2000字范文,分享全网优秀范文,学习好帮手!
2000字范文 > 浙大计算机科学与技术专业课表 周亚金 - 浙江大学 - 计算机科学与技术

浙大计算机科学与技术专业课表 周亚金 - 浙江大学 - 计算机科学与技术

时间:2018-12-23 18:36:14

相关推荐

浙大计算机科学与技术专业课表 周亚金 - 浙江大学 - 计算机科学与技术

近期论文

查看导师最新文章

(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

[9]Different is Good:Detecting the Use of Uninitialized Variables through Differential Replay[Paper]

Mengchen Cao,Xiantong Hou,Tao Wang,Hunter Qu,Yajin Zhou,Xiaolong Bai,Fuwei Wang

Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS )

[8]LightBox:Full-stack Protected Stateful Middlebox at Lightning Speed[Paper]

Huayi Duan,Cong Wang,Xingliang Yuan,Yajin Zhou,Qian Wang,Kui Ren

Proceedings of the 26th ACM Conference on Computer and Communications(ACM CCS )

[7]Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum[Paper]

Zhen Cheng*,Xinrui Hou*,Runhuai Li,Yajin Zhou,Xiapu Luo,Jinku Li,Kui Ren

Proceedings of the 22nd International Symposium on Research in Attacks,Intrusions and Defenses(RAID )

(*The names of the first two authors are in alphabetical order)

[6]SPEED:Accelerating Enclave Applications via Secure Deduplication[Paper]

Helei Cui,Huayi Duan,Zhan Qin,Cong Wang,Yajin Zhou

Proceedings of the 39th IEEE International Conference on Distributed Computing Systems(IEEE ICDCS )

[5]Dating with Scambots:Understanding the Ecosystem of Fraudulent Dating Applications[Paper]

Yangyu Hu,Haoyu Wang,Yajin Zhou,Yao Guo,Li Li,Bingxuan Luo,Fangren Xu

IEEE Transactions on Dependable and Secure Computing(TDSC)

[4]Adaptive Call-site Sensitive Control Flow Integrity(Best Paper Award)[Paper|Code]

Mustakimur Khandaker,Abu Naser,Wenqing Liu,Zhi Wang,Yajin Zhou,Yueqiang Cheng

Proceedings of the 4th IEEE European Symposium on Security and Privacy(IEEE EuroS&P )

[3]NDroid:Towards Tracking Information Flows Across Multiple Android Contexts[Paper]

Lei Xue,Chenxiong Qian,Hao Zhou,Xiapu Luo,Yajin Zhou,Yuru Shao and Alvin T.S.Chan

IEEE Transactions on Information Forensics&Security(TIFS),Volume:14,Issue:3,pp.814–828,March

[2]Towards Privacy-Preserving Malware Detection Systems for Android(Best Paper Award)[Paper]

Helei Cui,Yajin Zhou,Cong Wang,Qi Li,Kui Ren

Proceedings of the 24th International Conference on Parallel and Distributed Systems(IEEE ICPADS )

[1]AdCapsule:Practical Confinement of Advertisements in Android Applications[Paper]

Xiaonan Zhu,Jinku Li,Yajin Zhou,Jianfeng Ma

IEEE Transactions on Dependable and Secure Computing(TDSC)

Before

[21]When Program Analysis Meets Mobile Security:An Industrial Study of Misusing Android Internet Sockets[Paper]

Wenqi Bu,Minhui Xue,Lihua Xu,Yajin Zhou,Zhushou Tang,Tao Xie

Proceedings of the 11th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering(ESEC/FSE )

[20]Malton:Towards On-Device Non-Invasive Mobile Malware Analysis for ART[Paper]

Lei Xue,Yajin Zhou,Ting Chen,Xiapu Luo,Guofei Gu

Proceedings of the 26th USENIX Security Symposium(USENIX Security )

[19]Design and Implementation of SecPod,A Framework for Virtualization-based Security Systems[Paper]

Xiaoguang Wang,Yong Qi,Zhi Wang,Yue Chen,Yajin Zhou

IEEE Transactions on Dependable and Secure Computing(TDSC)

[18]Blender:Self-randomizing Address Space Layout for Android Apps[Paper]

Mingshen Sun,John C.S.Lui,Yajin Zhou

Proceedings of the the 19th International Symposium on Research in Attacks,Intrusions and Defenses(RAID )

