Follow
Yapeng Ye
Title
Cited by
Cited by
Year
NetPlier: Probabilistic Network Protocol Reverse Engineering from Message Traces
Y Ye, Z Zhang, F Wang, X Zhang, D Xu
2021 Annual Network and Distributed System Security Symposium (NDSS), 2021
502021
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
412021
Fvrc2016: The 2nd finger vein recognition competition
Y Ye, L Ni, H Zheng, S Liu, Y Zhu, D Zhang, W Xiang, W Li
2016 International Conference on Biometrics (ICB), 1-6, 2016
152016
Effects of meteorological factors on finger vein recognition
Z He, Q Xu, Y Ye, W Li
2017 IEEE International Conference on Identity, Security and Behavior …, 2017
122017
A Study on the Individuality of Finger Vein Based on Statistical Analysis
Y Ye, H Zheng, L Ni, S Liu, W Li
2016 International Conference on Biometrics (ICB), 1-5, 2016
122016
Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, and Xiangyu Zhang. 2023
X Xu, S Feng, Y Ye, G Shen
Improving Binary Code Similarity Transformer Models by Semantics-Driven …, 2023
92023
Lmpa: Improving decompilation by synergy of large language model and program analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
82023
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
Y Ye, Z Zhang, Q Shi, Y Aafer, X Zhang
2023 IEEE Symposium on Security and Privacy (SP), 2391-2408, 2023
62023
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
Parameter adjustment of finger vein recognition algorithms
H Zheng, Y Ye, S Liu, L Ni, Z Yi, H Huang, W Li
2017 IEEE International Conference on Identity, Security and Behavior …, 2017
52017
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications
Q Shi, J Shao, Y Ye, M Zheng, X Zhang
arXiv preprint arXiv:2305.11781, 2023
32023
Pelican: Exploiting backdoors of naturally trained deep learning models in binary code analysis
Z Zhang, G Tao, G Shen, S An, Q Xu, Y Liu, Y Ye, Y Wu, X Zhang
USENIX Security Symposium, 2023, 2023
32023
Which finger is the best for finger vein recognition?
H Zheng, Y Ye, L Ni, S Liu, W Li
2016 IEEE 8th International Conference on Biometrics Theory, Applications …, 2016
32016
Codeart: Better code models by attention regularization when symbols are lacking
Z Su, X Xu, Z Huang, Z Zhang, Y Ye, J Huang, X Zhang
Proceedings of the ACM on Software Engineering 1 (FSE), 562-585, 2024
22024
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation
S Feng, Y Ye, Q Shi, Z Cheng, X Xu, S Cheng, H Choi, X Zhang
arXiv preprint arXiv:2409.07774, 2024
12024
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Leveraging Generative Models to Recover Variable Names from Stripped Binary
X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye, N Jiang, D Xie, S Cheng, ...
arXiv preprint arXiv:2306.02546, 2023
12023
FuzzInMem: Fuzzing Programs via In-memory Structures
X Liu, W You, Y Ye, Z Zhang, J Huang, X Zhang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
2024
Cost-effective Attack Forensics by Recording and Correlating File System Changes
L Yu, Y Ye, Z Zhang, X Zhang
33rd USENIX Security Symposium (USENIX Security 24), 1705-1722, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–19