Yuping Li
Cited by
Cited by
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
International conference on detection of intrusions and malware, and …, 2017
Experimental study with real-world data for android app security analysis using machine learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th workshop on cyber security experimentation and test (cset 15), 2015
Android malware clustering through malicious payload mining
Y Li, J Jang, X Hu, X Ou
International symposium on research in attacks, intrusions, and defenses …, 2017
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
Topology-aware hashing for effective control flow graph similarity analysis
Y Li, J Jang, X Ou
International Conference on Security and Privacy in Communication Systems …, 2019
The system can't perform the operation now. Try again later.
Articles 1–6