Follow
Yi Chen
Yi Chen
Assistant Professor, The University of Hong Kong
Verified email at hku.hk - Homepage
Title
Cited by
Cited by
Year
Following devil's footprints: Cross-platform analysis of potentially harmful libraries on android and ios
K Chen, X Wang, Y Chen, P Wang, Y Lee, XF Wang, B Ma, A Wang, ...
2016 IEEE Symposium on Security and Privacy (SP), 357-376, 2016
1412016
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
672019
Bookworm game: Automatic discovery of lte vulnerabilities through documentation analysis
Y Chen, Y Yao, XF Wang, D Xu, C Yue, X Liu, K Chen, H Tang, B Liu
2021 IEEE Symposium on Security and Privacy (SP), 1197-1214, 2021
502021
Demystifying hidden privacy settings in mobile apps
Y Chen, M Zha, N Zhang, D Xu, Q Zhao, X Feng, K Yuan, F Suya, Y Tian, ...
2019 IEEE Symposium on Security and Privacy (SP), 570-586, 2019
462019
Devils in the guidance: predicting logic vulnerabilities in payment syndication services through automated documentation analysis
Y Chen, L Xing, Y Qin, X Liao, XF Wang, K Chen, W Zou
28th USENIX Security Symposium (USENIX Security 19), 747-764, 2019
442019
Mass discovery of android traffic imprints through instantiated partial execution
Y Chen, W You, Y Lee, K Chen, XF Wang, W Zou
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
312017
Seeing the forest for the trees: Understanding security hazards in the {3GPP} ecosystem through intelligent analysis on change requests
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao
31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022
162022
Practical and efficient in-enclave verification of privacy compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
122021
Android on pc: On the security of end-user android emulators
F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
82021
Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, B Liu
32nd USENIX Security Symposium (USENIX Security 23), 3529-3545, 2023
62023
Racing on the Negative Force: Efficient Vulnerability {Root-Cause} Analysis through Reinforcement Learning on Counterexamples
D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li
33rd USENIX Security Symposium (USENIX Security 24), 4229-4246, 2024
12024
Confidential attestation: Efficient in-enclave verification of privacy policy compliance
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
12020
LLM-Enhanced Software Patch Localization
J Yu, Y Chen, D Tang, X Liu, XF Wang, C Wu, H Tang
arXiv preprint arXiv:2409.06816, 2024
2024
Stealthy Peers: Understanding Security and Privacy Risks of Peer-Assisted Video Streaming
S Tang, E Alowaisheq, X Mi, Y Chen, XF Wang, Y Dou
2024 54th Annual IEEE/IFIP International Conference on Dependable Systems …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–14