Adaptive unpacking of Android apps L Xue, X Luo, L Yu, S Wang, D Wu 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017 | 93 | 2017 |
Malton: Towards {On-Device}{Non-Invasive} Mobile Malware Analysis for {ART} L Xue, Y Zhou, T Chen, X Luo, G Gu 26th USENIX Security Symposium (USENIX Security 17), 289-306, 2017 | 90 | 2017 |
Cross project defect prediction via balanced distribution adaptation based transfer learning Z Xu, S Pang, T Zhang, XP Luo, J Liu, YT Tang, X Yu, L Xue Journal of Computer Science and Technology 34, 1039-1062, 2019 | 72 | 2019 |
Programmable {In-Network} security for context-aware {BYOD} policies Q Kang, L Xue, A Morrison, Y Tang, A Chen, X Luo 29th USENIX Security Symposium (USENIX Security 20), 595-612, 2020 | 70 | 2020 |
Autoppg: Towards automatic generation of privacy policy for android applications L Yu, T Zhang, X Luo, L Xue Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015 | 69 | 2015 |
Linkscope: Toward detecting target link flooding attacks L Xue, X Ma, X Luo, EWW Chan, TTN Miu, G Gu IEEE Transactions on Information Forensics and Security 13 (10), 2423-2438, 2018 | 60 | 2018 |
NDroid: Toward tracking information flows across multiple Android contexts L Xue, C Qian, H Zhou, X Luo, Y Zhou, Y Shao, ATS Chan IEEE Transactions on Information Forensics and Security 14 (3), 814-828, 2019 | 59 | 2019 |
Towards detecting target link flooding attack L Xue, X Luo, EWW Chan, X Zhan 28th Large Installation System Administration Conference (LISA14), 90-105, 2014 | 57 | 2014 |
Toward automatically generating privacy policy for android apps L Yu, T Zhang, X Luo, L Xue, H Chang IEEE Transactions on Information Forensics and Security 12 (4), 865-880, 2016 | 56 | 2016 |
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations P Jing, Q Tang, Y Du, L Xue, X Luo, T Wang, S Nie, S Wu 30th USENIX Security Symposium (USENIX Security 21), 2021 | 43 | 2021 |
Happer: Unpacking Android Apps via a Hardware-Assisted Approach L Xue, H Zhou, X Luo, Y Zhou, Y Shi, G Gu, F Zhang, MH Au IEEE Symposiumon Security and Privacy (S&P), 2021 | 27 | 2021 |
Packergrind: An adaptive unpacking system for android apps L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, X Ma IEEE Transactions on Software Engineering 48 (2), 551-570, 2020 | 26 | 2020 |
Design and implementation of a malware detection system based on network behavior L Xue, G Sun Security and Communication Networks 8 (3), 459-470, 2015 | 26 | 2015 |
A compositional model for effort‐aware Just‐In‐Time defect prediction on android apps K Zhao, Z Xu, M Yan, L Xue, W Li, G Catolino IET Software 16 (3), 259-278, 2022 | 21 | 2022 |
Randomized security patrolling for link flooding attack detection X Ma, B An, M Zhao, X Luo, L Xue, Z Li, TTN Miu, X Guan IEEE Transactions on Dependable and Secure Computing 17 (4), 795-812, 2019 | 19 | 2019 |
Androidperf: A cross-layer profiling system for android applications L Xue, C Qian, X Luo 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), 115-124, 2015 | 19 | 2015 |
Graph4Web: A relation-aware graph attention network for web service classification K Zhao, J Liu, Z Xu, X Liu, L Xue, Z Xie, Y Zhou, X Wang Journal of Systems and Software 190, 111324, 2022 | 16 | 2022 |
Demystifying diehard android apps H Zhou, H Wang, Y Zhou, X Luo, Y Tang, L Xue, T Wang Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 15 | 2020 |
Is what you measure what you expect? factors affecting smartphone-based mobile network measurement L Xue, X Ma, X Luo, L Yu, S Wang, T Chen IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 13 | 2017 |
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network L Xue, Y Liu, T Li, K Zhao, J Li, L Yu, X Luo, Y Zhou, G Gu 31st USENIX Security Symposium (USENIX Security), 2022 | 12 | 2022 |