Authors:
Jiarun Dai, Yuan Zhang, Zheyue Jiang, Yingtian Zhou, Junyan Chen, Xinyu Xing, Xiaohan Zhang, Xin Tan, Min Yang, Zhemin Yang.
Publication:
This paper is included in the Proceedings of the 29th USENIX Security Symposium. August 12–14, 2020
Authors:
Xiaohan Zhang, Yuan Zhang, Ming Zhong, Daizong Ding, Yinzhi Cao, Yukun Zhang, Mi Zhang, Min Yang
Publication:
This paper is included in the Proceedings of the 27th ACM Conference on Computer and Communications Security(CCS), 2020
Authors:
Shunfan Zhou, Zhemin Yang, Jie Xiang, Yinzhi Cao, Min Yang, Yuan Zhang.
Publication:
This paper is included in the Proceedings of the 29th USENIX Security Symposium. August 12–14, 2020
Authors:
Yuan Zhang, Min Yang, Bo Zhou, Zhemin Yang, Weihua Zhang, Binyu Zang
Publication:
This paper is included in Proceedings of the 8th international conference on Virtual execution environments (VEE), London, UK, March 3-4, 2012.
Authors:
Zhemin Yang, Min Yang, Yuan Zhang, Guofei Gu, Peng Ning, X. Sean Wang
Publication:
This paper is included in Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS), Berlin, Germany, November 4–8, 2013.
Authors:
Yuan Zhang, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, Binyu Zang
Publication:
This paper is included in Proceedings of the 20th ACM Conference on Computer and Communications Security(CCS), Berlin, Germany, November 4–8, 2013.
Authors:
Yuan Zhang, Min Yang, Zhemin Yang, Guofei Gu, Peng Ning, and Binyu Zang
Publication:
This paper is included in IEEE Transactions on Information Forensics and Security(TIFS), 2014.
Authors:
Yuan Zhang, Min Yang, Guofei Gu, and Hao Chen
Publication:
This paper is included in Proceedings of the 11th EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2015.
Authors:
Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
Publication:
This paper is included in IEEE Transactions on Information Forensics and Security(TIFS), 2016.
Authors:
Yuhong Nan, Min Yang, Zhemin Yang, Shunfan Zhou, Guofei Gu, and Xiaofeng Wang
Publication:
This paper is included in the Proceedings of the 24th USENIX Security Symposium August 12–14, 2015.