Follow
Le Yu
Le Yu
Nanjing University of Posts and Telecommunications, School of Computer Science
Verified email at polyu.edu.hk
Title
Cited by
Cited by
Year
Can We Trust the Privacy Policies of Android Apps?
L Yu, X Luo, X Liu, T Zhang
46th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2016
1322016
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
Proceedings of the 39th International Conference on Software Engineering …, 2017
972017
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
M Fan, L Yu, S Chen, H Zhou, X Luo, S Li, Y Liu, J Liu, T Liu
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
792020
Enhancing the description-to-behavior fidelity in android apps with privacy policy
L Yu, X Luo, C Qian, S Wang, HKN Leung
IEEE Transactions on Software Engineering 44 (9), 834-854, 2018
732018
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
L Yu, T Zhang, X Luo, L Xue
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
712015
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies
L Yu, X Luo, J Chen, H Zhou, T Zhang, H Chang, HKN Leung
IEEE Transactions on Software Engineering, 2021
602021
Toward Automatically Generating Privacy Policy for Android Apps
L Yu, T Zhang, X Luo, L Xue, H Chang
IEEE Transactions on Information Forensics and Security 12 (4), 2017
592017
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Yu, G Gu
IEEE Micro 35 (1), 44-53, 2015
552015
Structural Attack against Graph Based Android Malware Detection
K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
472021
Revisiting the Description-to-Behavior Fidelity in Android Applications
L Yu, X Luo, C Qian, S Wang
23rd International Conference on Software Analysis, Evolution, and …, 2016
402016
Packergrind: An adaptive unpacking system for android apps
L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, X Ma
IEEE Transactions on Software Engineering 48 (2), 551-570, 2020
312020
Stan: Towards describing bytecodes of smart contract
X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
232020
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification
H Zhang, L Yu, X Xiao, Q Li, F Mercaldo, X Luo, Q Liu
Proceedings of the ACM Web Conference 2023, 2066-2075, 2023
192023
{SAID}: State-aware Defense Against Injection Attacks on In-vehicle Network
L Xue, Y Liu, T Li, K Zhao, J Li, L Yu, X Luo, Y Zhou, G Gu
31st USENIX Security Symposium (USENIX Security 22), 1921-1938, 2022
152022
Towards automatically reverse engineering vehicle diagnostic protocols
L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ...
31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022
142022
Localizing Function Errors in Mobile Apps with User Reviews
L Yu, J Chen, H Zhou, X Luo, K Liu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
142018
Is what you measure what you expect? factors affecting smartphone-based mobile network measurement
L Xue, X Ma, X Luo, L Yu, S Wang, T Chen
INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017
132017
Android malware detection: A survey
M Fan, T Liu, J Liu, X Luo, L Yu, X Guan
Scientia Sinica Informationis 50 (8), 1148-1177, 2020
122020
Characterizing mobile*-box applications
X Luo, H Zhou, L Yu, L Xue, Y Xie
Computer Networks 103, 228-239, 2016
122016
Ui obfuscation and its effects on automated ui analysis for android apps
H Zhou, T Chen, H Wang, L Yu, X Luo, T Wang, W Zhang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20