[17]AppShell:Making Data Protection Practical for Lost or Stolen Android Devices[Paper]

Yajin Zhou,Kapil Singh,Xuxian Jiang

Proceedings of IEEE/IFIP Network Operations and Management Symposium(NOMS )

[16]SecPod:a Framework for Virtualization-based Security Systems[Paper]

Xiaoguang Wang,Yue Chen,Zhi Wang,Yong Qi,Yajin Zhou

Proceedings of the USENIX Annual Technical Conference(USENIX ATC )

[15]Harvesting Developer Credentials in Android Apps[Paper]

Yajin Zhou,Lei Wu,Zhi Wang,Xuxian Jiang

Proceedings of the 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks(WiSec )

[14]Hybrid User-level Sandboxing of Third-party Android Apps[Paper]

Yajin Zhou,Kunal Patel,Lei Wu,Zhi Wang,Xuxian Jiang

Proceedings of the 10th ACM Symposium on Information,Computer and Communications Security(ASIACCS )

[13]ARMlock:Hardware-based Fault Isolation for ARM[Paper|Slides]

Yajin Zhou,Xiaoguang Wang,Yue Chen,Zhi Wang

Proceedings of the 21st ACM Conference on Computer and Communications Security(CCS )

[12]Owner-centric Protection of Unstructured Data on Smartphones[Paper]

Yajin Zhou,Kapil Singh,Xuxian Jiang

Proceedings of the 7th International Conference on Trust and Trustworthy Computing(TRUST )

[11]AirBag:Boosting Smartphone Resistance to Malware Infection[Paper]

Chiachih Wu,Yajin Zhou,Kunal Patel,Zhenkai Liang,Xuxian Jiang

Proceedings of the 21st Network and Distributed System Security Symposium(NDSS )

[10]DIVILAR:Diversifying Intermediate Language for Anti-Repackaging on Android Platform[Paper]

Wu Zhou,Zhi Wang,Yajin Zhou,Xuxian Jiang

Proceedings of the 4th ACM Conference on Data and Application Security and Privacy(CODASPY )

[9]The Impact of Vendor Customizations on Android Security[Paper]

Lei Wu,Michael Grace,Yajin Zhou,Chiachih Wu,Xuxian Jiang

Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS )

[8]Fast,Scalable Detection of'Piggybacked'Mobile Applications(Best Paper Award)[Paper]

Wu Zhou,Yajin Zhou,Michael Grace,Xuxian Jiang,Shihong Zou

Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy(CODASPY )

[7]Detecting Passive Content Leaks and Pollution in Android Applications[Paper|Slides]

Yajin Zhou,Xuxian Jiang

Proceedings of the 20th Network and Distributed System Security Symposium(NDSS )

[6]RiskRanker:Scalable and Accurate Zero-day Android Malware Detection[Paper]

Michael Grace*,Yajin Zhou*,Qiang Zhang,Shihong Zou,Xuxian Jiang

Proceedings of the 10th International Conference on Mobile Systems,Applications and Services(MobiSys )

(*The names of the first two authors are in alphabetical order)

[5]Dissecting Android Malware:Characterization and Evolution[Paper]

Yajin Zhou,Xuxian Jiang

Proceedings of the 33rd IEEE Symposium on Security and Privacy(Oakland )

(Our dataset is released atAndroid Malware Genome Project)

[4]DroidMOSS:Detecting Repackaged Smartphone Applications in Third-Party Android Marketplaces(Best Paper Award)[Paper]

Wu Zhou,Yajin Zhou,Xuxian Jiang,Peng Ning

Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy(CODASPY )

[3]Hey,You,Get off of My Market:Detecting Malicious Apps in Official and Alternative Android Markets[Paper]

Yajin Zhou,Zhi Wang,Wu Zhou and Xuxian Jiang

Proceedings of the 19th Network and Distributed System Security Symposium(NDSS )

[2]Systematic Detection of Capability Leaks in Stock Android Smartphones[Paper|Demo Video]

Michael Grace,Yajin Zhou,Zhi Wang and Xuxian Jiang

Proceedings of the 19th Network and Distributed System Security Symposium(NDSS )

[1]Taming Information-Stealing Smartphone Applications(on Android)[Paper]

Yajin Zhou,Xinwen Zhang,Xuxian Jiang,Vince W.Freeh

Proceedings of the 4th International Conference on Trust and Trustworthy Computing(TRUST )

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。