default search action
Lingyun Ying
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Xiaofan Li, Yacong Gu, Chu Qiao, Zhenkai Zhang, Daiping Liu, Lingyun Ying, Haixin Duan, Xing Gao:
Toward Understanding the Security of Plugins in Continuous Integration Services. CCS 2024: 482-496 - [c29]Zidong Zhang, Qinsheng Hou, Lingyun Ying, Wenrui Diao, Yacong Gu, Rui Li, Shanqing Guo, Haixin Duan:
MiniCAT: Understanding and Detecting Cross-Page Request Forgery Vulnerabilities in Mini-Programs. CCS 2024: 525-539 - [c28]Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. CCS 2024: 4539-4553 - [c27]Zhuo Yan, Haipeng Qu, Lingyun Ying, Ke Liu, Q. Chao:
Enhanced Fast and Reliable Statistical Vulnerability Root Cause Analysis with Sanitizer. ICST 2024: 47-58 - [c26]Yacong Gu, Lingyun Ying, Huajun Chai, Yingyuan Pu, Haixin Duan, Xing Gao:
More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services. SP 2024: 1179-1197 - [c25]Xiaoyin Liu, Wenzhi Li, Qinsheng Hou, Shishuai Yang, Lingyun Ying, Wenrui Diao, Yanan Li, Shanqing Guo, Haixin Duan:
From Promises to Practice: Evaluating the Private Browsing Modes of Android Browser Apps. WWW 2024: 1561-1572 - [i3]Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. CoRR abs/2406.04027 (2024) - 2023
- [j3]Wang Yang, Mingzhe Gao, Ligeng Chen, Zhengxuan Liu, Lingyun Ying:
RecMaL: Rectify the malware family label via hybrid analysis. Comput. Secur. 128: 103177 (2023) - [j2]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Chenglin Mao, Lingyun Ying, Song Liu, Xiaofeng Liu, Yuanzhi Li, Shanqing Guo, Meining Nie, Haixin Duan:
Can We Trust the Phone Vendors? Comprehensive Security Measurements on the Android Firmware Ecosystem. IEEE Trans. Software Eng. 49(7): 3901-3921 (2023) - [c24]Fenglu Zhang, Yunyi Zhang, Baojun Liu, Eihal Alowaisheq, Lingyun Ying, Xiang Li, Zaifeng Zhang, Ying Liu, Haixin Duan, Min Zhang:
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services. IMC 2023: 188-197 - [c23]Yacong Gu, Lingyun Ying, Huajun Chai, Chu Qiao, Haixin Duan, Xing Gao:
Continuous Intrusion: Characterizing the Security of Continuous Integration Services. SP 2023: 1561-1577 - [c22]Yacong Gu, Lingyun Ying, Yingyuan Pu, Xiao Hu, Huajun Chai, Ruimin Wang, Xing Gao, Haixin Duan:
Investigating Package Related Security Threats in Software Registries. SP 2023: 1578-1595 - [i2]Xiaoqi Song, Wenjie Lv, Haipeng Qu, Lingyun Ying:
LoadLord: Loading on the Fly to Defend Against Code-Reuse Attacks. CoRR abs/2303.12612 (2023) - 2022
- [c21]Jia Yan, Ming Wan, Xiangkun Jia, Lingyun Ying, Purui Su, Zhanyi Wang:
DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection. ACSAC 2022: 227-239 - [c20]Zhaojia Lai, Haipeng Qu, Lingyun Ying:
A Composite Discover Method for Gadget Chains in Java Deserialization Vulnerability. QuASoQ/SEED@APSEC 2022: 10-17 - [c19]Huajun Chai, Lingyun Ying, Haixin Duan, Daren Zha:
Invoke-Deobfuscation: AST-Based and Semantics-Preserving Deobfuscation for PowerShell Scripts. DSN 2022: 295-306 - [c18]Qinsheng Hou, Wenrui Diao, Yanhao Wang, Xiaofeng Liu, Song Liu, Lingyun Ying, Shanqing Guo, Yuanzhi Li, Meining Nie, Haixin Duan:
Large-scale Security Measurements on the Android Firmware Ecosystem. ICSE 2022: 1257-1268 - [c17]Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. MILCOM 2022: 458-463 - [c16]Jia Yan, Xiangkun Jia, Lingyun Ying, Purui Su:
Understanding and Mitigating Label Bias in Malware Classification: An Empirical Study. QRS 2022: 492-503 - [i1]Jiawei Xu, Wenxuan Fu, Haoyu Bu, Zhi Wang, Lingyun Ying:
SeqNet: An Efficient Neural Network for Automatic Malware Detection. CoRR abs/2205.03850 (2022) - 2020
- [c15]Qinsheng Hou, Yao Cheng, Lingyun Ying:
NativeX: Native Executioner Freezes Android. AsiaCCS 2020: 458-470
2010 – 2019
- 2017
- [j1]Yao Cheng, Yingjiu Li, Robert H. Deng, Lingyun Ying, Wei He:
A study on a feasible no-root approach on Android. J. Comput. Secur. 25(3): 231-253 (2017) - [c14]Yacong Gu, Kun Sun, Purui Su, Qi Li, Yemian Lu, Lingyun Ying, Dengguo Feng:
JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android. DSN 2017: 427-438 - 2016
- [c13]Lingyun Ying, Yao Cheng, Yemian Lu, Yacong Gu, Purui Su, Dengguo Feng:
Attacks and Defence on Android Free Floating Windows. AsiaCCS 2016: 759-770 - [c12]Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li, Purui Su:
Exploiting Android System Services Through Bypassing Service Helpers. SecureComm 2016: 44-62 - 2015
- [c11]Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng:
A Rapid and Scalable Method for Android Application Repackaging Detection. ISPEC 2015: 349-364 - [c10]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - 2014
- [c9]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Qi Li, Hui Kong, Dengguo Feng:
Revisiting Node Injection of P2P Botnet. NSS 2014: 124-137 - [c8]Yao Cheng, Chang Xu, Yi Yang, Lingyun Ying, Purui Su, Dengguo Feng:
Automated User Profiling in Location-Based Mobile Messaging Applications. TrustCom 2014: 18-26 - [c7]Jia Yan, Lingyun Ying, Yi Yang, Purui Su, Dengguo Feng:
Long Term Tracking and Characterization of P2P Botnet. TrustCom 2014: 244-251 - 2013
- [c6]Yao Cheng, Lingyun Ying, Sibei Jiao, Purui Su, Dengguo Feng:
Bind your phone number with caution: automated user profiling through address book matching on smartphone. AsiaCCS 2013: 335-340 - [c5]Liang He, Dengguo Feng, Purui Su, Lingyun Ying, Yi Yang, Huafeng Huang, Huipeng Fang:
OSNGuard: Detecting Worms with User Interaction Traces in Online Social Networks. ICICS 2013: 59-74 - [c4]Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - 2010
- [c3]Yi Yang, Lingyun Ying, Rui Wang, Purui Su, Dengguo Feng:
DepSim: A Dependency-Based Malware Similarity Comparison System. Inscrypt 2010: 503-522
2000 – 2009
- 2009
- [c2]Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang, Yu Liu:
ReconBin: Reconstructing Binary File from Execution for Software Analysis. SSIRI 2009: 222-229 - 2008
- [c1]Purui Su, Lingyun Ying, Dengguo Feng:
Exploring Malware Behaviors Based on Environment Constitution. CIS (1) 2008: 320-325
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint