What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yang Liu
Google Scholar
ORCID:
0000-0001-7300-9215
58
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Scale-Invariant Adversarial Attack Against Arbitrary-Scale Super-Resolution.
Yihao Huang
Xin Luo
Qing Guo
Felix Juefei-Xu
Xiaojun Jia
Weikai Miao
Geguang Pu
Yang Liu
2025
journals/tifs
Efficient Generation of Targeted and Transferable Adversarial Examples for Vision-Language Models via Diffusion Models.
Qi Guo
Shanmin Pang
Xiaojun Jia
Yang Liu
Qing Guo
2025
journals/tifs
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning.
Cong Wu
Jianfei Sun
Jing Chen
Mamoun Alazab
Yang Liu
Yang Xiang
2025
journals/tifs
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
Ruichao Liang
Jing Chen
Cong Wu
Kun He
Yueming Wu
Ruochen Cao
Ruiying Du
Ziming Zhao
Yang Liu
2025
conf/ndss
SongBsAb: A Dual Prevention Approach against Singing Voice Conversion based Illegal Song Covers.
Guangke Chen
Yedi Zhang
Fu Song
Ting Wang
Xiaoning Du
Yang Liu
2025
conf/ndss
PropertyGPT: LLM-driven Formal Verification of Smart Contracts through Retrieval-Augmented Property Generation.
Ye Liu
Yue Xue
Daoyuan Wu
Yuqiang Sun
Yi Li
Miaolei Shi
Yang Liu
2025
journals/tifs
Profit or Deceit? Mitigating Pump and Dump in DeFi via Graph and Contrastive Learning.
Cong Wu
Jing Chen
Jiahong Li
Jiahua Xu
Ju Jia
Yutao Hu
Yebo Feng
Yang Liu
Yang Xiang
2025
journals/tifs
Detecting DeFi Fraud With a Graph-Transformer Language Model.
Wei Ma
Junjie Shi
Jiaxi Qiu
Cong Wu
Jing Chen
Lingxiao Jiang
Shangqing Liu
Yang Liu
Yang Xiang
2025
conf/uss
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection.
Yinyuan Zhang
Cuiying Gao
Yueming Wu
Shihan Dou
Cong Wu
Ying Zhang
Wei Yuan
Yang Liu
2025
conf/uss
SelfDefend: LLMs Can Defend Themselves against Jailbreaking in a Practical Manner.
Xunguang Wang
Daoyuan Wu
Zhenlan Ji
Zongjie Li
Pingchuan Ma
Shuai Wang
Yingjiu Li
Yang Liu
Ning Liu
Juergen Rahmel
2024
journals/tifs
A Causality-Aligned Structure Rationalization Scheme Against Adversarial Biased Perturbations for Graph Neural Networks.
Ju Jia
Siqi Ma
Yang Liu
Lina Wang
Robert H. Deng
2024
journals/tifs
Texture Re-Scalable Universal Adversarial Perturbation.
Yihao Huang
Qing Guo
Felix Juefei-Xu
Ming Hu
Xiaojun Jia
Xiaochun Cao
Geguang Pu
Yang Liu
2024
journals/tifs
Robust Motion Planning for Multi-Robot Systems Against Position Deception Attacks.
Wenbing Tang
Yuan Zhou
Yang Liu
Zuohua Ding
Jing Liu
2024
journals/tifs
Rethinking Membership Inference Attacks Against Transfer Learning.
Cong Wu
Jing Chen
Qianru Fang
Kun He
Ziming Zhao
Hao Ren
Guowen Xu
Yang Liu
Yang Xiang
2024
journals/tifs
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging.
Xiaojun Jia
Yuefeng Chen
Xiaofeng Mao
Ranjie Duan
Jindong Gu
Rong Zhang
Hui Xue
Yang Liu
Xiaochun Cao
2024
conf/ccs
Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications.
