2025
A survey on EOSIO systems security: vulnerability, attack, and mitigation.
Frontiers Comput. Sci., June, 2025
2024
TrajBERT: BERT-Based Trajectory Recovery With Spatial-Temporal Refinement for Implicit Sparse Trajectories.
IEEE Trans. Mob. Comput., May, 2024
Detecting Malicious Websites From the Perspective of System Provenance Analysis.
IEEE Trans. Dependable Secur. Comput., 2024
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models.
CoRR, 2024
Semantic-Enhanced Indirect Call Analysis with Large Language Models.
CoRR, 2024
Query Provenance Analysis for Robust and Efficient Query-based Black-box Attack Defense.
CoRR, 2024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device ML.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Semantic-Enhanced Indirect Call Analysis with Large Language Models.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
2023
Beyond Fine-Tuning: Efficient and Effective Fed-Tuning for Mobile/Web Users.
Proceedings of the ACM Web Conference 2023, 2023
Towards Efficient Hugepage-aware Memory Deduplication.
Proceedings of the 4th Workshop on Resource Disaggregation and Serverless, 2023
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Proceedings of the 32nd USENIX Security Symposium, 2023
Shared Account Problem in Super Apps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
How Android Apps Break the Data Minimization Principle: An Empirical Study.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence Matching.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
APIMind: API-driven Assessment of Runtime Description-to-permission Fidelity in Android Apps.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
A Dual Self-supervised Deep Trajectory Clustering Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
A Graph-Based Temporal Attention Framework for Multi-Sensor Traffic Flow Forecasting.
IEEE Trans. Intell. Transp. Syst., 2022
Toward a Systematic Survey on Wearable Computing for Education Applications.
IEEE Internet Things J., 2022
City-Scale Fingerprint Positioning Framework based on MDT Data.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
MOBA-E2C: Generating MOBA Game Commentaries via Capturing Highlight Events from the Meta-Data.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
2021
DistFL: Distribution-aware Federated Learning for Mobile Scenarios.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
State Evaluation Method of Robot Lubricating Oil Based on Support Vector Regression.
Comput. Intell. Neurosci., 2021
PFA: Privacy-preserving Federated Adaptation for Effective Model Personalization.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Dependency-aware Form Understanding.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Robot Predictive Maintenance Method Based on Program-Position Cycle.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021
TransTailor: Pruning the Pre-trained Model for Improved Transfer Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
PMC: A Privacy-preserving Deep Learning Model Customization Framework for Edge Computing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
S3ML: A Secure Serving System for Machine Learning Inference.
CoRR, 2020
Adversarial Attacks on Monocular Depth Estimation.
CoRR, 2020
Dynamic slicing for deep neural networks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
PrTaurus: An Availability-Enhanced EMR Service on Preemptible Cloud Instances.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Comprehensive Evaluation Method of Multi-meter Integrated Energy Metering Operating State Based on Hierarchical Structure.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
Research on the knowledge hierarchy and practice teaching of operating system course under the background of emerging engineering.
Proceedings of the 15th International Conference on Computer Science & Education, 2020
2019
A Deep Learning based Approach to Automated Android App Testing.
CoRR, 2019
Policy-Based Access Control for Robotic Applications.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019
WealthAdapt: A General Network Adaptation Framework for Small Data Tasks.
Proceedings of the 27th ACM International Conference on Multimedia, 2019
Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
DCStore: A Deduplication-Based Cloud-of-Clouds Storage Service.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
How to Find It Better?: Cross-Learning for WeChat Mini Programs.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
2018
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games.
CoRR, 2018
Building application-specific operating systems: a profile-guided approach.
Sci. China Inf. Sci., 2018
Comparing Container-Based Microservices and Workspace as a Service: Which One to Choose?
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018
Inferring UI States of Mobile Applications Through Power Side Channel Exploitation.
Proceedings of the Security and Privacy in Communication Networks, 2018
Device-Specific Linux Kernel Optimization for Android Smartphones.
Proceedings of the 6th IEEE International Conference on Mobile Cloud Computing, 2018
What's inside my app?: understanding feature redundancy in mobile apps.
Proceedings of the 26th Conference on Program Comprehension, 2018
Shaping program repair space with existing patches and similar code.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage Between Teams in MOBA Games.
