What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Min Yang
Google Scholar
81
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Locating Security Patch Variants With Two-Dimensional Code Commit Features.
Lin Wang
Yuan Zhang
Xiaoting Chen
Min Yang
2025
conf/sp
MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications.
Fengyu Liu
Youkun Shi
Yuan Zhang
Guangliang Yang
Enhao Li
Min Yang
2025
conf/sp
Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications.
Fengyu Liu
Yuan Zhang
Tian Chen
Youkun Shi
Guangliang Yang
Zihan Lin
Min Yang
Junyao He
Qi Li
2025
conf/ndss
Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service.
Zhibo Zhang
Lei Zhang
Zhangyue Zhang
Geng Hong
Yuan Zhang
Min Yang
2025
conf/ndss
The Skeleton Keys: A Large Scale Analysis of Credential Leakage in Mini-apps.
Yizhe Shi
Zhemin Yang
Kangwei Zhong
Guangliang Yang
Yifan Yang
Xiaohan Zhang
Min Yang
2025
conf/ndss
An Empirical Study on Fingerprint API Misuse with Lifecycle Analysis in Real-world Android Apps.
Xin Zhang
Xiaohan Zhang
Zhichen Liu
Bo Zhao
Zhemin Yang
Min Yang
2025
conf/ndss
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists.
Ruixuan Li
Chaoyi Lu
Baojun Liu
Yunyi Zhang
Geng Hong
Haixin Duan
Yanzhong Lin
Qingfeng Pan
Min Yang
Jun Shao
2025
conf/ndss
Revealing the Black Box of Device Search Engine: Scanning Assets, Strategies, and Ethical Consideration.
Mengying Wu
Geng Hong
Jinsong Chen
Qi Liu
Shujun Tang
Youhao Li
Baojun Liu
Haixin Duan
Min Yang
2025
conf/esorics
Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings.
Bingyang Guo
Mingxuan Liu
Yihui Ma
Ruixuan Li
Fan Shi
Min Zhang
Baojun Liu
Chengxi Xu
Haixin Duan
Geng Hong
Min Yang
Qingfeng Pan
2025
conf/uss
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink.
Yining Wang
Mi Zhang
Junjie Sun
Chenyue Wang
Min Yang
Hui Xue
Jialing Tao
Ranjie Duan
Jiexi Liu
2025
conf/uss
Beyond Exploit Scanning: A Functional Change-Driven Approach to Remote Software Version Identification.
Jinsong Chen
Mengying Wu
Geng Hong
Baichao An
Mingxuan Liu
Lei Zhang
Baojun Liu
Haixin Duan
Min Yang
2025
conf/uss
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments.
Xin Zhang
Xiaohan Zhang
Bo Zhao
Yuhong Nan
Zhichen Liu
Jianzhou Chen
Huijun Zhou
Min Yang
2025
conf/uss
NOKEScam: Understanding and Rectifying Non-Sense Keywords Spear Scam in Search Engines.
Mingxuan Liu
Yunyi Zhang
Lijie Wu
Baojun Liu
Geng Hong
Yiming Zhang
Hui Jiang
Jia Zhang
Haixin Duan
Min Zhang
Wei Guan
Fan Shi
Min Yang
2025
conf/uss
Careless Retention and Management: Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers.
Keke Lian
Lei Zhang
Haoran Zhao
Yinzhi Cao
Yongheng Liu
Fute Sun
Yuan Zhang
Min Yang
2025
conf/uss
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations.
Bocheng Xiang
Yuan Zhang
Fengyu Liu
Hao Huang
Zihan Lin
Min Yang
2025
conf/uss
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents.
Fengyu Liu
Yuan Zhang
Jiaqi Luo
Jiarun Dai
Tian Chen
Letian Yuan
Zhengmin Yu
Youkun Shi
Ke Li
Chengyuan Zhou
Hao Chen
Min Yang
2025
conf/uss
Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection.
Zihan Lin
Yuan Zhang
Jiarun Dai
Xinyou Huang
Bocheng Xiang
Guangliang Yang
Letian Yuan
Lei Zhang
Tian Chen
Min Yang
2025
conf/uss
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing.