Dongqi Han
Zhiliang Wang
Ruitao Feng
Minghui Jin
Wenqi Chen
Kai Wang
Su Wang
Jiahai Yang
Xingang Shi
Xia Yin
Yang Liu
2024
conf/ccs
TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Cong Wu
Jing Chen
Ziming Zhao
Kun He
Guowen Xu
Yueming Wu
Haijun Wang
Hongwei Li
Yang Liu
Yang Xiang
2024
conf/uss
Using My Functions Should Follow My Checks: Understanding and Detecting Insecure OpenZeppelin Code in Smart Contracts.
Han Liu
Daoyuan Wu
Yuqiang Sun
Haijun Wang
Kaixuan Li
Yang Liu
Yixiang Chen
2024
conf/uss
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Siyue Feng
Yueming Wu
Wenjie Xue
Sikui Pan
Deqing Zou
Yang Liu
Hai Jin
2024
conf/uss
PentestGPT: Evaluating and Harnessing Large Language Models for Automated Penetration Testing.
Gelei Deng
Yi Liu
Víctor Mayoral Vilches
Peng Liu
Yuekang Li
Yuan Xu
Martin Pinzger
Stefan Rass
Tianwei Zhang
Yang Liu
2024
conf/sp
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Enze Wang
Jianjun Chen
Wei Xie
Chuhan Wang
Yifei Gao
Zhenhua Wang
Haixin Duan
Yang Liu
Baosheng Wang
2024
conf/ndss
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots.
Gelei Deng
Yi Liu
Yuekang Li
Kailong Wang
Ying Zhang
Zefeng Li
Haoyu Wang
Tianwei Zhang
Yang Liu
2023
conf/uss
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Cen Zhang
Yuekang Li
Hao Zhou
Xiaohan Zhang
Yaowen Zheng
Xian Zhan
Xiaofei Xie
Xiapu Luo
Xinghua Li
Yang Liu
Sheikh Mahbub Habib
2023
conf/uss
NAUTILUS: Automated RESTful API Vulnerability Detection.
Gelei Deng
Zhiyi Zhang
Yuekang Li
Yi Liu
Tianwei Zhang
Yang Liu
Guo Yu
Dongjin Wang
2023
conf/sp
Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.
Xinyi Wang
Cen Zhang
Yeting Li
Zhiwu Xu
Shuailin Huang
Yi Liu
Yican Yao
Yang Xiao
Yanyan Zou
Yang Liu
Wei Huo
2023
conf/sp
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing.
Jiawei Yin
Menghao Li
Yuekang Li
Yong Yu
Boru Lin
Yanyan Zou
Yang Liu
Wei Huo
Jingling Xue
2023
conf/eurosp
SoK: Rethinking Sensor Spoofing Attacks against Robotic Vehicles from a Systematic View.
Yuan Xu
Xingshuo Han
Gelei Deng
Jiwei Li
Yang Liu
Tianwei Zhang
2022
journals/tifs
FakeLocator: Robust Localization of GAN-Based Face Manipulations.
Yihao Huang
Felix Juefei-Xu
Qing Guo
Yang Liu
Geguang Pu
2022
journals/tifs
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack.
Yam Sharon
David Berend
Yang Liu
Asaf Shabtai
Yuval Elovici
2022
conf/ccs
On the (In)Security of Secure ROS2.
Gelei Deng
Guowen Xu
Yuan Zhou
Tianwei Zhang
Yang Liu
2022
conf/uss
RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix.
Yeting Li
Yecheng Sun
Zhiwu Xu
Jialun Cao
Yuekang Li
Rongchen Li
Haiming Chen
Shing-Chi Cheung
Yang Liu
Yang Xiao
2021
journals/tifs
Text Backdoor Detection Using an Interpretable RNN Abstract Model.