Proceedings of the Computer Games - 7th Workshop, 2018
Self-similarity Modeling Research on Information Gathering Service for Power Utilization of Smart Grid.
Proceedings of the 14th International Conference on Natural Computation, 2018
DistGear: A Lightweight Event-Driven Framework for Developing Distributed Applications.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Automated Extraction of Personal Knowledge from Smartphone Push Notifications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Traffic Danger Recognition With Surveillance Cameras Without Training Data.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018
2017
Mining User Reviews for Mobile App Comparisons.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study.
IEEE Access, 2017
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017
Freeze It If You Can: Challenges and Future Directions in Benchmarking Smartphone Performance.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017
FreeNavi: Landmark-Based Mapless Indoor Navigation Based on WiFi Fingerprints.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
Looxy: Web Access Optimization for Mobile Applications with a Local Proxy.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017
E-Spector: Online energy inspection for Android applications.
Proceedings of the 2017 IEEE/ACM International Symposium on Low Power Electronics and Design, 2017
AgileRabbit: A Feedback-Driven Offloading Middleware for Smartwatch Apps.
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017
DroidBot: a lightweight UI-guided test input generator for Android.
Proceedings of the 39th International Conference on Software Engineering, 2017
Design of the intelligent detection instrument used in user electricity lines missort fault.
Proceedings of the 4th International Conference on Systems and Informatics, 2017
2016
Standby Energy Analysis and Optimization for Smartphones.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016
LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016
PERUIM: understanding mobile application privacy with permission-UI mapping.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications.
Proceedings of the Security and Privacy in Communication Networks, 2015
JavaScript Offloading for Web Applications in Mobile-Cloud Computing.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Cloud-Based Programmable Sensor Data Provision.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015
Fixing sensor-related energy bugs through automated sensing policy instrumentation.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2015
A Study on Power Side Channels on Mobile Devices.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015
Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Rethinking Compiler Optimizations for the Linux Kernel: An Explorative Study.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015
2014
Context-aware usage control for web of things.
Secur. Commun. Networks, 2014
Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014
Topic Evolutions in Scientific Conferences.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Collaborative privacy management: mobile privacy beyond your own devices.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014
An empirical study of indoor localization algorithms with densely deployed APs.
Proceedings of the IEEE Global Communications Conference, 2014
Preserving Location-Related Privacy Collaboratively in Geo-social Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
Experiences in profile-guided operating system kernel optimization.
Proceedings of the Asia-Pacific Workshop on Systems, 2014
2013
Supporting Localized Interactions among Heterogeneous Smart Things with ThingWare.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Patronus: Augmented Privacy Protection for Resource Publication in Online Social Networks.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Power estimation for mobile applications with profile-driven battery traces.
Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED), 2013
Towards an operating system for the campus.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013
2012
Security model oriented attestation on dynamically reconfigurable component-based systems.
J. Netw. Comput. Appl., 2012
2011
Jupiter: transparent augmentation of smartphone capabilities through cloud computing.
Proceedings of the 3rd ACM SOSP Workshop on Networking, 2011
A system context-aware approach for battery lifetime prediction in smart phones.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
2010
Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010
An Automatic Configuration Approach to Improve Real-Time Application Throughput While Attaining Determinism.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Transaction-based adaptive dynamic voltage scaling for interactive applications.
Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009
A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009
SAConf: Semantic Attestation of Software Configurations.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
FPValidator: Validating Type Equivalence of Function Pointers on the Fly.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
AspectC2C: a symmetric aspect extension to the C language.
ACM SIGPLAN Notices, 2008
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Data Prefetching Driven by User Preference and Global Coordination for Mobile Environments.
Proceedings of the Workshops at the Grid and Pervasive Computing Conference, 2008
Keep Passwords Away from Memory: Password Caching and Verification Using TPM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Towards a Software Framework for Building Highly Flexible Component-Based Embedded Operating Systems.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007
Toward Efficient Aspect Mining for Linux.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007
2005
A HAL for Component-Based Embedded Operating Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
On Generalizing Interrupt Handling into a Flexible Binding Model for Kernel Components.
Proceedings of the Embedded Software and Systems, First International Conference, 2004
Research Directions for Embedded Operating Systems.
Proceedings of the Embedded Software and Systems, First International Conference, 2004
Extraction and Visualization of Architectural Structure Based on Cross References among Object Files.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004