USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Zhemin Yang [Clear All Filters]
Notice the Imposter! A Study on User Tag Spoofing Attack in Mobile Apps. 32nd USENIX Security Symposium (USENIX Security 23). :5485--5501.
.
2023. Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity Analysis. 31st USENIX Security Symposium (USENIX Security 22). :3989--4006.
.
2022. Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. 31st USENIX Security Symposium (USENIX Security 22). :4365--4382.
.
2022. BScout: Direct Whole Patch Presence Test for Java Executables. 29th USENIX Security Symposium (USENIX Security 20). :1147--1164.
.
2020. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. 29th USENIX Security Symposium (USENIX Security 20). :2793--2810.
.
2020. An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses in Ethereum Ecosystem. 29th USENIX Security Symposium (USENIX Security 20). :2793--2810.
.
2020. Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent. 29th USENIX Security Symposium (USENIX Security 20). :1641--1658.
.
2020. An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications. 27th USENIX Security Symposium (USENIX Security 18). :1183--1198.
.
2018. UIPicker: User-Input Privacy Identification in Mobile Applications. 24th USENIX Security Symposium (USENIX Security 15). :993--1008.
.
2015. ORDER: Object centRic DEterministic Replay for Java. 2011 USENIX Annual Technical Conference (USENIX ATC 11).
.
2011.