Can We Trust the Privacy Policies of Android Apps? L Yu, X Luo, X Liu, T Zhang 46th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2016 | 122 | 2016 |
Adaptive unpacking of Android apps L Xue, X Luo, L Yu, S Wang, D Wu Proceedings of the 39th International Conference on Software Engineering …, 2017 | 94 | 2017 |
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps M Fan, L Yu, S Chen, H Zhou, X Luo, S Li, Y Liu, J Liu, T Liu 2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020 | 75 | 2020 |
Enhancing the description-to-behavior fidelity in android apps with privacy policy L Yu, X Luo, C Qian, S Wang, HKN Leung IEEE Transactions on Software Engineering 44 (9), 834-854, 2018 | 72 | 2018 |
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications L Yu, T Zhang, X Luo, L Xue Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015 | 69 | 2015 |
Toward Automatically Generating Privacy Policy for Android Apps L Yu, T Zhang, X Luo, L Xue, H Chang IEEE Transactions on Information Forensics and Security 12 (4), 2017 | 57 | 2017 |
Vulhunter: toward discovering vulnerabilities in android applications C Qian, X Luo, Y Yu, G Gu IEEE Micro 35 (1), 44-53, 2015 | 55 | 2015 |
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies L Yu, X Luo, J Chen, H Zhou, T Zhang, H Chang, HKN Leung IEEE Transactions on Software Engineering, 2021 | 52 | 2021 |
Structural Attack against Graph Based Android Malware Detection K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 43 | 2021 |
Revisiting the Description-to-Behavior Fidelity in Android Applications L Yu, X Luo, C Qian, S Wang 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 40 | 2016 |
Packergrind: An adaptive unpacking system for android apps L Xue, H Zhou, X Luo, L Yu, D Wu, Y Zhou, X Ma IEEE Transactions on Software Engineering 48 (2), 551-570, 2020 | 27 | 2020 |
Stan: Towards describing bytecodes of smart contract X Li, T Chen, X Luo, T Zhang, L Yu, Z Xu 2020 IEEE 20th International Conference on Software Quality, Reliability and …, 2020 | 21 | 2020 |
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification H Zhang, L Yu, X Xiao, Q Li, F Mercaldo, X Luo, Q Liu Proceedings of the ACM Web Conference 2023, 2066-2075, 2023 | 16 | 2023 |
{SAID}: State-aware Defense Against Injection Attacks on In-vehicle Network L Xue, Y Liu, T Li, K Zhao, J Li, L Yu, X Luo, Y Zhou, G Gu 31st USENIX Security Symposium (USENIX Security 22), 1921-1938, 2022 | 13 | 2022 |
Towards automatically reverse engineering vehicle diagnostic protocols L Yu, Y Liu, P Jing, X Luo, L Xue, K Zhao, Y Zhou, T Wang, G Gu, S Nie, ... 31st USENIX Security Symposium (USENIX Security 22), 1939-1956, 2022 | 13 | 2022 |
Localizing Function Errors in Mobile Apps with User Reviews L Yu, J Chen, H Zhou, X Luo, K Liu 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 13 | 2018 |
Is what you measure what you expect? factors affecting smartphone-based mobile network measurement L Xue, X Ma, X Luo, L Yu, S Wang, T Chen INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, 1-9, 2017 | 13 | 2017 |
Android malware detection: A survey M Fan, T Liu, J Liu, X Luo, L Yu, X Guan Scientia Sinica Informationis 50 (8), 1148-1177, 2020 | 12 | 2020 |
Characterizing mobile*-box applications X Luo, H Zhou, L Yu, L Xue, Y Xie Computer Networks 103, 228-239, 2016 | 12 | 2016 |
Ui obfuscation and its effects on automated ui analysis for android apps H Zhou, T Chen, H Wang, L Yu, X Luo, T Wang, W Zhang Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020 | 9 | 2020 |