Follow
Yuping Li
Title
Cited by
Cited by
Year
Deep ground truth analysis of current android malware
F Wei, Y Li, S Roy, X Ou, W Zhou
Detection of Intrusions and Malware, and Vulnerability Assessment: 14th …, 2017
5042017
Experimental study with real-world data for android app security analysis using machine learning
S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ...
Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015
1042015
Android malware clustering through malicious payload mining
Y Li, J Jang, X Hu, X Ou
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
1002017
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th workshop on cyber security experimentation and test (cset 15), 2015
962015
Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
2018 Network and Distributed System Security Symposium (NDSS'18), 2018
272018
Topology-aware hashing for effective control flow graph similarity analysis
Y Li, J Jang, X Ou
Security and Privacy in Communication Networks: 15th EAI International …, 2019
82019
The system can't perform the operation now. Try again later.
Articles 1–6