Search Results - "Yang, Zhemin"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps by Zhang, Yuan, Yang, Min, Yang, Zhemin, Gu, Guofei, Ning, Peng, Zang, Binyu

    “…The android platform adopts permissions to protect sensitive resources from untrusted apps. However, after permissions are granted by users at install time,…”
    Get full text
    Journal Article
  2. 2

    Identifying User-Input Privacy in Mobile Applications at a Large Scale by Nan, Yuhong, Yang, Zhemin, Yang, Min, Zhou, Shunfan, Zhang, Yuan, Gu, Guofei, Wang, Xiaofeng, Sun, Limin

    “…Identifying sensitive user inputs is a prerequisite for privacy protection in mobile applications. When it comes to today's program analysis systems, however,…”
    Get full text
    Journal Article
  3. 3

    LeakMiner: Detect Information Leakage on Android with Static Taint Analysis by Zhemin Yang, Min Yang

    “…With the growing popularity of Android platform, Android application market becomes a major distribution center where Android users download apps. Unlike most…”
    Get full text
    Conference Proceeding
  4. 4

    Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale by Li, Shuai, Yang, Zhemin, Yang, Yunteng, Liu, Dingyi, Yang, Min

    “…With the characteristics of free installation and rich functionalities, mobile mini-apps have become more and more popular in people's daily life. A large…”
    Get full text
    Journal Article
  5. 5

    A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction by Huang, Mingfeng, Li, Zhetao, Liu, Anfeng, Zhang, Xinglin, Yang, Zhemin, Yang, Min

    “…As a collaborative and open network, billions of devices can be free to join the IoT-based data collection network for data perception and transmission. Along…”
    Get full text
    Journal Article
  6. 6

    Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps by Du, Xiaolin, Yang, Zhemin, Lin, Jiapeng, Cao, Yinzhi, Yang, Min

    “…Popular privacy regulations such as General Data Protection Regulation (GDPR) often allow consumers to withdraw from providing data, e.g., the famous right to…”
    Get full text
    Conference Proceeding
  7. 7

    How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale Study by Xia, Hao, Zhang, Yuan, Zhou, Yingtian, Chen, Xiaoting, Wang, Yang, Zhang, Xiangyu, Cui, Shuaishuai, Hong, Geng, Zhang, Xiaohan, Yang, Min, Yang, Zhemin

    “…As Android platform evolves in a fast pace, API-related compatibility issues become a significant challenge for developers. To handle an incompatible API…”
    Get full text
    Conference Proceeding
  8. 8

    Analyzing Ground-Truth Data of Mobile Gambling Scams by Hong, Geng, Yang, Zhemin, Yang, Sen, Liaoy, Xiaojing, Du, Xiaolin, Yang, Min, Duan, Haixin

    “…With the growth of mobile computing techniques, mobile gambling scams have seen a rampant increase in the recent past. In mobile gambling scams, miscreants…”
    Get full text
    Conference Proceeding
  9. 9

    TextExerciser: Feedback-driven Text Input Exercising for Android Applications by He, Yuyu, Zhang, Lei, Yang, Zhemin, Cao, Yinzhi, Lian, Keke, Li, Shuai, Yang, Wei, Zhang, Zhibo, Yang, Min, Zhang, Yuan, Duan, Haixin

    “…Dynamic analysis of Android apps is often used together with an exerciser to increase its code coverage. One big obstacle in designing such Android app…”
    Get full text
    Conference Proceeding
  10. 10

    A survey of privacy protection techniques for mobile devices by Zhang, Lei, Zhu, Donglai, Yang, Zhemin, Sun, Limin, Yang, Min

    “…Modern mobile devices provide a wide variety of services. Users are able to access these services for many sensitive tasks relating to their everyday lives…”
    Get full text
    Journal Article
  11. 11

    Detecting third-party libraries in Android applications with high precision and recall by Zhang, Yuan, Dai, Jiarun, Zhang, Xiaohan, Huang, Sirong, Yang, Zhemin, Yang, Min, Chen, Hao

    “…Third-party libraries are widely used in Android applications to ease development and enhance functionalities. However, the incorporated libraries also bring…”
    Get full text
    Conference Proceeding
  12. 12

    Security Matters: A Survey on Adversarial Machine Learning by Li, Guofu, Zhu, Pengjia, Li, Jin, Yang, Zhemin, Cao, Ning, Chen, Zhiyi

    Published 16-10-2018
    “…Adversarial machine learning is a fast growing research area, which considers the scenarios when machine learning systems may face potential adversarial…”
    Get full text
    Journal Article
  13. 13

    Indosinian Orogenesis in the Lhasa Terrane, Tibet: New Muscovite 40Ar-39Ar Geochronology and Evolutionary Process by Huaqi, LI, Zhiqin, XU, Jingsui, YANG, Zhemin, TANG

    Published in Acta geologica Sinica (Beijing) (01-10-2012)
    “…Muscovite 40 Ar-39 Ar dating of muscovite-quartz schist, eclogite and retrograde eclogite indicates an Indosinian orogenesis occurred at 220-240 Ma in the…”
    Get full text
    Journal Article