Youkun Shi
Yuan Zhang
Tianhao Bai
Feng Xue
Jiarun Dai
Fengyu Liu
Lei Zhang
Xiapu Luo
Min Yang
2025
conf/uss
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation.
Xinyou Huang
Lei Zhang
Yongheng Liu
Peng Deng
Yinzhi Cao
Yuan Zhang
Min Yang
2024
journals/tifs
Identifying Cross-User Privacy Leakage in Mobile Mini-Apps at a Large Scale.
Shuai Li
Zhemin Yang
Yunteng Yang
Dingyi Liu
Min Yang
2024
journals/tifs
The Dark Forest: Understanding Security Risks of Cross-Party Delegated Resources in Mobile App-in-App Ecosystems.
Zhibo Zhang
Lei Zhang
Guangliang Yang
Yanjun Chen
Jiahao Xu
Min Yang
2024
conf/ccs
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Shuai Li
Zhemin Yang
Yuhong Nan
Shutian Yu
Qirui Zhu
Min Yang
2024
conf/ccs
Accurate and Efficient Recurring Vulnerability Detection for IoT Firmware.
Haoyu Xiao
Yuan Zhang
Minghang Shen
Chaoyang Lin
Can Zhang
Shengli Liu
Min Yang
2024
conf/ccs
Neural Dehydration: Effective Erasure of Black-box Watermarks from DNNs with Limited Data.
Yifan Lu
Wenxuan Li
Mi Zhang
Xudong Pan
Min Yang
2024
conf/sp
Efficient Detection of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.
Bofei Chen
Lei Zhang
Xinyou Huang
Yinzhi Cao
Keke Lian
Yuan Zhang
Min Yang
2024
conf/sp
Withdrawing is believing? Detecting Inconsistencies between Withdrawal Choices and Third-party Data Collections in Mobile Apps.
Xiaolin Du
Zhemin Yang
Jiapeng Lin
Yinzhi Cao
Min Yang
2024
conf/sp
BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting.
Huming Qiu
Junjie Sun
Mi Zhang
Xudong Pan
Min Yang
2024
conf/esorics
Towards Detection-Recovery Strategy for Robust Decentralized Matrix Factorization.
Yuanmin Huang
Mi Zhang
Daizong Ding
Erling Jiang
Qifan Xiao
Xiaoyu You
Yuan Tian
Min Yang
2024
conf/ndss
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Jiangrong Wu
Yuhong Nan
Luyi Xing
Jiatao Cheng
Zimin Lin
Zibin Zheng
Min Yang
2023
conf/ccs
SyzDirect: Directed Greybox Fuzzing for Linux Kernel.
Xin Tan
Yuan Zhang
Jiadong Lu
Xin Xiong
Zhuang Liu
Min Yang
2023
conf/ccs
Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Geng Hong
Mengying Wu
Pei Chen
Xiaojing Liao
Guoyi Ye
Min Yang
2023
conf/ccs
NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic.
Peng Deng
Zhemin Yang
Lei Zhang
Guangliang Yang
Wenzheng Hong
Yuan Zhang
Min Yang
2023
conf/ccs
Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers.
Fenglu Zhang
Baojun Liu
Eihal Alowaisheq
Jianjun Chen
Chaoyi Lu
Linjian Song
Yong Ma
Ying Liu
Haixin Duan
Min Yang
2023
conf/ccs
Under the Dark: A Systematical Study of Stealthy Mining Pools (Ab)use in the Wild.
Zhenrui Zhang
Geng Hong
Xiang Li
Zhuoqun Fu
Jia Zhang
Mingxuan Liu
Chuhan Wang
Jianjun Chen
Baojun Liu
Haixin Duan
Chao Zhang
Min Yang
2023
conf/uss
Remote Code Execution from SSTI in the Sandbox: Automatically Detecting and Exploiting Template Escape Bugs.
Yudi Zhao
Yuan Zhang
Min Yang
2023
conf/uss
Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks.
Qifan Xiao
Xudong Pan
Yifan Lu
Mi Zhang
Jiarun Dai
Min Yang
2023
conf/uss
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps.