Ming Fan
Ziliang Si
Xiaofei Xie
Yang Liu
Ting Liu
2021
journals/tifs
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
Ruitao Feng
Sen Chen
Xiaofei Xie
Guozhu Meng
Shang-Wei Lin
Yang Liu
2021
journals/tifs
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
Ming Fan
Wenying Wei
Xiaofei Xie
Yang Liu
Xiaohong Guan
Ting Liu
2021
conf/ccs
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Xiaoyu He
Xiaofei Xie
Yuekang Li
Jianwen Sun
Feng Li
Wei Zou
Yang Liu
Lei Yu
Jianhua Zhou
Wenchang Shi
Wei Huo
2021
conf/uss
APICraft: Fuzz Driver Generation for Closed-source SDK Libraries.
Cen Zhang
Xingwei Lin
Yuekang Li
Yinxing Xue
Jundong Xie
Hongxu Chen
Xinlei Ying
Jiashui Wang
Yang Liu
2021
conf/fc
Formal Analysis of Composable DeFi Protocols.
Palina Tolmach
Yi Li
Shang-Wei Lin
Yang Liu
2021
conf/sp
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems.
Guangke Chen
Sen Chen
Lingling Fan
Xiaoning Du
Zhe Zhao
Fu Song
Yang Liu
2021
conf/asiaccs
Stealing Deep Reinforcement Learning Models for Fun and Profit.
Kangjie Chen
Shangwei Guo
Tianwei Zhang
Xiaofei Xie
Yang Liu
2020
journals/tifs
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity.
Dongxia Wang
Tim Muller
Jie Zhang
Yang Liu
2020
conf/uss
Automatic Hot Patch Generation for Android Kernels.
Zhengzi Xu
Yulong Zhang
Longri Zheng
Liangzhao Xia
Chenfu Bao
Zhi Wang
Yang Liu
2020
conf/uss
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Yang Xiao
Bihuan Chen
Chendong Yu
Zhengzi Xu
Zimu Yuan
Feng Li
Binghong Liu
Yang Liu
Wei Huo
Wei Zou
Wenchang Shi
2020
conf/uss
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Hongxu Chen
Shengjian Guo
Yinxing Xue
Yulei Sui
Cen Zhang
Yuekang Li
Haijun Wang
Yang Liu
2020
conf/sp
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity.
Jiao Jiao
Shuanglong Kan
Shang-Wei Lin
David Sanán
Yang Liu
Jun Sun
2019
journals/tches
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
Xiaolu Hou
Jakub Breier
Fuyuan Zhang
Yang Liu
2019
journals/compsec
Securing android applications via edge assistant third-party library detection.
Zhushou Tang
Minhui Xue
Guozhu Meng
Chengguo Ying
Yugeng Liu
Jianan He
Haojin Zhu
Yang Liu
2019
journals/tifs
Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense.
Chenyu Wang
Bihuan Chen
Yang Liu
Hongjun Wu
2019
journals/tifs
Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.
Guozhu Meng
Matthew Patrick
Yinxing Xue
Yang Liu
Jie Zhang
2018
journals/tches
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
Jakub Breier
Xiaolu Hou
Yang Liu
2018
journals/compsec
ROPSentry: Runtime defense against ROP attacks using hardware performance counters.
Sanjeev Das
Bihuan Chen
Mahinthan Chandramohan
Yang Liu
Wei Zhang
2018
conf/ccs
Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Hongxu Chen
Yinxing Xue
Yuekang Li
Bihuan Chen
Xiaofei Xie
Xiuheng Wu
Yang Liu
2018
conf/ccs
Practical Fault Attack on Deep Neural Networks.
Jakub Breier
Xiaolu Hou
Dirmanto Jap
Lei Ma
Shivam Bhasin
Yang Liu
2017
journals/tifs
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
Yinxing Xue
Guozhu Meng
Yang Liu
Tian Huat Tan
Hongxu Chen
Jun Sun
Jie Zhang
2017
conf/sp
Skyfire: Data-Driven Seed Generation for Fuzzing.
