Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Domènec Farré
Lawrence Jarvis
Dalila Hamami
Marc G. Bellemare
Kai Wang
Erik Sundén
Giovina Marina La Vecchia
Gergely Biczók
Sandler, M.
Enrique Solano
Home
/
Author
/
YOUSRA AAFER
Author Info
Open Visualization
Name
Affiliation
Papers
YOUSRA AAFER
Syracuse Univ, Dept Elect Engn & Comp Sci, New York, NY USA
23
Collaborators
Citations
PageRank
58
264
13.36
Referers
Referees
References
954
804
322
Search Limit
100
954
Publications (23 rows)
Collaborators (58 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Poirot: Probabilistically Recommending Protections for the Android Framework
0
0.34
2022
Dissecting Residual APIs in Custom Android ROMs
0
0.34
2021
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing
0
0.34
2021
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting
2
0.36
2021
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
0
0.34
2021
Finding client-side business flow tampering vulnerabilities
1
0.34
2020
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning
0
0.34
2020
Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles
1
0.35
2020
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation
11
0.61
2019
AdBudgetKiller: Online Advertising Budget Draining Attack.
0
0.34
2018
Trojaning Attack on Neural Networks.
24
0.73
2018
Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach.
15
0.59
2018
Dual-force: understanding WebView malware via cross-language forced execution.
1
0.36
2018
Precise Android API Protection Mapping Derivation and Reasoning.
2
0.39
2018
AceDroid: Normalizing Diverse Android Access Control Checks for Inconsistency Detection.
2
0.36
2018
Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
2
0.41
2017
UI driven Android application reduction.
3
0.37
2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation
5
0.43
2017
PAD: programming third-party web advertisement censorship.
1
0.35
2017
Life after App Uninstallation: Are the Data Still Alive? Data Residue Attacks on Android.
9
0.47
2016
Harvesting Inconsistent Security Configurations In Custom Android Roms Via Differential Analysis
4
0.44
2016
Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References
18
0.60
2015
DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android.
163
4.17
2013
1