Shuai Li
Zhemin Yang
Guangliang Yang
Hange Zhang
Nan Hua
Yurui Huang
Min Yang
2023
conf/uss
Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation.
Yifan Yan
Xudong Pan
Mi Zhang
Min Yang
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/sp
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.
Zheyue Jiang
Yuan Zhang
Jun Xu
Xinqian Sun
Zhuang Liu
Min Yang
2023
conf/sp
Callee: Recovering Call Graphs for Binaries with Transfer and Contrastive Learning.
Wenyu Zhu
Zhiyao Feng
Zihan Zhang
Jianjun Chen
Zhijian Ou
Min Yang
Chao Zhang
2023
conf/sp
Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps: A System Perspective.
Xiaohan Zhang
Haoqi Ye
Ziqi Huang
Xiao Ye
Yinzhi Cao
Yuan Zhang
Min Yang
2023
conf/dsn
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Zhaoxin Cai
Yuhong Nan
Xueqiang Wang
Mengyi Long
Qihua Ou
Min Yang
Zibin Zheng
2022
conf/ccs
Collect Responsibly But Deliver Arbitrarily?: A Study on Cross-User Privacy Leakage in Mobile Apps.
Shuai Li
Zhemin Yang
Nan Hua
Peng Liu
Xiaohan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.
Lei Zhang
Zhibo Zhang
Ancong Liu
Yinzhi Cao
Xiaohan Zhang
Yanjun Chen
Yuan Zhang
Guangliang Yang
Min Yang
2022
conf/uss
Rendering Contention Channel Made Practical in Web Browsers.
Shujiang Wu
Jianjia Yu
Min Yang
Yinzhi Cao
2022
conf/uss
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Shunfan Zhou
Zhemin Yang
Dan Qiao
Peng Liu
Min Yang
Zhe Wang
Chenggang Wu
2022
conf/uss
Backporting Security Patches of Web Applications: A Prototype Design and Implementation on Injection Vulnerability Patches.
Youkun Shi
Yuan Zhang
Tianhan Luo
Xiangyu Mao
Yinzhi Cao
Ziwen Wang
Yudi Zhao
Zongan Huang
Min Yang
2022
conf/uss
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.
Xudong Pan
Mi Zhang
Beina Sheng
Jiaming Zhu
Min Yang
2022
conf/sp
Analyzing Ground-Truth Data of Mobile Gambling Scams.
Geng Hong
Zhemin Yang
Sen Yang
Xiaojing Liao
Xiaolin Du
Min Yang
Haixin Duan
2022
conf/sp
Exploit the Last Straw That Breaks Android Systems.
Lei Zhang
Keke Lian
Haoyu Xiao
Zhibo Zhang
Peng Liu
Yuan Zhang
Min Yang
Haixin Duan
2021
conf/ccs
Locating the Security Patches for Disclosed OSS Vulnerabilities with Vulnerability-Commit Correlation Ranking.
Xin Tan
Yuan Zhang
Chenyuan Mi
Jiajun Cao
Kun Sun
Yifan Lin
Min Yang
2021
conf/ccs
Facilitating Vulnerability Assessment through PoC Migration.
Jiarun Dai
Yuan Zhang
Hailong Xu
Haiming Lyu
Zicheng Wu
Xinyu Xing
Min Yang
2021
conf/uss
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.
Xin Tan
Yuan Zhang
Xiyu Yang
Kangjie Lu
Min Yang
2021
conf/uss
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Kaiwen Shen
Chuhan Wang
Minglei Guo
Xiaofeng Zheng
Chaoyi Lu
Baojun Liu
Yuxuan Zhao
Shuang Hao
Haixin Duan
Qingfeng Pan
Min Yang
2021
conf/esorics
TAFA: A Task-Agnostic Fingerprinting Algorithm for Neural Networks.
Xudong Pan
Mi Zhang
Yifan Lu
Min Yang
2021
conf/ndss
From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.