Junjie Wang
Bihuan Chen
Lei Wei
Yang Liu
2016
journals/tifs
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware.
Sanjeev Das
Yang Liu
Wei Zhang
Mahinthan Chandramohan
2016
conf/ccs
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Guozhu Meng
Yinxing Xue
Mahinthan Chandramohan
Annamalai Narayanan
Yang Liu
Jie Zhang
Tieming Chen
2015
conf/ccs
JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification.
Junjie Wang
Yinxing Xue
Yang Liu
Tian Huat Tan
2013
conf/ndss
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations.
Guangdong Bai
Jike Lei
Guozhu Meng
Sai Sathyanarayan Venkatraman
Prateek Saxena
Jun Sun
Yang Liu
Jin Song Dong
Coauthors
Annamalai Narayanan
(1)
Asaf Shabtai
(1)
Baosheng Wang
(1)
Bihuan Chen
(5)
Binghong Liu
(1)
Boru Lin
(1)
Cen Zhang
(4)
Chendong Yu
(1)
Chenfu Bao
(1)
Chengguo Ying
(1)
Chenyu Wang
(1)
Chuhan Wang
(1)
Cong Wu
(7)
Cuiying Gao
(1)
Daoyuan Wu
(3)
David Berend
(1)
David Sanán
(1)
Deqing Zou
(1)
Dirmanto Jap
(1)
Dongjin Wang
(1)
Dongqi Han
(1)
Dongxia Wang
(1)
Enze Wang
(1)
Felix Juefei-Xu
(3)
Feng Li
(2)
Fu Song
(2)
Fuyuan Zhang
(1)
Geguang Pu
(3)
Gelei Deng
(5)
Guangdong Bai
(1)
Guangke Chen
(2)
Guo Yu
(1)
Guowen Xu
(3)
Guozhu Meng
(6)
Hai Jin
(1)
Haijun Wang
(3)
Haiming Chen
(1)
Haixin Duan
(1)
Han Liu
(1)
Hao Ren
(1)
Hao Zhou
(1)
Haojin Zhu
(1)
Haoyu Wang
(1)
Hongjun Wu
(1)
Hongwei Li
(1)
Hongxu Chen
(4)
Hui Xue
(1)
Jakub Breier
(3)
Jiahai Yang
(1)
Jiahong Li
(1)
Jiahua Xu
(1)
Jialun Cao
(1)
Jianan He
(1)
Jianfei Sun
(1)
Jianhua Zhou
(1)
Jianjun Chen
(1)
Jianwen Sun
(1)
Jiao Jiao
(1)
Jiashui Wang
(1)
Jiawei Yin
(1)
Jiaxi Qiu
(1)
Jie Zhang
(4)
Jike Lei
(1)
Jin Song Dong
(1)
Jindong Gu
(1)
Jing Chen
(6)
Jing Liu
(1)
Jingling Xue
(1)
Jiwei Li
(1)
Ju Jia
(2)
Juergen Rahmel
(1)
Jun Sun
(3)
Jundong Xie
(1)
Junjie Shi
(1)
Junjie Wang
(2)
Kai Wang
(1)
Kailong Wang
(1)
Kaixuan Li
(1)
Kangjie Chen
(1)
Kun He
(3)
Lei Ma
(1)
Lei Wei
(1)
Lei Yu
(1)
Liangzhao Xia
(1)
Lina Wang
(1)
Lingling Fan
(1)
Lingxiao Jiang
(1)
Longri Zheng
(1)
Mahinthan Chandramohan
(3)
Mamoun Alazab
(1)
Martin Pinzger
(1)
Matthew Patrick
(1)
