What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuhong Nan
Google Scholar
ORCID:
0000-0001-9597-9888
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Connector: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-Chain Transaction Association.
Dan Lin
Jiajing Wu
Yuxin Su
Ziye Zheng
Yuhong Nan
Qinnan Zhang
Bowen Song
Zibin Zheng
2025
conf/icics
Identifying Unusual Personal Data in Mobile Apps for Better Privacy Compliance Check.
Jiatao Cheng
Yuhong Nan
Xueqiang Wang
Zhefan Chen
Yuliang Zhang
2025
conf/icics
Why Biting the Bait? Understanding Bait and Switch UI Dark Patterns in Mobile Apps.
Yixi Lin
Yue Xu
Zitong Yao
Yuhong Nan
Queping Kong
Xueqiang Wang
2025
conf/uss
Demystifying the (In)Security of QR Code-based Login in Real-world Deployments.
Xin Zhang
Xiaohan Zhang
Bo Zhao
Yuhong Nan
Zhichen Liu
Jianzhou Chen
Huijun Zhou
Min Yang
2024
conf/ccs
Are We Getting Well-informed? An In-depth Study of Runtime Privacy Notice Practice in Mobile Apps.
Shuai Li
Zhemin Yang
Yuhong Nan
Shutian Yu
Qirui Zhu
Min Yang
2024
conf/ccs
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion.
Mingming Zha
Zilong Lin
Siyuan Tang
Xiaojing Liao
Yuhong Nan
XiaoFeng Wang
2024
conf/uss
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
Zian Jia
Yun Xiong
Yuhong Nan
Yao Zhang
Jinjing Zhao
Mi Wen
2024
conf/uss
Navigating the Privacy Compliance Maze: Understanding Risks with Privacy-Configurable Mobile SDKs.
Yifan Zhang
Zhaojie Hu
Xueqiang Wang
Yuhui Hong
Yuhong Nan
XiaoFeng Wang
Jiatao Cheng
Luyi Xing
2024
conf/ndss
Leaking the Privacy of Groups and More: Understanding Privacy Risks of Cross-App Content Sharing in Mobile Ecosystem.
Jiangrong Wu
Yuhong Nan
Luyi Xing
Jiatao Cheng
Zimin Lin
Zibin Zheng
Min Yang
2023
conf/uss
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Yuhong Nan
Xueqiang Wang
Luyi Xing
Xiaojing Liao
Ruoyu Wu
Jianliang Wu
Yifan Zhang
XiaoFeng Wang
2023
conf/uss
AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts.
Hailun Ding
Juan Zhai
Yuhong Nan
Shiqing Ma
2023
conf/dsn
DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator.
Zhaoxin Cai
Yuhong Nan
Xueqiang Wang
Mengyi Long
Qihua Ou
Min Yang
Zibin Zheng
2022
conf/uss
ProFactory: Improving IoT Security via Formalized Protocol Customization.
Fei Wang
Jianliang Wu
Yuhong Nan
Yousra Aafer
Xiangyu Zhang
Dongyan Xu
Mathias Payer
2022
conf/ndss
Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.
Mingming Zha
Jice Wang
Yuhong Nan
Xiaofeng Wang
Yuqing Zhang
Zelin Yang
2022
conf/dsn
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Ziyi Zhou
Xing Han
Zeyuan Chen
Yuhong Nan
Juanru Li
Dawu Gu
2021
conf/uss
ATLAS: A Sequence-based Learning Approach for Attack Investigation.
Abdulellah Alsaheel
Yuhong Nan
Shiqing Ma
Le Yu
Gregory Walkup
Z. Berkay Celik
Xiangyu Zhang
Dongyan Xu
2021
conf/uss
Understanding Malicious Cross-library Data Harvesting on Android.
Jice Wang
Yue Xiao
Xueqiang Wang
Yuhong Nan
Luyi Xing
Xiaojing Liao
Jinwei Dong
Nicolás Serrano
Haoran Lu
XiaoFeng Wang
Yuqing Zhang
2021
conf/ndss
On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices.
Zeyu Lei
Yuhong Nan
Yanick Fratantonio
Antonio Bianchi
2018
conf/ccs
How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World.
Geng Hong
Zhemin Yang
Sen Yang
Lei Zhang
Yuhong Nan
Zhibo Zhang
Min Yang
Yuan Zhang
Zhiyun Qian
Hai-Xin Duan
2018
conf/ndss
Finding Clues for Your Secrets: Semantics-Driven, Learning-Based Privacy Discovery in Mobile Apps.
Yuhong Nan
Zhemin Yang
Xiaofeng Wang
Yuan Zhang
Donglai Zhu
Min Yang
2017
journals/tifs
Identifying User-Input Privacy in Mobile Applications at a Large Scale.
Yuhong Nan
Zhemin Yang
Min Yang
Shunfan Zhou
Yuan Zhang
Guofei Gu
Xiaofeng Wang
Limin Sun
2015
conf/uss
UIPicker: User-Input Privacy Identification in Mobile Applications.
Yuhong Nan
Min Yang
Zhemin Yang
Shunfan Zhou
Guofei Gu
Xiaofeng Wang
Coauthors
Abdulellah Alsaheel
(1)
Antonio Bianchi
(1)
Bo Zhao
(1)
Bowen Song
(1)
Dan Lin
(1)
Dawu Gu
(1)
Donglai Zhu
(1)
Dongyan Xu
(2)
Fei Wang
(1)
Geng Hong
(1)
Gregory Walkup
(1)
Guofei Gu
(2)
Hai-Xin Duan
(1)
Hailun Ding
(1)
Haoran Lu
(1)
Huijun Zhou
(1)
Jiajing Wu
(1)
Jiangrong Wu
(1)
Jianliang Wu
(2)
Jianzhou Chen
(1)
Jiatao Cheng
(3)
Jice Wang
(2)
Jinjing Zhao
(1)
Jinwei Dong
(1)
Juan Zhai
(1)
Juanru Li
(1)
Le Yu
(1)
Lei Zhang
(1)
Limin Sun
(1)
Luyi Xing
(4)
Mathias Payer
(1)
Mengyi Long
(1)
Mi Wen
(1)
Min Yang
(8)
Mingming Zha
(2)
Nicolás Serrano
(1)
Qihua Ou
(1)
Qinnan Zhang
(1)
Qirui Zhu
(1)
Queping Kong
(1)
Ruoyu Wu
(1)
Sen Yang
(1)
Shiqing Ma
(2)
Shuai Li
(1)
Shunfan Zhou
(2)
Shutian Yu
(1)
Siyuan Tang
(1)
Xiangyu Zhang
(2)
Xiaofeng Wang
(4)
XiaoFeng Wang
(4)
Xiaohan Zhang
(1)
Xiaojing Liao
(3)
Xin Zhang
(1)
Xing Han
(1)
Xueqiang Wang
(6)
Yanick Fratantonio
(1)
Yao Zhang
(1)
Yifan Zhang
(2)
Yixi Lin
(1)
Yousra Aafer
(1)
Yuan Zhang
(3)
Yue Xiao
(1)
Yue Xu
(1)
Yuhong Nan
(22)
Yuhui Hong
(1)
Yuliang Zhang
(1)
Yun Xiong
(1)
Yuqing Zhang
(2)
Yuxin Su
(1)
Z. Berkay Celik
(1)
Zelin Yang
(1)
Zeyu Lei
(1)
Zeyuan Chen
(1)
Zhaojie Hu
(1)
Zhaoxin Cai
(1)
Zhefan Chen
(1)
Zhemin Yang
(5)
Zhibo Zhang
(1)
Zhichen Liu
(1)
Zhiyun Qian
(1)
Zian Jia
(1)
Zibin Zheng
(3)
Zilong Lin
(1)
Zimin Lin
(1)
Zitong Yao
(1)
Ziye Zheng
(1)
Ziyi Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to