Остановите войну!
for scientists:
default search action
Yuhong Nan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c20]Zhaoxin Cai, Yuhong Nan, Xueqiang Wang, Mengyi Long, Qihua Ou, Min Yang, Zibin Zheng:
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. DSN 2023: 480-493 - [c19]Mingxi Ye, Yuhong Nan, Zibin Zheng, Dongpeng Wu, Huizhong Li:
Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. ISSTA 2023: 298-309 - [c18]Zeqin Liao, Sicheng Hao, Yuhong Nan, Zibin Zheng:
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis. ISSTA 2023: 980-991 - [c17]Sicheng Hao, Yuhong Nan, Zibin Zheng, Xiaohui Liu:
SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and Binding. ASE 2023: 294-306 - [c16]Mengyi Long, Yue Xu, Jiangrong Wu, Qihua Ou, Yuhong Nan:
Understanding Dark UI Patterns in the Mobile Ecosystem: A Case Study of Apps in China. SaTS@CCS 2023: 33-40 - [c15]Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma:
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts. USENIX Security Symposium 2023: 373-390 - [c14]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - [i1]Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. CoRR abs/2310.09831 (2023) - 2022
- [c13]Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu:
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. DSN 2022: 534-546 - [c12]Zeqin Liao, Zibin Zheng, Xiao Chen, Yuhong Nan:
SmartDagger: a bytecode-based static analysis approach for detecting cross-contract vulnerability. ISSTA 2022: 752-764 - [c11]Mingming Zha, Jice Wang, Yuhong Nan, Xiaofeng Wang, Yuqing Zhang, Zelin Yang:
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems. NDSS 2022 - [c10]Jianzhong Su, Jiyi Liu, Yuhong Nan, Yin Li:
Security Evaluation of Smart Contracts based on Code and Transaction - A Survey. ICSS 2022: 41-48 - [c9]Fei Wang, Jianliang Wu, Yuhong Nan, Yousra Aafer, Xiangyu Zhang, Dongyan Xu, Mathias Payer:
ProFactory: Improving IoT Security via Formalized Protocol Customization. USENIX Security Symposium 2022: 3879-3896 - 2021
- [c8]Zeyu Lei, Yuhong Nan, Yanick Fratantonio, Antonio Bianchi:
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. NDSS 2021 - [c7]Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu:
ATLAS: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium 2021: 3005-3022 - [c6]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - 2020
- [c5]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu:
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. RAID 2020: 397-411 - [c4]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020
2010 – 2019
- 2018
- [c3]Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Hai-Xin Duan:
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World. CCS 2018: 1701-1713 - [c2]Yuhong Nan, Zhemin Yang, Xiaofeng Wang, Yuan Zhang, Donglai Zhu, Min Yang:
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps. NDSS 2018 - 2017
- [j1]Yuhong Nan, Zhemin Yang, Min Yang, Shunfan Zhou, Yuan Zhang, Guofei Gu, Xiaofeng Wang, Limin Sun:
Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Trans. Inf. Forensics Secur. 12(3): 647-661 (2017) - 2015
- [c1]Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, Xiaofeng Wang:
UIPicker: User-Input Privacy Identification in Mobile Applications. USENIX Security Symposium 2015: 993-1008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-01 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint