default search action
Le Yu 0002
Person information
- affiliation: Hong Kong Polytechnic University, Department of Computing, Hong Kong
- affiliation (former): Nanjing University of Posts and Telecommunications, China
Other persons with the same name
- Le Yu — disambiguation page
- Le Yu 0001 — Tsinghua University, Center for Earth System Science, Beijing, China (and 1 more)
- Le Yu 0003 — University of Strathclyde, Department of Electronic and Electrical Engineering, Glasgow, UK
- Le Yu 0004 — Beihang University, SKLSDE Lab and BDBC, School of Computer Science and Engineering, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. Comput. Secur. 136: 103577 (2024) - [c23]Jincheng Wang, Le Yu, Xiapu Luo:
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. SP 2024: 881-896 - [c22]Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. SP 2024: 2348-2365 - [i6]Haozhen Zhang, Xi Xiao, Le Yu, Qing Li, Zhen Ling, Ye Zhang:
One Train for Two Tasks: An Encrypted Traffic Classification Framework Using Supervised Contrastive Learning. CoRR abs/2402.07501 (2024) - 2023
- [j7]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [c21]Renjie Xiao, Xi Xiao, Le Yu, Bin Zhang, Guangwu Hu, Qing Li:
ReviewLocator: Enhance User Review-Based Bug Localization with Bug Reports. ADMA (5) 2023: 122-136 - [c20]Le Yu, Rui Yao, Zhanlei Zhang:
Poster: DP-Reverser: Automatically Reverse Engineering Vehicle Diagnostic Protocols. ICDCS 2023: 1053-1054 - [c19]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c18]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. WWW 2023: 2066-2075 - [i5]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. CoRR abs/2301.12348 (2023) - [i4]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. CoRR abs/2307.16713 (2023) - 2022
- [j6]Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [c17]Kaifa Zhao, Le Yu, Shiyao Zhou, Jing Li, Xiapu Luo, Yat Fei Aemon Chiu, Yutong Liu:
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification. EMNLP 2022: 10266-10277 - [c16]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - [c15]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [i3]Kaifa Zhao, Le Yu, Shiyao Zhou, Jing Li, Xiapu Luo, Yat Fei Aemon Chiu, Yutong Liu:
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification. CoRR abs/2212.04357 (2022) - 2021
- [j5]Le Yu, Xiapu Luo, Jiachi Chen, Hao Zhou, Tao Zhang, Henry Chang, Hareton K. N. Leung:
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies. IEEE Trans. Software Eng. 47(2): 221-242 (2021) - [c14]Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. CCS 2021: 3218-3235 - 2020
- [c13]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. ISSRE 2020: 253-264 - [c12]Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c11]Xiaoqi Li, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, Zhou Xu:
STAN: Towards Describing Bytecodes of Smart Contract. QRS 2020: 273-284 - [c10]Yan Cai, Yutian Tang, Haicheng Li, Le Yu, Hao Zhou, Xiapu Luo, Liang He, Purui Su:
Resource Race Attacks on Android. SANER 2020: 47-58 - [i2]Xiaoqi Li, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, Zhou Xu:
STAN: Towards Describing Bytecodes of Smart Contract. CoRR abs/2007.09696 (2020) - [i1]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. CoRR abs/2008.05864 (2020)
2010 – 2019
- 2018
- [j4]Le Yu, Xiapu Luo, Chenxiong Qian, Shuai Wang, Hareton K. N. Leung:
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy. IEEE Trans. Software Eng. 44(9): 834-854 (2018) - [c9]Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu:
Localizing Function Errors in Mobile Apps with User Reviews. DSN 2018: 418-429 - 2017
- [j3]Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. IEEE Trans. Inf. Forensics Secur. 12(4): 865-880 (2017) - [c8]Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu:
Adaptive unpacking of Android apps. ICSE 2017: 358-369 - [c7]Lei Xue, Xiaobo Ma, Xiapu Luo, Le Yu, Shuai Wang, Ting Chen:
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement. INFOCOM 2017: 1-9 - [p1]Xiaoqi Li, Le Yu, Xiapu Luo:
On Discovering Vulnerabilities in Android Applications. Mobile Security and Privacy 2017: 155-166 - 2016
- [j2]Xiapu Luo, Haocheng Zhou, Le Yu, Lei Xue, Yi Xie:
Characterizing mobile *-box applications. Comput. Networks 103: 228-239 (2016) - [c6]Le Yu, Xiapu Luo, Xule Liu, Tao Zhang:
Can We Trust the Privacy Policies of Android Apps? DSN 2016: 538-549 - [c5]Le Yu, Xiapu Luo, Chenxiong Qian, Shuai Wang:
Revisiting the Description-to-Behavior Fidelity in Android Applications. SANER 2016: 415-426 - 2015
- [j1]Chenxiong Qian, Xiapu Luo, Le Yu, Guofei Gu:
VulHunter: Toward Discovering Vulnerabilities in Android Applications. IEEE Micro 35(1): 44-53 (2015) - [c4]Le Yu, Tao Zhang, Xiapu Luo, Lei Xue:
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications. SPSM@CCS 2015: 39-50 - 2010
- [c3]Fan Wang, Zhaoquan Huang, Le Yu, Lifan Zhou, Dengrong Zhang:
A study of PS-InSAR method for small area urban land subsidence. Geoinformatics 2010: 1-6
2000 – 2009
- 2006
- [c2]Dengrong Zhang, Le Yu, Denghui Zhang, Liping Di:
Implementation of a Data Node in China's Spatial Information Grid Based on NWGISS. IGARSS 2006: 321-324 - [c1]Dengrong Zhang, Le Yu, Zhigang Cai:
A Matching-Based Automatic Registration for Remotely Sensed Imagery. IGARSS 2006: 956-959
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-09 22:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint