2025
DeepVMUnProtect: Neural Network-Based Recovery of VM-Protected Android Apps for Semantics-Aware Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2025
SigScope: Detecting and Understanding Off-Chain Message Signing-related Vulnerabilities in Decentralized Applications.
Proceedings of the ACM on Web Conference 2025, 2025
2024
MutexMatch: Semi-Supervised Learning With Mutex-Based Consistency Regularization.
IEEE Trans. Neural Networks Learn. Syst., June, 2024
Heterogeneous products operation decisions of online dual-channel supply chain considering online reviews under different financing modes.
RAIRO Oper. Res., 2024
Disassembling Obfuscated Executables with LLM.
CoRR, 2024
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode Diffing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
PC<sup>2</sup>: Pseudo-Classification Based Pseudo-Captioning for Noisy Correspondence Learning in Cross-Modal Retrieval.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Marco: A Stochastic Asynchronous Concolic Explorer.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Roll with the Punches: Expansion and Shrinkage of Soft Label Selection for Semi-supervised Fine-Grained Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
PG-LBO: Enhancing High-Dimensional Bayesian Optimization with Pseudo-Label and Gaussian Process Guidance.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable Smart Contracts in Blockchains.
Proceedings of the 32nd USENIX Security Symposium, 2023
Towards Semi-supervised Learning with Non-random Missing Labels.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
Probabilistic Path Prioritization for Hybrid Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2022
RDA: Reciprocal Distribution Alignment for Robust Semi-supervised Learning.
Proceedings of the Computer Vision - ECCV 2022, 2022
DC-SSL: Addressing Mismatched Class Distribution in Semi-supervised Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Medical image segmentation and reconstruction of prostate tumor based on 3D AlexNet.
Comput. Methods Programs Biomed., 2021
2020
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Discerning Code Changes From a Security Perspective.
PhD thesis, 2019
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Automatic Generation of Non-intrusive Updates for Third-Party Libraries in Android Applications.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Evaluation of GF-3 Quad-Polarized SAR Imagery for Coastal Wetland Observation.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
2017
JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017
Dark Hazard: Learning-based, Large-Scale Discovery of Hidden Sensitive Operations in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
2015
Privacy-Preserving Offloading of Mobile App to the Public Cloud.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015
Towards Automatic Generation of Security-Centric Descriptions for Android Apps.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2012
Social Network Based Reputation Computation and Document Classification.
J. Univers. Comput. Sci., 2012
2011
Automatic Reputation Computation through Document Analysis: A Social Network Approach.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2011