Guoai Xu

Orcid: 0000-0002-9582-0698

According to our database1, Guoai Xu authored at least 104 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT.
IEEE Internet Things J., September, 2024

WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets.
Autom. Softw. Eng., June, 2024

Decoding Secret Memorization in Code LLMs Through Token-Level Characterization.
CoRR, 2024

Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps.
CoRR, 2024

Digger: Detecting Copyright Content Mis-usage in Large Language Model Training.
CoRR, 2024

A robust and effective 3-factor authentication protocol for smart factory in IIoT.
Comput. Commun., 2024

APIGen: Generative API Method Recommendation.
Proceedings of the IEEE International Conference on Software Analysis, 2024

Exploring Covert Third-party Identifiers through External Storage in the Android New Era.
Proceedings of the 33rd USENIX Security Symposium, 2024

Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV.
Proceedings of the Intelligent Information Processing XII, 2024

MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid.
IEEE Syst. J., December, 2023

Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V.
IEEE Trans. Veh. Technol., November, 2023

A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks.
Sensors, November, 2023

Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET.
Sensors, February, 2023

Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

WELID: A Weighted Ensemble Learning Method for Network Intrusion Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Using A CNN to Solve the Problem of Asphalt Pavement Crack Detection.
Proceedings of the 15th International Conference on Machine Learning and Computing, 2023

2022
Optimizing the Trapping (Transport) Efficiency in Regular Branched Networks.
IEEE Trans. Netw. Sci. Eng., 2022

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022

A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT.
IEEE Syst. J., 2022

Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression.
Sensors, 2022

CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things.
Pervasive Mob. Comput., 2022

A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET.
KSII Trans. Internet Inf. Syst., 2022

A novel model for voice command fingerprinting using deep learning.
J. Inf. Secur. Appl., 2022

A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations.
Inf. Sci., 2022

CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network.
IEEE Internet Things J., 2022

Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022

Dataset Bias in Android Malware Detection.
CoRR, 2022

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Demystifying the underground ecosystem of account registration bots.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

What did you pack in my app? a systematic analysis of commercial Android packers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Challenges in decentralized name management: the case of ENS.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

2021
Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre.
Wirel. Commun. Mob. Comput., 2021

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
Secur. Commun. Networks, 2021

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference.
Secur. Commun. Networks, 2021

Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier.
Inf. Technol. Control., 2021

G2F: A Secure User Authentication for Rapid Smart Home IoT Management.
IEEE Internet Things J., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

Ethereum Name Service: the Good, the Bad, and the Ugly.
CoRR, 2021

Demystifying Illegal Mobile Gambling Apps.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Towards Understanding iOS App Store Search Advertising: An Explorative Study.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

2020
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure.
Wirel. Commun. Mob. Comput., 2020

CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System.
IEEE Trans. Ind. Informatics, 2020

Game Theoretical Method for Anomaly-Based Intrusion Detection.
Secur. Commun. Networks, 2020

An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.
IACR Cryptol. ePrint Arch., 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Characterizing cryptocurrency exchange scams.
Comput. Secur., 2020

Efficient and Provably Secure Anonymous User Authentication Scheme for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2020

A Review of Android Malware Detection Approaches Based on Machine Learning.
IEEE Access, 2020

Robust App Clone Detection Based on Similarity of UI Structure.
IEEE Access, 2020

Mobile App Squatting.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Dissecting Mobile Offerwall Advertisements: An Explorative Study.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Recognition Method of Road Cracks with Lane Lines Based on Deep Learning.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment.
Secur. Commun. Networks, 2019

A Secure and Efficient ECC-Based Anonymous Authentication Protocol.
Secur. Commun. Networks, 2019

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography.
KSII Trans. Internet Inf. Syst., 2019

AppAuth: Authorship Attribution for Android App Clones.
IEEE Access, 2019

A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map.
IEEE Access, 2019

Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

AppNet: understanding app recommendation in Google Play.
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Deobfuscating Android native binary code.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

Artificial Intelligence and Game Theory Based Security Strategies and Application Cases for Internet of Vehicles.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
Defect Prediction in Android Binary Executables Using Deep Neural Network.
Wirel. Pers. Commun., 2018

An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018

A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography.
Sensors, 2018

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment.
Secur. Commun. Networks, 2018

Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol.
Int. J. Commun. Syst., 2018

A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018

Multi-Byte Power Analysis: A Generic Approach Based on Linear Regression.
IEEE Access, 2018

How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Differential Fault Attack on ITUbee Block Cipher.
ACM Trans. Embed. Comput. Syst., 2017

An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.
Sensors, 2017

Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card.
Secur. Commun. Networks, 2017

A lightweight password-based authentication protocol using smart card.
Int. J. Commun. Syst., 2017

Linear Regression Side Channel Attack Applied on Constant XOR.
IACR Cryptol. ePrint Arch., 2017

FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection.
CoRR, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Malware detection method for the industrial control systems.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

ClassifyDroid: Large scale Android applications classification using semi-supervised Multinomial Naive Bayes.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2013
A Novel Element Detection Method in Audio Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
The Design of SMS Based Heterogeneous Mobile Botnet.
J. Comput., 2012

Tutte polynomial of pseudofractal scale-free web
CoRR, 2012

Construction of distributed LDoS attack based on one-dimensional random walk algorithm.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Stability analysis of software networks.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2010
A method for topology conformance tests under logical constraints.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A color image watermarking algorithm resistant to print-scan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010


  Loading...