default search action
Yue Duan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Yue Duan, Zhen Zhao, Lei Qi, Lei Wang, Luping Zhou, Yinghuan Shi, Yang Gao:
MutexMatch: Semi-Supervised Learning With Mutex-Based Consistency Regularization. IEEE Trans. Neural Networks Learn. Syst. 35(6): 8441-8455 (2024) - [c23]Taicai Chen, Yue Duan, Dong Li, Lei Qi, Yinghuan Shi, Yang Gao:
PG-LBO: Enhancing High-Dimensional Bayesian Optimization with Pseudo-Label and Gaussian Process Guidance. AAAI 2024: 11381-11389 - [c22]Yue Duan, Zhen Zhao, Lei Qi, Luping Zhou, Lei Wang, Yinghuan Shi:
Roll with the Punches: Expansion and Shrinkage of Soft Label Selection for Semi-supervised Fine-Grained Learning. AAAI 2024: 11829-11837 - [c21]Jie Hu, Yue Duan, Heng Yin:
Marco: A Stochastic Asynchronous Concolic Explorer. ICSE 2024: 59:1-59:12 - [c20]Yue Duan, Zhangxuan Gu, Zhenzhe Ying, Lei Qi, Changhua Meng, Yinghuan Shi:
PC2: Pseudo-Classification Based Pseudo-Captioning for Noisy Correspondence Learning in Cross-Modal Retrieval. ACM Multimedia 2024: 9397-9406 - [c19]Lian Gao, Yu Qu, Sheng Yu, Yue Duan, Heng Yin:
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing. NDSS 2024 - [c18]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. USENIX Security Symposium 2024 - [i9]Shenao Yan, Shen Wang, Yue Duan, Hanbin Hong, Kiho Lee, Doowon Kim, Yuan Hong:
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection. CoRR abs/2406.06822 (2024) - [i8]Huanyao Rong, Yue Duan, Hang Zhang, XiaoFeng Wang, Hongbo Chen, Shengchen Duan, Shen Wang:
Disassembling Obfuscated Executables with LLM. CoRR abs/2407.08924 (2024) - [i7]Yue Duan, Zhangxuan Gu, Zhenzhe Ying, Lei Qi, Changhua Meng, Yinghuan Shi:
PC2: Pseudo-Classification Based Pseudo-Captioning for Noisy Correspondence Learning in Cross-Modal Retrieval. CoRR abs/2408.01349 (2024) - 2023
- [c17]Yue Duan, Zhen Zhao, Lei Qi, Luping Zhou, Lei Wang, Yinghuan Shi:
Towards Semi-supervised Learning with Non-random Missing Labels. ICCV 2023: 16075-16085 - [c16]William Edward Bodell III, Sajad Meisami, Yue Duan:
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains. USENIX Security Symposium 2023: 1829-1846 - [i6]Yue Duan, Zhen Zhao, Lei Qi, Luping Zhou, Lei Wang, Yinghuan Shi:
Towards Semi-supervised Learning with Non-random Missing Labels. CoRR abs/2308.08872 (2023) - [i5]Yue Duan, Zhen Zhao, Lei Qi, Luping Zhou, Lei Wang, Yinghuan Shi:
Roll With the Punches: Expansion and Shrinkage of Soft Label Selection for Semi-supervised Fine-Grained Learning. CoRR abs/2312.12237 (2023) - [i4]Taicai Chen, Yue Duan, Dong Li, Lei Qi, Yinghuan Shi, Yang Gao:
PG-LBO: Enhancing High-Dimensional Bayesian Optimization with Pseudo-Label and Gaussian Process Guidance. CoRR abs/2312.16983 (2023) - 2022
- [j3]Lei Zhao, Pengcheng Cao, Yue Duan, Heng Yin, Jifeng Xuan:
Probabilistic Path Prioritization for Hybrid Fuzzing. IEEE Trans. Dependable Secur. Comput. 19(3): 1955-1973 (2022) - [c15]Yue Duan, Xin Zhao, Yu Pan, Shucheng Li, Minghao Li, Fengyuan Xu, Mu Zhang:
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications. CCS 2022: 921-935 - [c14]Zhen Zhao, Luping Zhou, Yue Duan, Lei Wang, Lei Qi, Yinghuan Shi:
