a fast pace, API-related compatibility issues become a significant challenge for developers. To handle an incompatible API…”
Get full text
Conference Proceeding -
8
Analyzing Ground-Truth Data of Mobile Gambling Scams
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01-05-2022)“…With the growth of mobile computing techniques, mobile gambling scams have seen a rampant increase in the recent past. In mobile gambling scams, miscreants…”
Get full text
Conference Proceeding -
9
TextExerciser: Feedback-driven Text Input Exercising for Android Applications
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01-05-2020)“…Dynamic analysis of Android apps is often used together with an exerciser to increase its code coverage. One big obstacle in designing such Android app…”
Get full text
Conference Proceeding -
10
A survey of privacy protection techniques for mobile devices
Published in Journal of communications and information networks (01-12-2016)“…Modern mobile devices provide a wide variety of services. Users are able to access these services for many sensitive tasks relating to their everyday lives…”
Get full text
Journal Article -
11
Detecting third-party libraries in Android applications with high precision and recall
Published in 2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER) (01-03-2018)“…Third-party libraries are widely used in Android applications to ease development and enhance functionalities. However, the incorporated libraries also bring…”
Get full text
Conference Proceeding -
12
Security Matters: A Survey on Adversarial Machine Learning
Published 16-10-2018“…Adversarial machine learning is a fast growing research area, which considers the scenarios when machine learning systems may face potential adversarial…”
Get full text
Journal Article -
13
Indosinian Orogenesis in the Lhasa Terrane, Tibet: New Muscovite 40Ar-39Ar Geochronology and Evolutionary Process
Published in Acta geologica Sinica (Beijing) (01-10-2012)“…Muscovite 40 Ar-39 Ar dating of muscovite-quartz schist, eclogite and retrograde eclogite indicates an Indosinian orogenesis occurred at 220-240 Ma in the…”
Get full text
Journal Article