Follow
Yue Duan
Title
Cited by
Cited by
Year
Semantics-aware android malware classification using weighted contextual api dependency graphs
M Zhang, Y Duan, H Yin, Z Zhao
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
6062014
DEEPBINDIFF: Learning Program-Wide Code Representations for Binary Diffing
Y Duan, X Li, J Wang, H Yin
Network and Distributed System Security Symposium (NDSS), 2020
1632020
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing
L Zhao, Y Duan, H Yin, J Xuan
Network and Distributed System Security Symposium (NDSS), 2019
1482019
Towards automatic generation of security-centric descriptions for android apps
M Zhang, Y Duan, Q Feng, H Yin
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1002015
Things You May Not Know About Android (Un) Packers: A Systematic Study based on Whole-System Emulation
Y Duan, M Zhang, AV Bhaskar, H Yin, X Pan, T Li, X Wang, XF Wang
Network and Distributed System Security Symposium (NDSS), 2018
992018
Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing
J Wang, Y Duan, W Song, H Yin, C Song
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
842019
Dark hazard: Learning-based, large-scale discovery of hidden sensitive operations in android apps
X Pan, X Wang, Y Duan, X Wang, H Yin
Network and Distributed System Security Symposium (NDSS), 2017
80*2017
Semantics-aware android malware classification
YIN Heng, M Zhang, Y Duan, Z Zhao
US Patent App. 14/833,491, 2016
442016
Jsforce: A forced execution engine for malicious javascript detection
X Hu, Y Cheng, Y Duan, A Henderson, H Yin
Security and Privacy in Communication Networks: 13th International …, 2018
212018
Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Y Duan, M Zhang, H Yin, Y Tang
HotCloud 15, 2015
132015
Social network based reputation computation and document classification
JY Lee, Y Duan, JC Oh, W Du, HA Blair, L Wang, X Jin
122012
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
Y Duan, X Zhao, Y Pan, S Li, M Li, F Xu, M Zhang
Proceedings of the 29nd ACM SIGSAC Conference on Computer and Communications …, 2022
102022
Automatic reputation computation through document analysis: A social network approach
JY Lee, Y Duan, JC Oh, W Du, H Blair, L Wang, X Jin
2011 International Conference on Advances in Social Networks Analysis and …, 2011
92011
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains
WE Bodell III, S Meisami, Y Duan
32nd USENIX Security Symposium (USENIX Security 23), 2023
82023
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications
Y Duan, L Gao, J Hu, H Yin
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
52019
Probabilistic Path Prioritization for Hybrid Fuzzing
L Zhao, P Cao, Y Duan, H Yin, J Xuan
IEEE Transactions on Dependable and Secure Computing (TDSC), 2022
42022
Poster: Privacy-Preserving Offloading of Mobile App to the Public Cloud
Y Duan, M Zhang, H Yin, Y Tang
Syracuse University, 2015
12015
Marco: A Stochastic Asynchronous Concolic Explorer
J Hu, Y Duan, H Yin
2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE …, 2024
2024
SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing
L Gao, Y Qu, S Yu, Y Duan, H Yin
Network and Distributed System Security Symposium (NDSS), 2024
2024
Discerning Code Changes From a Security Perspective
Y Duan
UC Riverside, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20