Sledovať
Yajin Zhou
Yajin Zhou
Overená e-mailová adresa na: zju.edu.cn - Domovská stránka
Názov
Citované v
Citované v
Rok
Dissecting android malware: Characterization and evolution
Y Zhou, X Jiang
2012 IEEE symposium on security and privacy, 95-109, 2012
31022012
Hey, you, get off of my market: detecting malicious apps in official and alternative android markets.
Y Zhou, Z Wang, W Zhou, X Jiang
NDSS 25 (4), 50-52, 2012
12362012
RiskRanker: scalable and accurate zero-day android malware detection
M Grace, Y Zhou, Q Zhang, S Zou, X Jiang
Proceedings of the 10th international conference on Mobile systems …, 2012
9242012
Detecting repackaged smartphone applications in third-party android marketplaces
W Zhou, Y Zhou, X Jiang, P Ning
Proceedings of the second ACM conference on Data and Application Security …, 2012
9022012
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
International conference on Trust and trustworthy computing, 93-107, 2011
6282011
Systematic Detection of Capability Leaks in Stock Android Smartphones.
MC Grace, Y Zhou, Z Wang, X Jiang
NDSS 14, 19, 2012
6212012
Fast, scalable detection of Piggybacked mobile applications
W Zhou, Y Zhou, M Grace, X Jiang, S Zou
Proceedings of the third ACM conference on Data and application security and …, 2013
3202013
Detecting passive content leaks and pollution in android applications
YZX Jiang
Proceedings of the 20th Network and Distributed System Security Symposium (NDSS), 2013
3062013
The impact of vendor customizations on android security
L Wu, M Grace, Y Zhou, C Wu, X Jiang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2592013
ARMlock: Hardware-based Fault Isolation for ARM
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1242014
AirBag: Boosting Smartphone Resistance to Malware Infection.
C Wu, Y Zhou, K Patel, Z Liang, X Jiang
NDSS, 2014
1202014
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem
D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren
Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021
1072021
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
L Xue, Y Zhou, T Chen, X Luo, G Gu
1022017
DeFiRanger: Detecting DeFi Price Manipulation Attacks
S Wu, Z Yu, D Wang, Y Zhou, L Wu, H Wang, X Yuan
IEEE Transactions on Dependable and Secure Computing, 2023
932023
Towards Understanding and Demystifying Bitcoin Mixing Services
L Wu, Y Hu, Y Zhou, H Wang, X Luo, Z Wang, F Zhang, K Ren
arXiv preprint arXiv:2010.16274, 2020
902020
LightBox: Full-stack protected stateful middlebox at lightning speed
H Duan, C Wang, X Yuan, Y Zhou, Q Wang, K Ren
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
802019
SecPod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
Proceedings of the 2015 USENIX Conference on Usenix Annual Technical …, 2015
752015
NDroid: Toward tracking information flows across multiple Android contexts
L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan
IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2018
672018
DIVILAR: diversifying intermediate language for anti-repackaging on android platform
W Zhou, Z Wang, Y Zhou, X Jiang
Proceedings of the 4th ACM conference on Data and application security and …, 2014
632014
Harvesting developer credentials in Android apps
Y Zhou, L Wu, Z Wang, X Jiang
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
612015
Systém momentálne nemôže vykonať operáciu. Skúste to neskôr.
Články 1–20