Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views.
IEEE Trans. Inf. Forensics Secur., 2025
AppPoet: Large language model based android malware detection via multi-view prompt engineering.
Expert Syst. Appl., 2025
Advancing the Automation Capability of Verifying Security Protocols.
IEEE Trans. Dependable Secur. Comput., 2024
WACANA: A Concolic Analyzer for Detecting On-chain Data Vulnerabilities in WASM Smart Contracts.
CoRR, 2024
JANUS: A Difference-Oriented Analyzer For Financial Centralization Risks in Smart Contracts.
CoRR, 2024
Detecting Android Malware by Visualizing App Behaviors from Multiple Complementary Views.
CoRR, 2024
Automated Inference on Financial Security of Ethereum Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023
IOT Cloud Teaching Platform Design.
Proceedings of the 2023 8th International Conference on Distance Education and Learning, 2023
Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
MVVDroid: Android Malware Detection based on Multi-View Visualization.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
An Automated Analyzer for Financial Security of Ethereum Smart Contracts.
CoRR, 2022
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021
Limiting Privacy Breaches in Average-Distance Query.
Secur. Commun. Networks, 2020
Static Analysis of Superfluous Network Transmissions in Android Applications.
Int. J. Netw. Secur., 2020
Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
An Observational Study on Compatibility-Related API Usage.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019
High Performance Computing and Real Time Software for High Dimensional Data Classification.
PhD thesis, 2018
Automatically Detecting Malicious Sensitive Data Usage in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018
Hyperspectral Image Classification Using Graph Clustering Methods.
Image Process. Line, 2017
Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
OpenMP Parallelization and Optimization of Graph-Based Machine Learning Algorithms.
Proceedings of the OpenMP: Memory, Devices, and Tasks, 2016