D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 9,145 82 World Ranking 8604 National Ranking 3991

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Microsoft Windows

Heng Yin spends much of his time researching Computer security, Malware, Malware analysis, Android and Artificial intelligence. His Password study, which is part of a larger body of work in Computer security, is frequently linked to Quality, bridging the gap between disciplines. His Malware study frequently intersects with other fields, such as Keystroke logging.

His Malware analysis course of study focuses on Cryptovirology and Taint checking. Heng Yin has included themes like HTML5 and Mobile device in his Android study. His Artificial intelligence research is multidisciplinary, incorporating elements of Machine learning and Android malware.

His most cited work include:

  • Panorama: capturing system-wide information flow for malware detection and analysis (668 citations)
  • BitBlaze: A New Approach to Computer Security via Binary Analysis (603 citations)
  • DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis (570 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Malware, Android, Operating system and Malware analysis. The study incorporates disciplines such as Software, Static analysis and Source code in addition to Computer security. His research in Malware intersects with topics in Machine learning, Keystroke logging and Artificial intelligence.

His Android research includes elements of World Wide Web and Mobile device. As part of one scientific family, Heng Yin deals mainly with the area of Operating system, narrowing it down to issues related to the Spec#, and often Interface. His work carried out in the field of Malware analysis brings together such families of science as Taint checking, Instrumentation, Theoretical computer science and Hardware virtualization.

He most often published in these fields:

  • Computer security (36.27%)
  • Malware (35.29%)
  • Android (21.57%)

What were the highlights of his more recent work (between 2019-2021)?

  • Artificial intelligence (14.71%)
  • Machine learning (10.78%)
  • Computer security (36.27%)

In recent papers he was focusing on the following fields of study:

Artificial intelligence, Machine learning, Computer security, Software and Fuzz testing are his primary areas of study. His study in Machine learning is interdisciplinary in nature, drawing from both Software bug, Java, Malware, Control flow and Assembly language. His work on Android malware as part of general Malware research is often related to tf–idf, thus linking different fields of science.

His Computer security research incorporates elements of Adversarial system, Taint checking, Static analysis and Sequence learning. In his research on the topic of Software, Programming language, Binary number, Data mining, Memory corruption and Representation is strongly related with Code. His research investigates the connection between Fuzz testing and topics such as Vulnerability discovery that intersect with issues in Android.

Between 2019 and 2021, his most popular works were:

  • DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing (7 citations)
  • Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers. (6 citations)
  • Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Microsoft Windows

His main research concerns Code, Software, Computer security, Programming language and Binary number. Heng Yin has researched Code in several fields, including Representation, Key, Data mining and Memory corruption. His research integrates issues of Hypervisor, Protocol, Data structure and Channel in his study of Software.

Heng Yin is interested in Malware, which is a branch of Computer security.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis

Lok Kwong Yan;Heng Yin.
usenix security symposium (2012)

1014 Citations

Panorama: capturing system-wide information flow for malware detection and analysis

Heng Yin;Dawn Song;Manuel Egele;Christopher Kruegel.
computer and communications security (2007)

971 Citations

BitBlaze: A New Approach to Computer Security via Binary Analysis

Dawn Song;David Brumley;Heng Yin;Juan Caballero.
international conference on information systems security (2008)

884 Citations

DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android

Yousra Aafer;Wenliang Du;Heng Yin.
international conference on security and privacy in communication systems (2013)

690 Citations

Polyglot: automatic extraction of protocol message format using dynamic binary analysis

Juan Caballero;Heng Yin;Zhenkai Liang;Dawn Song.
computer and communications security (2007)

518 Citations

Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

Mu Zhang;Yue Duan;Heng Yin;Zhiruo Zhao.
computer and communications security (2014)

486 Citations

Renovo: a hidden code extractor for packed executables

Min Gyung Kang;Pongsin Poosankam;Heng Yin.
Proceedings of the 2007 ACM workshop on Recurring malcode (2007)

429 Citations

Dynamic spyware analysis

Manuel Egele;Christopher Kruegel;Engin Kirda;Heng Yin.
usenix annual technical conference (2007)

331 Citations

Automatically Identifying Trigger-based Behavior in Malware

David Brumley;Cody Hartwig;Zhenkai Liang;James Newsome.
Botnet Detection (2008)

280 Citations

Attacks on WebView in the Android system

Tongbo Luo;Hao Hao;Wenliang Du;Yifei Wang.
annual computer security applications conference (2011)

253 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Heng Yin

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 45

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 41

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 40

Zhiqiang Lin

Zhiqiang Lin

The Ohio State University

Publications: 40

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 39

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 34

Xiangyu Zhang

Xiangyu Zhang

Purdue University West Lafayette

Publications: 33

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 29

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 29

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 27

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 26

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 26

Dongyan Xu

Dongyan Xu

Purdue University West Lafayette

Publications: 25

Engin Kirda

Engin Kirda

Northeastern University

Publications: 24

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 23

Guofei Gu

Guofei Gu

Texas A&M University

Publications: 22

Trending Scientists

Osvaldo Simeone

Osvaldo Simeone

King's College London

Lynn B. Martin

Lynn B. Martin

University of South Florida

Cynthia A. Reinhart-King

Cynthia A. Reinhart-King

Vanderbilt University

Daria Mochly-Rosen

Daria Mochly-Rosen

Stanford University

Francisco J. Florencio

Francisco J. Florencio

University of Seville

Michael Koval

Michael Koval

Emory University

Brian D. Plikaytis

Brian D. Plikaytis

Centers for Disease Control and Prevention

Robert V. Gibbons

Robert V. Gibbons

United States Department of the Army

Jonathan Lees

Jonathan Lees

Cardiff University

Sergej Zilitinkevich

Sergej Zilitinkevich

Finnish Meteorological Institute

Stefan Glasauer

Stefan Glasauer

Brandenburg University of Technology

Michael D. Kopelman

Michael D. Kopelman

King's College London

Laura Liberman

Laura Liberman

Memorial Sloan Kettering Cancer Center

David P. Taggart

David P. Taggart

John Radcliffe Hospital

David A. Mankoff

David A. Mankoff

University of Pennsylvania

Anthony Harris

Anthony Harris

University of Sydney

Something went wrong. Please try again later.