Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 65 | 2019 |
Reading thieves' cant: automatically identifying and understanding dark jargons from cybercrime marketplaces K Yuan, H Lu, X Liao, XF Wang 27th USENIX Security Symposium (USENIX Security 18), 1027-1041, 2018 | 60 | 2018 |
Demystifying resource management risks in emerging mobile app-in-app ecosystems H Lu, L Xing, Y Xiao, Y Zhang, X Liao, XF Wang, X Wang Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 41 | 2020 |
Understanding malicious cross-library data harvesting on android J Wang, Y Xiao, X Wang, Y Nan, L Xing, X Liao, JW Dong, N Serrano, ... 30th USENIX Security Symposium (USENIX Security 21), 4133-4150, 2021 | 28 | 2021 |
Detecting and measuring aggressive location harvesting in mobile apps via data-flow path embedding H Lu, Q Zhao, Y Chen, X Liao, Z Lin Proceedings of the ACM on Measurement and Analysis of Computing Systems 7 (1 …, 2023 | 5 | 2023 |
Towards Privacy-Preserving Social-Media SDKs on Android H Lu, Y Liu, X Liao, L Xing | | |