What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhemin Yang
Google Scholar
ORCID:
0000-0002-1854-639X
25
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps.
Yizhe Shi
Zhemin Yang
Kangwei Zhong
Guangliang Yang
Yifan Yang
Xiaohan Zhang
Min Yang
2025
conf/ndss
An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps.
Xin Zhang
Xiaohan Zhang
Zhichen Liu
Bo Zhao
Zhemin Yang
Min Yang
2025
conf/uss
ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains.
Peng Deng
Lei Zhang
Yuchuan Meng
Zhemin Yang
Yuan Zhang
Zhemin Yang
2024
journals/tifs
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale.
Shuai Li
Zhemin Yang
Yunteng Yang
Dingyi Liu
Min Yang
2024
conf/ccs
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Shuai Li
Zhemin Yang
Yuhong Nan
Shutian Yu
Qirui Zhu
Min Yang
2024
conf/sp
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Xiaolin Du
Zhemin Yang
Jiapeng Lin
Yinzhi Cao
Min Yang
2023
conf/ccs
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Peng Deng
Zhemin Yang
Lei Zhang
Guangliang Yang
Wenzheng Hong
Yuan Zhang
Min Yang
2023
conf/uss
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
Shuai Li
Zhemin Yang
Guangliang Yang
Hange Zhang
Nan Hua
Yurui Huang
Min Yang
2022
conf/ccs
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Shuai Li
Zhemin Yang
Nan Hua
Peng Liu
Xiaohan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis.
Xudong Pan
Mi Zhang
Yifan Yan
Jiaming Zhu
Zhemin Yang
2022
conf/uss
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Shunfan Zhou
Zhemin Yang
Dan Qiao
Peng Liu
Min Yang
Zhe Wang
Chenggang Wu
2022
conf/sp
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Geng Hong
Zhemin Yang
Sen Yang
Xiaojing Liao
Xiaolin Du
Min Yang
Haixin Duan
2020
conf/ccs
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang
Yuan Zhang
Jun Xu
Qi Wen
Zhenghe Wang
Xiaohan Zhang
Xinyu Xing
Min Yang
Zhemin Yang
2020
conf/uss
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Shunfan Zhou
Zhemin Yang
Jie Xiang
Yinzhi Cao
Min Yang
Yuan Zhang
2020
conf/uss
BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai
Yuan Zhang
Zheyue Jiang
Yingtian Zhou
Junyan Chen
Xinyu Xing
Xiaohan Zhang
Xin Tan
Min Yang
Zhemin Yang
2020
conf/sp
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Yuyu He
Lei Zhang
Zhemin Yang
Yinzhi Cao
Keke Lian
Shuai Li
Wei Yang
Zhibo Zhang
Min Yang
Yuan Zhang
Haixin Duan
2018
conf/ccs
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong
Zhemin Yang
Sen Yang
Lei Zhang
Yuhong Nan
Zhibo Zhang
Min Yang
Yuan Zhang
Zhiyun Qian
Hai-Xin Duan
2018
conf/ccs
Invetter: Locating Insecure Input Validations in Android Services.
Lei Zhang
Zhemin Yang
Yuyu He
Zhenyu Zhang
Zhiyun Qian
Geng Hong
Yuan Zhang
Min Yang
2018
conf/uss
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Xiaohan Zhang
Yuan Zhang
Qianqian Mo
Hao Xia
Zhemin Yang
Min Yang
Xiaofeng Wang
Long Lu
Hai-Xin Duan
2018
conf/ndss
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Yuhong Nan
Zhemin Yang
Xiaofeng Wang
Yuan Zhang
Donglai Zhu
Min Yang
2017
journals/tifs
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
Yuhong Nan
Zhemin Yang
Min Yang
Shunfan Zhou
Yuan Zhang
Guofei Gu
Xiaofeng Wang
Limin Sun
2015
conf/uss
UIPicker: User-Input Privacy Identification in Mobile Applications.
Yuhong Nan
Min Yang
Zhemin Yang
Shunfan Zhou
Guofei Gu
Xiaofeng Wang
2014
journals/tifs
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
Yuan Zhang
Min Yang
Zhemin Yang
Guofei Gu
Peng Ning
Binyu Zang
2013
conf/ccs
Vetting undesirable behaviors in android apps with permission use analysis.
Yuan Zhang
Min Yang
Bingquan Xu
Zhemin Yang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Binyu Zang
2013
conf/ccs
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Zhemin Yang
Min Yang
Yuan Zhang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Coauthors
Bingquan Xu
(1)
Binyu Zang
(2)
Bo Zhao
(1)
Chenggang Wu
(1)
Dan Qiao
(1)
Dingyi Liu
(1)
Donglai Zhu
(1)
Geng Hong
(3)
Guangliang Yang
(4)
Guofei Gu
(5)
Hai-Xin Duan
(2)
Haixin Duan
(2)
Hange Zhang
(1)
Hao Xia
(1)
Jiaming Zhu
(1)
Jiapeng Lin
(1)
Jiarun Dai
(1)
Jie Xiang
(1)
Jun Xu
(1)
Junyan Chen
(1)
Kangwei Zhong
(1)
Keke Lian
(1)
Lei Zhang
(5)
Limin Sun
(1)
Long Lu
(1)
Mi Zhang
(1)
Min Yang
(23)
Nan Hua
(2)
Peng Deng
(2)
Peng Liu
(2)
Peng Ning
(3)
Qi Wen
(1)
Qianqian Mo
(1)
Qirui Zhu
(1)
Sen Yang
(2)
Shuai Li
(5)
Shunfan Zhou
(4)
Shutian Yu
(1)
Wei Yang
(1)
Wenzheng Hong
(1)
Xiaofeng Wang
(4)
Xiaohan Zhang
(6)
Xiaojing Liao
(1)
Xiaolin Du
(2)
Xiaoyang Sean Wang
(2)
Xin Tan
(1)
Xin Zhang
(1)
Xinyu Xing
(2)
Xudong Pan
(1)
Yifan Yan
(1)
Yifan Yang
(1)
Yingtian Zhou
(1)
Yinzhi Cao
(3)
Yizhe Shi
(1)
Yuan Zhang
(14)
Yuchuan Meng
(1)
Yuhong Nan
(5)
Yunteng Yang
(1)
Yurui Huang
(1)
Yuyu He
(2)
Zhe Wang
(1)
Zhemin Yang
(26)
Zhenghe Wang
(1)
Zhenyu Zhang
(1)
Zheyue Jiang
(2)
Zhibo Zhang
(2)
Zhichen Liu
(1)
Zhiyun Qian
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to