WHYPER: Towards Automating Risk Assessment of Mobile Applications. R Pandita, X Xiao, W Yang, W Enck, T Xie Proceedings of the USENIX Security Symposium, 2013., 2013 | 525 | 2013 |
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations K Ganju, Q Wang, W Yang, CA Gunter, N Borisov ACM Conference on Computer and Communications Security, 2018 | 498* | 2018 |
A Grey-box Approach for Automated GUI-Model Generation of Mobile Applications W Yang, MR Prasad, T Xie Proc. of International Conference on Fundamental Approaches to Software …, 2013 | 441 | 2013 |
Appcontext: Differentiating malicious and benign mobile app behaviors using context W Yang, X Xiao, B Andow, S Li, T Xie, W Enck Proceedings of the 37th International Conference on Software Engineering …, 2015 | 333 | 2015 |
Charting the attack surface of trigger-action IoT platforms Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 164 | 2019 |
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps W Yang, D Kong, T Xie, CA Gunter Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 153 | 2017 |
Automated test input generation for android: Are we really there yet in an industrial case? X Zeng, D Li, W Zheng, F Xia, Y Deng, W Lam, W Yang, T Xie Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 119 | 2016 |
Free for All! Assessing User Data Exposure to Advertising Libraries on Android S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter Proc. of the 23rd Annual Network and Distributed System Security Symposium, 2016 | 112 | 2016 |
An empirical study of android test generation tools in industrial cases W Wang, D Li, W Yang, Y Cao, Z Zhang, Y Deng, T Xie Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018 | 106 | 2018 |
Vulcnn: An image-inspired scalable vulnerability detection system Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin Proceedings of the 44th International Conference on Software Engineering …, 2022 | 78 | 2022 |
Automated test input generation for Android: Towards getting there in an industrial case H Zheng, D Li, B Liang, X Zeng, W Zheng, Y Deng, W Lam, W Yang, T Xie Proceedings of the 39th International Conference on Software Engineering …, 2017 | 64 | 2017 |
SCDetector: Software functional clone detection based on semantic tokens analysis Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin Proceedings of the 35th IEEE/ACM international conference on automated …, 2020 | 56 | 2020 |
Supervised learning achieves human-level performance in moba games: A case study of honor of kings D Ye, G Chen, P Zhao, F Qiu, B Yuan, W Zhang, S Chen, M Sun, X Li, S Li, ... IEEE Transactions on Neural Networks and Learning Systems 33 (3), 908-918, 2020 | 50 | 2020 |
An empirical analysis of UI-based flaky tests A Romano, Z Song, S Grandhi, W Yang, W Wang 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 46 | 2021 |
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 46 | 2019 |
IntDroid: Android malware detection based on API intimacy analysis D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021 | 37 | 2021 |
A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages X Liu, Y Leng, W Yang, W Wang, C Zhai, T Xie Symposium on Visual Languages and Human-Centric Computing (VL/HCC)., 2018 | 36 | 2018 |
ILFO: Adversarial attack on adaptive neural networks M Haque, A Chauhan, C Liu, W Yang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2020 | 35 | 2020 |
Juewu-mc: Playing minecraft with sample-efficient hierarchical reinforcement learning Z Lin, J Li, J Shi, D Ye, Q Fu, W Yang arXiv preprint arXiv:2112.04907, 2021 | 33 | 2021 |
Generating regular expressions from natural language specifications: Are we there yet? Z Zhong, J Guo, W Yang, T Xie, JG Lou, T Liu, D Zhang Workshops at the Thirty-Second AAAI Conference on Artificial Intelligence, 2018 | 33 | 2018 |