
Heng Yin
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j16]Fei He, Yuxuan Meng, Weiwei Tian, Xiyue Wang, Ling He, Heng Yin:
基于多延迟四阶累积量倍频程谱线的腭裂语音咽擦音自动检测算法 (Automatic Detection Algorithm of Pharyngeal Fricative in Cleft Palate Speech Based on Multi-delay Fourth-order Cumulant Octave Spectral Line). 计算机科学 47(1): 144-152 (2020) - [j15]Xinyi Liu, Weiwei Tian, Wenru Liang, Ling He, Heng Yin:
基于递归图分析的腭裂语音鼻漏气自动识别算法 (Automatic Detection Algorithm of Nasal Leak in Cleft Palate Speech Based on Recursive Plot Analysis). 计算机科学 47(2): 95-101 (2020) - [c63]Pan Zhang, Chengyu Song
, Heng Yin
, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c62]Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, Heng Yin
:
PatchScope: Memory Object Centric Patch Diffing. CCS 2020: 149-165 - [c61]Qiang Guan, Xunchao Hu, Terence Grove, Bo Fang, Hailong Jiang, Heng Yin
, Nathan DeBardeleben:
Chaser: An Enhanced Fault Injection Tool for Tracing Soft Errors in MPI Applications. DSN 2020: 355-363 - [c60]Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. NDSS 2020 - [c59]Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin
:
Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. SACMAT 2020: 25-32 - [c58]Yu Jiang, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin:
AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning. SecureComm (2) 2020: 242-253 - [i5]Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers. CoRR abs/2003.03100 (2020) - [i4]Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. CoRR abs/2010.10805 (2020) - [i3]Heng Yin, Hengwei Zhang, Jindong Wang, Ruiyu Dou:
Improving the Transferability of Adversarial Examples with the Adam Optimizer. CoRR abs/2012.00567 (2020)
2010 – 2019
- 2019
- [j14]Xiyue Wang
, Ming Tang, Sen Yang, Heng Yin, Hua Huang, Ling He
:
Automatic Hypernasality Detection in Cleft Palate Speech Using CNN. Circuits Syst. Signal Process. 38(8): 3521-3547 (2019) - [j13]Xiyue Wang
, Sen Yang, Ming Tang, Heng Yin, Hua Huang, Ling He:
HypernasalityNet: Deep recurrent neural network for automatic hypernasality detection. Int. J. Medical Informatics 129: 1-12 (2019) - [j12]Ling He, Xiyue Wang
, Jing Zhang, Qi Liu, Heng Yin, Margaret Lech:
Automatic detection of consonant omission in cleft palate speech. Int. J. Speech Technol. 22(1): 59-65 (2019) - [c57]Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan:
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. NDSS 2019 - [c56]Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15 - [c55]Ali Davanian, Zhenxiao Qi, Yu Qu, Heng Yin:
DECAF++: Elastic Whole-System Dynamic Taint Analysis. RAID 2019: 31-45 - [c54]Yue Duan, Lian Gao, Jie Hu, Heng Yin:
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. RAID 2019: 277-292 - [c53]Xunchao Hu, Brian Testa, Heng Yin
:
ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation. SecureComm (1) 2019: 191-213 - [c52]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - 2018
- [j11]Ling He, Jing Zhang, Qi Liu, Junpeng Zhang, Heng Yin, Margaret Lech:
Automatic detection of glottal stop in cleft palate speech. Biomed. Signal Process. Control. 39: 230-236 (2018) - [j10]Bo Qin
, Luyang Zhang
, Heng Yin
, Yan Qin
:
Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill. J. Control. Sci. Eng. 2018: 3041591:1-3041591:11 (2018) - [c51]Wei Song, Heng Yin
, Chang Liu, Dawn Song:
DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis. CCS 2018: 606-618 - [c50]Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS 2018 - [c49]Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, Heng Yin:
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. NDSS 2018 - [c48]Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos
, Zhiyun Qian
, Heng Yin
:
RARE: A Systematic Augmented Router Emulation for Malware Analysis. PAM 2018: 60-72 - 2017
- [j9]Xudong He, Zhijiang Dong, Heng Yin
, Yujian Fu:
A Framework for Developing Cyber-Physical Systems. Int. J. Softw. Eng. Knowl. Eng. 27(9-10): 1361-1386 (2017) - [j8]Andrew Henderson, Lok-Kwong Yan, Xunchao Hu, Aravind Prakash, Heng Yin
, Stephen McCamant:
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform. IEEE Trans. Software Eng. 43(2): 164-184 (2017) - [c47]Qian Feng, Minghua Wang, Mu Zhang, Rundong Zhou, Andrew Henderson, Heng Yin
:
Extracting Conditional Formulas for Cross-Platform Bug Search. AsiaCCS 2017: 346-359 - [c46]Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin
, Le Song, Dawn Song:
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. CCS 2017: 363-376 - [c45]David Korczynski, Heng Yin
:
Capturing Malware Propagations with Code Injections and Code-Reuse Attacks. CCS 2017: 1691-1708 - [c44]Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, Heng Yin:
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. NDSS 2017 - [c43]Andrew Henderson, Heng Yin
, Guang Jin, Hao Han, Hongmei Deng:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. RAID 2017: 3-25 - [c42]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin
:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. SecureComm 2017: 704-720 - [c41]Xudong He, Zhijiang Dong, Heng Yin
, Yujian Fu:
A Framework for Developing Cyber Physical Systems. SEKE 2017: 236-241 - [i2]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. CoRR abs/1701.07860 (2017) - [i1]Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song:
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection. CoRR abs/1708.06525 (2017) - 2016
- [b2]Mu Zhang, Heng Yin:
Android Application Security - A Semantics and Context-Aware Approach. Springer Briefs in Computer Science, Springer 2016, ISBN 978-3-319-47811-1, pp. 1-105 - [c40]Qian Feng, Aravind Prakash, Minghua Wang, Curtis Carmony, Heng Yin
:
ORIGEN: Automatic Extraction of Offset-Revealing Instructions for Cross-Version Memory Analysis. AsiaCCS 2016: 11-22 - [c39]Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, Heng Yin
:
Scalable Graph-based Bug Search for Firmware Images. CCS 2016: 480-491 - [c38]Yin Liu, Xiyue Wang, Yipeng Hang, Ling He, Heng Yin, Chuxian Liu:
Hypemasality detection in cleft palate speech based on natural computation. ICNC-FSKD 2016: 523-528 - [c37]Curtis Carmony, Xunchao Hu, Heng Yin, Abhishek Vasisht Bhaskar, Mu Zhang:
Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. NDSS 2016 - [c36]Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
:
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. RAID 2016: 254-276 - 2015
- [j7]Ling He, Jing Zhang, Qi Liu, Heng Yin, Margaret Lech, Yunzhi Huang:
Automatic Evaluation of Hypernasality Based on a Cleft Palate Speech Database. J. Medical Syst. 39(5): 61 (2015) - [j6]Aravind Prakash, Eknath Venkataramani
, Heng Yin
, Zhiqiang Lin:
On the Trustworthiness of Memory Analysis - An Empirical Study from the Perspective of Binary Execution. IEEE Trans. Dependable Secur. Comput. 12(5): 557-570 (2015) - [c35]Aravind Prakash, Heng Yin
:
Defeating ROP Through Denial of Stack Pivot. ACSAC 2015: 111-120 - [c34]Minghua Wang, Heng Yin
, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng:
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. ACSAC 2015: 331-340 - [c33]Mu Zhang, Yue Duan, Qian Feng, Heng Yin
:
Towards Automatic Generation of Security-Centric Descriptions for Android Apps. CCS 2015: 518-529 - [c32]Ling He, Jie Tan, HuaQing Hao, Ming Tang, Heng Yin, Margaret Lech:
Automatic evaluation of resonance and articulation disorders in cleft palate speech. ChinaSIP 2015: 358-362 - [c31]Yue Duan, Mu Zhang, Heng Yin, Yuzhe Tang:
Privacy-Preserving Offloading of Mobile App to the Public Cloud. HotCloud 2015 - [c30]Kaijun Xu, Heng Yin, Long Zhang, Yang Xu:
Game Theory with Probabilistic Prediction for Conflict Resolution in Air Traffic Management. ISKE 2015: 94-98 - [c29]Long Zhang, Kaijun Xu, Heng Yin, Yang Xu:
Flight Operation Quality Assessment Model Based on the Fuzzy Logic Theory. ISKE 2015: 99-103 - [c28]Aravind Prakash, Xunchao Hu, Heng Yin:
vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. NDSS 2015 - 2014
- [j5]Ling He, Jing Zhang, Qi Liu, Heng Yin, Margaret Lech:
Automatic Evaluation of Hypernasality and Consonant Misarticulation in Cleft Palate Speech. IEEE Signal Process. Lett. 21(10): 1298-1301 (2014) - [j4]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin
:
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting. IEEE Trans. Cloud Comput. 2(4): 380-394 (2014) - [c27]Qian Feng, Aravind Prakash, Heng Yin
, Zhiqiang Lin:
MACE: high-coverage and robust memory analysis for commodity operating systems. ACSAC 2014: 196-205 - [c26]Xing Jin, Xuchao Hu, Kailiang Ying, Wenliang Du, Heng Yin
, Gautam Nagesh Peri:
Code Injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation. CCS 2014: 66-77 - [c25]Mu Zhang, Heng Yin
:
Efficient, context-aware privacy leakage confinement for android applications without firmware modding. AsiaCCS 2014: 259-270 - [c24]Mu Zhang, Yue Duan, Heng Yin
, Zhiruo Zhao:
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. CCS 2014: 1105-1116 - [c23]Andrew Henderson, Aravind Prakash, Lok-Kwong Yan, Xunchao Hu, Xujiewen Wang, Rundong Zhou, Heng Yin
:
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform. ISSTA 2014: 248-258 - [c22]Mu Zhang, Heng Yin:
AppSealer: Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications. NDSS 2014 - [c21]Xiaolei Li, Guangdong Bai, Benjamin Thian, Zhenkai Liang
, Heng Yin
:
A Light-Weight Software Environment for Confining Android Malware. SERE (Companion) 2014: 158-167 - 2013
- [b1]Heng Yin, Dawn Song:
Automatic Malware Analysis - An Emulator Based Approach. Springer Briefs in Computer Science, Springer 2013, ISBN 978-1-4614-5522-6, pp. i-ix, 1-73 - [c20]Aravind Prakash, Heng Yin
, Zhenkai Liang
:
Enforcing system-wide control flow integrity for exploit detection and diagnosis. AsiaCCS 2013: 311-322 - [c19]Aravind Prakash, Eknath Venkataramani
, Heng Yin
, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. DSN 2013: 1-12 - [c18]Xiaolei Li, Guangdong Bai, Zhenkai Liang
, Heng Yin
:
A Software Environment for Confining Malicious Android Applications via Resource Virtualization. ICECCS 2013: 208-211 - [c17]Mu Zhang, Heng Yin:
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications. NDSS 2013 - [c16]Yousra Aafer, Wenliang Du, Heng Yin
:
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. SecureComm 2013: 86-103 - 2012
- [c15]Yufei Gu, Yangchun Fu, Aravind Prakash, Zhiqiang Lin, Heng Yin
:
OS-Sommelier: memory-only operating system fingerprinting in the cloud. SoCC 2012: 5 - [c14]Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin:
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. NDSS 2012 - [c13]Mingwei Zhang, Aravind Prakash, Xiaolei Li, Zhenkai Liang, Heng Yin:
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. NDSS 2012 - [c12]Lok-Kwong Yan, Heng Yin:
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. USENIX Security Symposium 2012: 569-584 - [c11]Lok-Kwong Yan, Manjukumar Jayachandra, Mu Zhang, Heng Yin
:
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis. VEE 2012: 227-238 - 2011
- [c10]Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin
:
Attacks on WebView in the Android system. ACSAC 2011: 343-352 - 2010
- [j3]Heng Yin
, Bo Sheng
, Haining Wang, Jianping Pan:
Keychain-Based Signatures for Securing BGP. IEEE J. Sel. Areas Commun. 28(8): 1308-1318 (2010) - [c9]Heng Yin
, Pongsin Poosankam, Steve Hanna, Dawn Xiaodong Song:
HookScout: Proactive Binary-Centric Hook Detection. DIMVA 2010: 1-20
2000 – 2009
- 2008
- [j2]Mengjun Xie, Heng Yin
, Haining Wang:
Thwarting E-mail Spam Laundering. ACM Trans. Inf. Syst. Secur. 12(2): 13:1-13:32 (2008) - [c8]Dawn Xiaodong Song, David Brumley, Heng Yin
, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang
, James Newsome, Pongsin Poosankam, Prateek Saxena:
BitBlaze: A New Approach to Computer Security via Binary Analysis. ICISS 2008: 1-25 - [c7]Heng Yin, Zhenkai Liang, Dawn Song:
HookFinder: Identifying and Understanding Malware Hooking Behaviors. NDSS 2008 - [p1]David Brumley, Cody Hartwig, Zhenkai Liang, James Newsome, Dawn Xiaodong Song, Heng Yin
:
Automatically Identifying Trigger-based Behavior in Malware. Botnet Detection 2008: 65-88 - 2007
- [j1]Heng Yin, Haining Wang:
Building an application-aware IPsec policy system. IEEE/ACM Trans. Netw. 15(6): 1502-1513 (2007) - [c6]Heng Yin
, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis. CCS 2007: 116-127 - [c5]Juan Caballero, Heng Yin
, Zhenkai Liang
, Dawn Xiaodong Song:
Polyglot: automatic extraction of protocol message format using dynamic binary analysis. CCS 2007: 317-329 - [c4]Heng Yin
, Bo Sheng, Haining Wang, Jianping Pan:
Securing BGP through Keychain-based Signatures. IWQoS 2007: 154-163 - [c3]Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, Dawn Xiaodong Song:
Dynamic Spyware Analysis. USENIX Annual Technical Conference 2007: 233-246 - 2006
- [c2]Mengjun Xie, Heng Yin
, Haining Wang:
An effective defense against email spam laundering. CCS 2006: 179-190 - 2005
- [c1]Heng Yin, Haining Wang:
Building an Application-aware IPsec Policy System. USENIX Security Symposium 2005
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-14 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint