default search action
Yan Lin 0003
Person information
- affiliation: Jinan University, College of Cyber Security, Guangzhou, China
- affiliation: Singapore Management University, School of Information Systems, Singapore
- affiliation: Wuhan University, MOE, Key Laboratory of Aerospace Information Security and Trusted Computing, China
Other persons with the same name
- Yan Lin — disambiguation page
- Yan Lin 0001 — University of California, Los Angeles, Department of Electrical Engineering, CA, USA
- Yan Lin 0002 — Beihang University, School of Automation, China (and 1 more)
- Yan Lin 0004 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, China (and 2 more)
- Yan Lin 0005 — Norwegian Institute for Water Research, Oslo, Norway (and 1 more)
- Yan Lin 0006 — Beijing Jiaotong University, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Yan Lin, Trisha Singhal, Debin Gao, David Lo:
Analyzing and revivifying function signature inference using deep learning. Empir. Softw. Eng. 29(3): 69 (2024) - [c18]Yan Lin, Joshua Wong, Xiang Li, Haoyu Ma, Debin Gao:
Peep With A Mirror: Breaking The Integrity of Android App Sandboxing via Unprivileged Cache Side Channel. USENIX Security Symposium 2024 - 2023
- [j1]Mengfei Xie, Yan Lin, Chenke Luo, Guojun Peng, Jianming Fu:
PointerScope: Understanding Pointer Patching for Code Randomization. IEEE Trans. Dependable Secur. Comput. 20(4): 3019-3036 (2023) - [c17]Maliha Ismail, Yan Lin, DongGyun Han, Debin Gao:
BinAlign: Alignment Padding Based Compiler Provenance Recovery. ACISP 2023: 609-629 - [c16]Yan Lin, Joshua Wong, Debin Gao:
FA3: Fine-Grained Android Application Analysis. HotMobile 2023: 74-80 - 2022
- [c15]Yan Lin, Debin Gao, David Lo:
ReSIL: Revivifying Function Signature Inference using Deep Learning with Domain-Specific Knowledge. CODASPY 2022: 107-118 - 2021
- [c14]Yan Lin, Debin Gao:
When Function Signature Recovery Meets Compiler Optimization. SP 2021: 36-52
2010 – 2019
- 2019
- [c13]Xiaoyang Cheng, Yan Lin, Debin Gao, Chunfu Jia:
DynOpVm: VM-Based Software Obfuscation with Dynamic Opcode Mapping. ACNS 2019: 155-174 - [c12]Yan Lin, Xiaoyang Cheng, Debin Gao:
Control-Flow Carrying Code. AsiaCCS 2019: 3-14 - 2018
- [c11]Jianming Fu, Rui Jin, Yan Lin, Baihe Jiang, Zhengwei Guo:
Function Risk Assessment Under Memory Leakage. NaNA 2018: 284-291 - [c10]Xiaoxiao Tang, Yan Lin, Daoyuan Wu, Debin Gao:
Towards Dynamically Monitoring Android Applications on Non-rooted Devices in the Wild. WISEC 2018: 212-223 - 2017
- [c9]Yan Lin, Xiaoxiao Tang, Debin Gao:
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking. ACISP (2) 2017: 95-112 - [c8]Jianming Fu, Rui Jin, Yan Lin:
FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection. SecureComm 2017: 659-672 - 2016
- [c7]Xiaoxiao Tang, Yu Liang, Xinjie Ma, Yan Lin, Debin Gao:
On the Effectiveness of Code-Reuse-Based Android Application Obfuscation. ICISC 2016: 333-349 - [c6]Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu:
Control Flow Integrity Enforcement with Dynamic Code Optimization. ISC 2016: 366-385 - [c5]Jianming Fu, Yan Lin, Xu Zhang:
Impact of Environment on Branch Transfer of Software. SecureComm 2016: 575-593 - [c4]Jianming Fu, Yan Lin, Xu Zhang:
Code Reuse Attack Mitigation Based on Function Randomization without Symbol Table. Trustcom/BigDataSE/ISPA 2016: 394-401 - [c3]Jianming Fu, Pengwei Li, Yan Lin, Shuang Ding:
Android App Malicious Behavior Detection Based on User Intention. Trustcom/BigDataSE/ISPA 2016: 560-567 - 2015
- [c2]Jianming Fu, Xu Zhang, Yan Lin:
An Instruction-Set Randomization Using Length-Preserving Permutation. TrustCom/BigDataSE/ISPA (1) 2015: 376-383 - 2014
- [c1]Jianming Fu, Yan Lin, Xu Zhang, Pengwei Li:
Computation Integrity Measurement Based on Branch Transfer. TrustCom 2014: 590-597
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint