NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces Y Ye, Z Zhang, F Wang, X Zhang, D Xu 2021 Annual Network and Distributed System Security Symposium (NDSS), 2021 | 50 | 2021 |
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang 2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021 | 41 | 2021 |
Fvrc2016: The 2nd finger vein recognition competition Y Ye, L Ni, H Zheng, S Liu, Y Zhu, D Zhang, W Xiang, W Li 2016 International Conference on Biometrics (ICB), 1-6, 2016 | 15 | 2016 |
Effects of meteorological factors on finger vein recognition Z He, Q Xu, Y Ye, W Li 2017 IEEE International Conference on Identity, Security and Behavior …, 2017 | 12 | 2017 |
A Study on the Individuality of Finger Vein Based on Statistical Analysis Y Ye, H Zheng, L Ni, S Liu, W Li 2016 International Conference on Biometrics (ICB), 1-5, 2016 | 12 | 2016 |
Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, and Xiangyu Zhang. 2023 X Xu, S Feng, Y Ye, G Shen Improving Binary Code Similarity Transformer Models by Semantics-Driven …, 2023 | 9 | 2023 |
Lmpa: Improving decompilation by synergy of large language model and program analysis X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang arXiv preprint arXiv:2306.02546, 2023 | 8 | 2023 |
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling Y Ye, Z Zhang, Q Shi, Y Aafer, X Zhang 2023 IEEE Symposium on Security and Privacy (SP), 2391-2408, 2023 | 6 | 2023 |
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ... Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |
Parameter adjustment of finger vein recognition algorithms H Zheng, Y Ye, S Liu, L Ni, Z Yi, H Huang, W Li 2017 IEEE International Conference on Identity, Security and Behavior …, 2017 | 5 | 2017 |
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications Q Shi, J Shao, Y Ye, M Zheng, X Zhang arXiv preprint arXiv:2305.11781, 2023 | 3 | 2023 |
Pelican: Exploiting backdoors of naturally trained deep learning models in binary code analysis Z Zhang, G Tao, G Shen, S An, Q Xu, Y Liu, Y Ye, Y Wu, X Zhang USENIX Security Symposium, 2023, 2023 | 3 | 2023 |
Which finger is the best for finger vein recognition? H Zheng, Y Ye, L Ni, S Liu, W Li 2016 IEEE 8th International Conference on Biometrics Theory, Applications …, 2016 | 3 | 2016 |
Codeart: Better code models by attention regularization when symbols are lacking Z Su, X Xu, Z Huang, Z Zhang, Y Ye, J Huang, X Zhang Proceedings of the ACM on Software Engineering 1 (FSE), 562-585, 2024 | 2 | 2024 |
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation S Feng, Y Ye, Q Shi, Z Cheng, X Xu, S Cheng, H Choi, X Zhang arXiv preprint arXiv:2409.07774, 2024 | 1 | 2024 |
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 1 | 2023 |
Leveraging Generative Models to Recover Variable Names from Stripped Binary X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye, N Jiang, D Xie, S Cheng, ... arXiv preprint arXiv:2306.02546, 2023 | 1 | 2023 |
FuzzInMem: Fuzzing Programs via In-memory Structures X Liu, W You, Y Ye, Z Zhang, J Huang, X Zhang Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | | 2024 |
Cost-effective Attack Forensics by Recording and Correlating File System Changes L Yu, Y Ye, Z Zhang, X Zhang 33rd USENIX Security Symposium (USENIX Security 24), 1705-1722, 2024 | | 2024 |