Menghao Li
(1)
Miaolei Shi
(1)
Ming Fan
(2)
Ming Hu
(1)
Minghui Jin
(1)
Minhui Xue
(1)
Ning Liu
(1)
Palina Tolmach
(1)
Peng Liu
(1)
Pingchuan Ma
(1)
Prateek Saxena
(1)
Qi Guo
(1)
Qianru Fang
(1)
Qing Guo
(4)
Ranjie Duan
(1)
Robert H. Deng
(1)
Rong Zhang
(1)
Rongchen Li
(1)
Ruichao Liang
(1)
Ruitao Feng
(2)
Ruiying Du
(1)
Ruochen Cao
(1)
Sai Sathyanarayan Venkatraman
(1)
Sanjeev Das
(2)
Sen Chen
(2)
Shang-Wei Lin
(3)
Shangqing Liu
(1)
Shangwei Guo
(1)
Shanmin Pang
(1)
Sheikh Mahbub Habib
(1)
Shengjian Guo
(1)
Shihan Dou
(1)
Shing-Chi Cheung
(1)
Shivam Bhasin
(1)
Shuai Wang
(1)
Shuailin Huang
(1)
Shuanglong Kan
(1)
Sikui Pan
(1)
Siqi Ma
(1)
Siyue Feng
(1)
Stefan Rass
(1)
Su Wang
(1)
Tian Huat Tan
(2)
Tianwei Zhang
(6)
Tieming Chen
(1)
Tim Muller
(1)
Ting Liu
(2)
Ting Wang
(1)
Víctor Mayoral Vilches
(1)
Wei Huo
(4)
Wei Ma
(1)
Wei Xie
(1)
Wei Yuan
(1)
Wei Zhang
(2)
Wei Zou
(2)
Weikai Miao
(1)
Wenbing Tang
(1)
Wenchang Shi
(2)
Wenjie Xue
(1)
Wenqi Chen
(1)
Wenying Wei
(1)
Xia Yin
(1)
Xian Zhan
(1)
Xiaochun Cao
(2)
Xiaofei Xie
(7)
Xiaofeng Mao
(1)
Xiaohan Zhang
(1)
Xiaohong Guan
(1)
Xiaojun Jia
(4)
Xiaolu Hou
(3)
Xiaoning Du
(2)
Xiaoyu He
(1)
Xiapu Luo
(1)
Xin Luo
(1)
Xingang Shi
(1)
Xinghua Li
(1)
Xingshuo Han
(1)
Xingwei Lin
(1)
Xinlei Ying
(1)
Xinyi Wang
(1)
Xiuheng Wu
(1)
Xunguang Wang
(1)
Yam Sharon
(1)
Yang Liu
(58)
Yang Xiang
(5)
Yang Xiao
(3)
Yanyan Zou
(2)
Yaowen Zheng
(1)
Ye Liu
(1)
Yebo Feng
(1)
Yecheng Sun
(1)
Yedi Zhang
(1)
Yeting Li
(2)
Yi Li
(2)
Yi Liu
(4)
Yican Yao
(1)
Yifei Gao
(1)
Yihao Huang
(3)
Ying Zhang
(2)
Yingjiu Li
(1)
Yinxing Xue
(7)
Yinyuan Zhang
(1)
Yixiang Chen
(1)
Yong Yu
(1)
Yuan Xu
(2)
Yuan Zhou
(2)
Yue Xue
(1)
Yuefeng Chen
(1)
Yuekang Li
(10)
Yueming Wu
(4)
Yugeng Liu
(1)
Yulei Sui
(1)
Yulong Zhang
(1)
Yuqiang Sun
(2)
Yutao Hu
(1)
Yuval Elovici
(1)
Zefeng Li
(1)
Zhe Zhao
(1)
Zhengzi Xu
(2)
Zhenhua Wang
(1)
Zhenlan Ji
(1)
Zhi Wang
(1)
Zhiliang Wang
(1)
Zhiwu Xu
(2)
Zhiyi Zhang
(1)
Zhushou Tang
(1)
Ziliang Si
(1)
Ziming Zhao
(3)
Zimu Yuan
(1)
Zongjie Li
(1)
Zuohua Ding
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to