Le Yu
Le Yu
Nanjing University of Posts and Telecommunications, School of Computer Science
Verified email at
Cited by
Cited by
Can We Trust the Privacy Policies of Android Apps?
L Yu, X Luo, X Liu, T Zhang
46th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2016
Adaptive unpacking of Android apps
L Xue, X Luo, L Yu, S Wang, D Wu
Proceedings of the 39th International Conference on Software Engineering …, 2017
Enhancing the description-to-behavior fidelity in android apps with privacy policy
L Yu, X Luo, C Qian, S Wang, HKN Leung
IEEE Transactions on Software Engineering 44 (9), 834-854, 2018
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications
L Yu, T Zhang, X Luo, L Xue
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
M Fan, L Yu, S Chen, H Zhou, X Luo, S Li, Y Liu, J Liu, T Liu
2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020
Toward Automatically Generating Privacy Policy for Android Apps
L Yu, T Zhang, X Luo, L Xue, H Chang
IEEE Transactions on Information Forensics and Security 12 (4), 2017
Vulhunter: toward discovering vulnerabilities in android applications
C Qian, X Luo, Y Yu, G Gu
IEEE Micro 35 (1), 44-53, 2015
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies
L Yu, X Luo, J Chen, H Zhou, T Zhang, H Chang, HKN Leung
IEEE Transactions on Software Engineering, 2021
Structural Attack against Graph Based Android Malware Detection
K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Revisiting the Description-to-Behavior Fidelity in Android Applications
L Yu, X Luo, C Qian, S Wang
23rd International Conference on Software Analysis, Evolution, and …, 2016
Packergrind: An adaptive unpacking system for android apps
L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, X Ma
IEEE Transactions on Software Engineering 48 (2), 551-570, 2020
Stan: Towards describing bytecodes of smart contract
X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu
2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020
Localizing Function Errors in Mobile Apps with User Reviews
L Yu, J Chen, H Zhou, X Luo, K Liu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Is what you measure what you expect? factors affecting smartphone-based mobile network measurement
L Xue, X Ma, X Luo, L Yu, S Wang, T Chen
INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017
{SAID}: State-aware Defense Against Injection Attacks on In-vehicle Network
L Xue, Y Liu, T Li, K Zhao, J Li, L Yu, X Luo, Y Zhou, G Gu
31st USENIX Security Symposium (USENIX Security 22), 1921-1938, 2022
Towards automatically reverse engineering vehicle diagnostic protocols
L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ...
31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022
Android malware detection: A survey
M Fan, T Liu, J Liu, X Luo, L Yu, X Guan
Scientia Sinica Informationis 50 (8), 1148-1177, 2020
Characterizing mobile*-box applications
X Luo, H Zhou, L Yu, L Xue, Y Xie
Computer Networks 103, 228-239, 2016
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification
H Zhang, L Yu, X Xiao, Q Li, F Mercaldo, X Luo, Q Liu
Proceedings of the ACM Web Conference 2023, 2066-2075, 2023
Ui obfuscation and its effects on automated ui analysis for android apps
H Zhou, T Chen, H Wang, L Yu, X Luo, T Wang, W Zhang
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20