WHYPER: Towards Automating Risk Assessment of Mobile Applications R Pandita, X Xiao, W Yang, W Enck, T Xie Proceedings of the USENIX Security Symposium, 2013., 2013 | 526 | 2013 |
Machine learning: new ideas and tools in environmental science and engineering S Zhong, K Zhang, M Bagheri, JG Burken, A Gu, B Li, X Ma, BL Marrone, ... Environmental Science & Technology 55 (19), 12741-12754, 2021 | 492 | 2021 |
Appcontext: Differentiating malicious and benign mobile app behaviors using context W Yang, X Xiao, B Andow, S Li, T Xie, W Enck 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 323 | 2015 |
Inferring method specifications from natural language API descriptions R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar 2012 34th international conference on software engineering (ICSE), 815-825, 2012 | 238 | 2012 |
Automated Extraction of Security Policies from Natural-Language Software Documents X Xiao, A Paradkar, S Thummalapenta, T Xie FSE '12 Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012 | 179 | 2012 |
High fidelity data reduction for big data security dependency analyses Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 173 | 2016 |
SUPOR: precise and scalable sensitive user input detection for android apps J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang 24th USENIX Security Symposium (USENIX Security 2015), 977-992, 2015 | 164 | 2015 |
Hyperservice: Interoperability and programmability across heterogeneous blockchains Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 128 | 2019 |
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal 27th USENIX Security Symposium (USENIX Security 18), 2018 | 107 | 2018 |
Enabling efficient cyber threat hunting with cyber threat intelligence P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu, P Mittal, SR Kulkarni, D Song 2021 IEEE 37th International Conference on Data Engineering (ICDE), 193-204, 2021 | 103 | 2021 |
Precise identification of problems for structural test generation X Xiao, T Xie, N Tillmann, J De Halleux Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 99 | 2011 |
Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks X Xiao, S Han, D Zhang, T Xie Proceedings of the 2013 International Symposium on Software Testing and …, 2013 | 91 | 2013 |
Nodemerge: Template based efficient data reduction for big-data causality analysis Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 90 | 2018 |
Make Web3. 0 Connected Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021 | 81 | 2021 |
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal 2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018 | 81 | 2018 |
User-aware privacy control via extended static-information-flow analysis X Xiao, N Tillmann, M Fahndrich, J De Halleux, M Moskal Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012 | 68 | 2012 |
Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution X Xiao, S Li, T Xie, N Tillmann Proceedings of the 28th IEEE/ACM International Conference on Automated …, 2013 | 67 | 2013 |
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021 | 64 | 2021 |
IconIntent: Automatic Identification Of Sensitive UI Widgets Based On Icon Classification For Android Apps X Xiao, X Wang, Z Cao, H Wang, P Gao 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 63 | 2019 |
DeepIntent: Deep Icon-Behavior Learning For Detecting Intention-Behavior Discrepancy In Mobile Apps S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 58 | 2019 |