Chaoyi Lu
Baojun Liu
Yiming Zhang
Zhou Li
Fenglu Zhang
Haixin Duan
Ying Liu
Joann Qiongna Chen
Jinjin Liang
Zaifeng Zhang
Shuang Hao
Min Yang
2021
conf/acsac
Understanding the Threats of Trojaned Quantized Neural Network in Model Supply Chains.
Xudong Pan
Mi Zhang
Yifan Yan
Min Yang
2020
conf/ccs
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks.
Mingming Zhang
Xiaofeng Zheng
Kaiwen Shen
Ziqiao Kong
Chaoyi Lu
Yu Wang
Haixin Duan
Shuang Hao
Baojun Liu
Min Yang
2020
conf/ccs
PDiff: Semantic-based Patch Presence Testing for Downstream Kernels.
Zheyue Jiang
Yuan Zhang
Jun Xu
Qi Wen
Zhenghe Wang
Xiaohan Zhang
Xinyu Xing
Min Yang
Zhemin Yang
2020
conf/ccs
Enhancing State-of-the-art Classifiers with API Semantics to Detect Evolved Android Malware.
Xiaohan Zhang
Yuan Zhang
Ming Zhong
Daizong Ding
Yinzhi Cao
Yukun Zhang
Mi Zhang
Min Yang
2020
conf/uss
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Jinfeng Li
Tianyu Du
Shouling Ji
Rong Zhang
Quan Lu
Min Yang
Ting Wang
2020
conf/uss
An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem.
Shunfan Zhou
Zhemin Yang
Jie Xiang
Yinzhi Cao
Min Yang
Yuan Zhang
2020
conf/uss
Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Xudong Pan
Mi Zhang
Duocai Wu
Qifan Xiao
Shouling Ji
Min Yang
2020
conf/uss
BScout: Direct Whole Patch Presence Test for Java Executables.
Jiarun Dai
Yuan Zhang
Zheyue Jiang
Yingtian Zhou
Junyan Chen
Xinyu Xing
Xiaohan Zhang
Xin Tan
Min Yang
Zhemin Yang
2020
conf/sp
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Zhe Wang
Chenggang Wu
Mengyao Xie
Yinqian Zhang
Kangjie Lu
Xiaofeng Zhang
Yuanming Lai
Yan Kang
Min Yang
2020
conf/sp
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Yuyu He
Lei Zhang
Zhemin Yang
Yinzhi Cao
Keke Lian
Shuai Li
Wei Yang
Zhibo Zhang
Min Yang
Yuan Zhang
Haixin Duan
2020
conf/sp
Privacy Risks of General-Purpose Language Models.
Xudong Pan
Mi Zhang
Shouling Ji
Min Yang
2020
conf/acsac
Understanding Promotion-as-a-Service on GitHub.
Kun Du
Hao Yang
Yubao Zhang
Haixin Duan
Haining Wang
Shuang Hao
Zhou Li
Min Yang
2018
conf/ccs
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong
Zhemin Yang
Sen Yang
Lei Zhang
Yuhong Nan
Zhibo Zhang
Min Yang
Yuan Zhang
Zhiyun Qian
Hai-Xin Duan
2018
conf/ccs
Invetter: Locating Insecure Input Validations in Android Services.
Lei Zhang
Zhemin Yang
Yuyu He
Zhenyu Zhang
Zhiyun Qian
Geng Hong
Yuan Zhang
Min Yang
2018
conf/uss
We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Jianjun Chen
Jian Jiang
Hai-Xin Duan
Tao Wan
Shuo Chen
Vern Paxson
Min Yang
2018
conf/uss
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.
Xiaohan Zhang
Yuan Zhang
Qianqian Mo
Hao Xia
Zhemin Yang
Min Yang
Xiaofeng Wang
Long Lu
Hai-Xin Duan
2018
conf/uss
Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path.
Baojun Liu
Chaoyi Lu
Hai-Xin Duan
Ying Liu
Zhou Li
Shuang Hao
Min Yang
2018
conf/ndss
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Yuhong Nan
Zhemin Yang
Xiaofeng Wang
Yuan Zhang
Donglai Zhu
Min Yang
2017
journals/tifs
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
Yuhong Nan
Zhemin Yang
Min Yang
Shunfan Zhou
Yuan Zhang
Guofei Gu
Xiaofeng Wang
Limin Sun
2016
journals/tifs
Rethinking Permission Enforcement Mechanism on Mobile Systems.
Yuan Zhang
Min Yang
Guofei Gu
Hao Chen
2015
conf/uss
UIPicker: User-Input Privacy Identification in Mobile Applications.
Yuhong Nan
Min Yang
Zhemin Yang
Shunfan Zhou
Guofei Gu
Xiaofeng Wang
2014
journals/tifs
Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps.
Yuan Zhang
Min Yang
Zhemin Yang
Guofei Gu
Peng Ning
Binyu Zang
2013
conf/ccs
Vetting undesirable behaviors in android apps with permission use analysis.
Yuan Zhang
Min Yang
Bingquan Xu
Zhemin Yang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Binyu Zang
2013
conf/ccs
AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Zhemin Yang
Min Yang
Yuan Zhang
Guofei Gu
Peng Ning
Xiaoyang Sean Wang
Coauthors
Ancong Liu
(1)
Baichao An
(1)
Baojun Liu
(11)
Beina Sheng
(1)
Bingquan Xu
(1)
Bingyang Guo
(1)
Binyu Zang
(2)
Bo Zhao
(2)
Bocheng Xiang
(2)
Bofei Chen
(1)
Can Zhang
(1)
Chao Zhang
(2)
Chaoyang Lin
(1)
Chaoyi Lu
(6)
Chenggang Wu
(2)
Chengxi Xu
(1)
Chengyuan Zhou
(1)
Chenyuan Mi
(1)
Chenyue Wang
(1)
Chuhan Wang
(2)
Daizong Ding
(2)
Dan Qiao
(1)
Dingyi Liu
(1)
Donglai Zhu
(1)
Duocai Wu
(1)
Eihal Alowaisheq
(1)
Enhao Li
(1)
Erling Jiang
(1)
Fan Shi
(2)
Feng Xue
(1)
Fenglu Zhang
(2)
Fengyu Liu
(5)
Fute Sun
(1)
Geng Hong
(11)
Guangliang Yang
(9)
Guofei Gu
(6)
Guoyi Ye
(1)
Hai-Xin Duan
(4)
Hailong Xu
(1)
Haiming Lyu
(1)
Haining Wang
(1)
Haixin Duan
(14)
Hange Zhang
(1)
Hao Chen
(2)
Hao Huang
(1)
Hao Xia
(1)
Hao Yang
(1)
Haoqi Ye
(1)
Haoran Zhao
(1)
Haoyu Xiao
(2)
Hui Jiang
(1)
Hui Xue
(1)
Huijun Zhou
(1)
Huming Qiu
(1)
Jia Zhang
(2)
Jiadong Lu
(1)
Jiahao Xu
(1)
Jiajun Cao
(1)
Jialing Tao
(1)
Jiaming Zhu
(1)
Jian Jiang
(1)
Jiangrong Wu
(1)
Jianjia Yu
(1)
Jianjun Chen
(4)
Jianzhou Chen
(1)
Jiapeng Lin
(1)
Jiaqi Luo
(1)
Jiarun Dai
(6)
Jiatao Cheng
(1)
Jie Xiang
(1)
Jiexi Liu
(1)
Jinfeng Li
(1)
Jinjin Liang
(1)
Jinsong Chen
(2)
Joann Qiongna Chen
(1)
Jun Shao
(1)
Jun Xu
(3)
Junjie Sun
(2)
Junyan Chen
(1)
Junyao He
(1)
Kaiwen Shen
(2)
Kangjie Lu
(2)
Kangwei Zhong
(1)
Ke Li
(1)
Keke Lian
(4)
Kun Du
(1)
Kun Sun
(1)
Lei Zhang
(14)
Letian Yuan
(2)
Lijie Wu
(1)
Limin Sun
(1)
Lin Wang
(1)
Linjian Song
(1)
Long Lu
(1)
Luyi Xing
(1)
Mengyao Xie
(1)
Mengyi Long
(1)
Mengying Wu
(3)
Mi Zhang
(12)
Min Yang
(81)
Min Zhang
(2)
Ming Zhong
(1)
Minghang Shen
(1)
Minglei Guo
(1)
Mingming Zhang
(1)
Mingxuan Liu
(4)
Nan Hua
(2)
Pei Chen
(1)
Peng Deng
(2)
Peng Liu
(3)
Peng Ning
(3)
Qi Li
(1)
Qi Liu
(1)
Qi Wen
(1)
Qianqian Mo
(1)
Qifan Xiao
(3)
Qihua Ou
(1)
Qingfeng Pan
(3)
Qirui Zhu
(1)
Quan Lu
(1)
Ranjie Duan
(1)
Rong Zhang
(1)
Ruixuan Li
(2)
Sen Yang
(2)
Shengli Liu
(1)
Shouling Ji
(3)
Shuai Li
(5)
Shuang Hao
(5)
Shujiang Wu
(1)
Shujun Tang
(1)
Shunfan Zhou
(4)
Shuo Chen
(1)
Shutian Yu
(1)
Tao Wan
(1)
Tian Chen
(3)
Tianhan Luo
(1)
Tianhao Bai
(1)
Tianyu Du
(1)
Ting Wang
(1)
Vern Paxson
(1)
Wei Guan
(1)
Wei Yang
(1)
Wenxuan Li
(1)
Wenyu Zhu
(1)
Wenzheng Hong
(1)
Xiang Li
(1)
Xiangyu Mao
(1)
Xiao Ye
(1)
Xiaofeng Wang
(4)
Xiaofeng Zhang
(1)
Xiaofeng Zheng
(2)
Xiaohan Zhang
(10)
Xiaojing Liao
(2)
Xiaolin Du
(2)
Xiaoting Chen
(1)
Xiaoyang Sean Wang
(2)
Xiaoyu You
(1)
Xiapu Luo
(1)
Xin Tan
(4)
Xin Xiong
(1)
Xin Zhang
(2)
Xinqian Sun
(2)
Xinyou Huang
(3)
Xinyu Xing
(3)
Xiyu Yang
(1)
Xudong Pan
(9)
Xueqiang Wang
(1)
Yan Kang
(1)
Yanjun Chen
(2)
Yanzhong Lin
(1)
Yifan Lin
(1)
Yifan Lu
(3)
Yifan Yan
(2)
Yifan Yang
(1)
Yihui Ma
(1)
Yiming Zhang
(2)
Ying Liu
(3)
Yingtian Zhou
(1)
Yining Wang
(1)
Yinqian Zhang
(1)
Yinzhi Cao
(11)
Yizhe Shi
(1)
Yong Ma
(1)
Yongheng Liu
(2)
Youhao Li
(1)
Youkun Shi
(5)
Yu Wang
(1)
Yuan Tian
(1)
Yuan Zhang
(38)
Yuanmin Huang
(1)
Yuanming Lai
(1)
Yubao Zhang
(1)
Yudi Zhao
(2)
Yuhong Nan
(8)
Yukun Zhang
(1)
Yunteng Yang
(1)
Yunyi Zhang
(2)
Yurui Huang
(1)
Yuxuan Zhao
(1)
Yuyu He
(2)
Zaifeng Zhang
(1)
Zhangyue Zhang
(1)
Zhaoxin Cai
(1)
Zhe Wang
(2)
Zhemin Yang
(23)
Zhenghe Wang
(1)
Zhengmin Yu
(1)
Zhenrui Zhang
(1)
Zhenyu Zhang
(1)
Zheyue Jiang
(4)
Zhibo Zhang
(6)
Zhichen Liu
(2)
Zhijian Ou
(1)
Zhiyao Feng
(1)
Zhiyun Qian
(2)
Zhou Li
(3)
Zhuang Liu
(3)
Zhuoqun Fu
(1)
Zibin Zheng
(2)
Zicheng Wu
(1)
Zihan Lin
(3)
Zihan Zhang
(1)
Zimin Lin
(1)
Ziqi Huang
(1)
Ziqiao Kong
(1)
Ziwen Wang
(1)
Zongan Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to