DC-SSL: Addressing Mismatched Class Distribution in Semi-supervised Learning. CVPR 2022: 9747-9755 - [c13]Yue Duan, Lei Qi, Lei Wang, Luping Zhou, Yinghuan Shi:
RDA: Reciprocal Distribution Alignment for Robust Semi-supervised Learning. ECCV (30) 2022: 533-549 - [i3]Yue Duan, Zhen Zhao, Lei Qi, Lei Wang, Luping Zhou, Yinghuan Shi, Yang Gao:
MutexMatch: Semi-supervised Learning with Mutex-based Consistency Regularization. CoRR abs/2203.14316 (2022) - [i2]Yue Duan, Lei Qi, Lei Wang, Luping Zhou, Yinghuan Shi:
RDA: Reciprocal Distribution Alignment for Robust Semi-supervised Learning. CoRR abs/2208.04619 (2022) - 2021
- [j2]Jun Chen, Zhechao Wan, Jiacheng Zhang, Wenhua Li, Yanbing Chen, Yuebing Li, Yue Duan:
Medical image segmentation and reconstruction of prostate tumor based on 3D AlexNet. Comput. Methods Programs Biomed. 200: 105878 (2021) - 2020
- [c12]Yue Duan, Xuezixiang Li, Jinghan Wang, Heng Yin:
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing. NDSS 2020
2010 – 2019
- 2019
- [b1]Yue Duan:
Discerning Code Changes From a Security Perspective. University of California, Riverside, USA, 2019 - [c11]Lei Zhao, Yue Duan, Heng Yin, Jifeng Xuan:
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. NDSS 2019 - [c10]Jinghan Wang, Yue Duan, Wei Song, Heng Yin, Chengyu Song:
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. RAID 2019: 1-15 - [c9]Yue Duan, Lian Gao, Jie Hu, Heng Yin:
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications. RAID 2019: 277-292 - 2018
- [c8]Xiaochen Wang, Yun Shao, Wei Tian, Yue Duan, Kun Li, Long Liu:
Evaluation of GF-3 Quad-Polarized SAR Imagery for Coastal Wetland Observation. IGARSS 2018: 7945-7948 - [c7]Yue Duan, Mu Zhang, Abhishek Vasisht Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, XiaoFeng Wang:
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation. NDSS 2018 - 2017
- [c6]Xiaorui Pan, Xueqiang Wang, Yue Duan, XiaoFeng Wang, Heng Yin:
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps. NDSS 2017 - [c5]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. SecureComm 2017: 704-720 - [i1]Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin:
JSForce: A Forced Execution Engine for Malicious JavaScript Detection. CoRR abs/1701.07860 (2017) - 2015
- [c4]Mu Zhang, Yue Duan, Qian Feng, Heng Yin:
Towards Automatic Generation of Security-Centric Descriptions for Android Apps. CCS 2015: 518-529 - [c3]Yue Duan, Mu Zhang, Heng Yin, Yuzhe Tang:
Privacy-Preserving Offloading of Mobile App to the Public Cloud. HotCloud 2015 - 2014
- [c2]Mu Zhang, Yue Duan, Heng Yin, Zhiruo Zhao:
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs. CCS 2014: 1105-1116 - 2012
- [j1]JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin:
Social Network Based Reputation Computation and Document Classification. J. Univers. Comput. Sci. 18(4): 532-553 (2012) - 2011
- [c1]JooYoung Lee, Yue Duan, Jae C. Oh, Wenliang Du, Howard Blair, Lusha Wang, Xing Jin:
Automatic Reputation Computation through Document Analysis: A Social Network Approach. ASONAM 2011: 559-560
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint