Xiapu Luo
Orcid: 0000-0002-9082-3208Affiliations:
- Hong Kong Polytechnic University, Hong Kong
According to our database1,
Xiapu Luo
authored at least 396 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., October, 2024
Int. J. Hum. Comput. Interact., September, 2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024
A constructivist and pragmatic training framework for blockchain education for IT practitioners.
Educ. Inf. Technol., August, 2024
IEEE Trans. Software Eng., June, 2024
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT.
IEEE Trans. Software Eng., June, 2024
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures.
IEEE/ACM Trans. Netw., June, 2024
IEEE Trans. Knowl. Data Eng., June, 2024
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation.
IEEE Trans. Software Eng., April, 2024
ACM Trans. Softw. Eng. Methodol., February, 2024
Comput. Secur., January, 2024
Guest Editorial Introduction to the Special Section on Advanced Networking Technologies for Web 3.0.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2024
Special Issue on Selected Tools from the Tool Track of the 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023 Tool Track).
Sci. Comput. Program., 2024
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts.
J. Syst. Softw., 2024
Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation.
CoRR, 2024
LLM-CompDroid: Repairing Configuration Compatibility Bugs in Android Apps with Pre-trained Large Language Models.
CoRR, 2024
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web.
CoRR, 2024
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack.
CoRR, 2024
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces.
Proceedings of the ACM on Web Conference 2024, 2024
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization.
Proceedings of the IEEE INFOCOM 2024, 2024
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation.
Proceedings of the 26th Australasian Computing Education Conference, 2024
Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning.
Comput. Secur., December, 2023
IEEE Trans. Software Eng., October, 2023
IEEE Trans. Software Eng., September, 2023
ACM Trans. Softw. Eng. Methodol., September, 2023
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews.
IEEE Trans. Software Eng., August, 2023
IEEE Trans. Computers, August, 2023
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks.
IEEE Internet Things J., July, 2023
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Software Eng., April, 2023
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
IEEE Trans. Software Eng., April, 2023
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection.
IEEE Trans. Software Eng., April, 2023
IEEE Trans. Software Eng., April, 2023
Empir. Softw. Eng., March, 2023
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts.
IEEE Trans. Software Eng., February, 2023
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023
IEEE Trans. Serv. Comput., 2023
Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph.
IEEE Trans. Reliab., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
ACM Comput. Surv., 2023
Towards Function Space Mesh Watermarking: Protecting the Copyright of Signed Distance Fields.
CoRR, 2023
CoRR, 2023
CoRR, 2023
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023
Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem.
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper).
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Software Eng., 2022
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review.
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Software Eng., 2022
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022
Dynamic Virtual Resource Allocation Mechanism for Survivable Services in Emerging NFV-Enabled Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Aeolus: Distributed Execution of Permissioned Blockchain Transactions via State Sharding.
IEEE Trans. Ind. Informatics, 2022
A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
Perform. Evaluation, 2022
Toward Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization.
IEEE Internet Things J., 2022
CoRR, 2022
CoRR, 2022
From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection.
CoRR, 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Resource Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Proceedings of the Passive and Active Measurement - 23rd International Conference, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022
2021
Resource-Ability Assisted Service Function Chain Embedding and Scheduling for 6G Networks With Virtualization.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Software Eng., 2021
IEEE Trans. Software Eng., 2021
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Emerg. Top. Comput., 2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021
Proc. ACM Meas. Anal. Comput. Syst., 2021
A comprehensive comparative study of clustering-based unsupervised defect prediction models.
J. Syst. Softw., 2021
Feature selection and embedding based cross project framework for identifying crashing fault residence.
Inf. Softw. Technol., 2021
Empir. Softw. Eng., 2021
Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview.
CoRR, 2021
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations.
CoRR, 2021
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Detecting concurrency vulnerabilities based on partial orders of memory and thread events.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Smart Contract Security: A Practitioners' Perspective: The Artifact of a Paper Accepted in the 43rd IEEE/ACM International Conference on Software Engineering (ICSE 2021).
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Reliab., 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
J. Syst. Softw., 2020
J. Syst. Softw., 2020
Inf. Softw. Technol., 2020
IACR Cryptol. ePrint Arch., 2020
Data Min. Knowl. Discov., 2020
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020
AxeChain: A Secure and Decentralized blockchain for solving Easily-Verifiable problems.
CoRR, 2020
CoRR, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020
Improving the Efficiency of Blockchain Applications with Smart Contract based Cyber-insurance.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
2019
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets.
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Inf. Forensics Secur., 2019
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices.
IEEE Trans. Computers, 2019
IEEE Softw., 2019
Sensors, 2019
J. Syst. Softw., 2019
TSTSS: A two-stage training subset selection framework for cross version defect prediction.
J. Syst. Softw., 2019
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning.
J. Comput. Sci. Technol., 2019
Software defect prediction based on kernel PCA and weighted extreme learning machine.
Inf. Softw. Technol., 2019
Int. J. Softw. Eng. Knowl. Eng., 2019
SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions.
CoRR, 2019
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Graph embedding based familial analysis of Android malware using unsupervised learning.
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Software Eng., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2018
Softw. Qual. J., 2018
Secur. Commun. Networks, 2018
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store.
J. Inf. Process., 2018
IEEE Intell. Syst., 2018
Cross-version defect prediction via hybrid active learning with kernel principal component analysis.
Proceedings of the 25th International Conference on Software Analysis, 2018
Cross version defect prediction with representative data via sparse subset selection.
Proceedings of the 26th Conference on Program Comprehension, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results, 2018
DeepMatching: A Structural Seed Identification Framework for Social Network Alignment.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Pervasive Mob. Comput., 2017
CoRR, 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Proceedings of the 2nd Workshop on System Software for Trusted Execution, SysTEX@SOSP 2017, 2017
Proceedings of the 25th International Conference on Program Comprehension, 2017
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
Proceedings of the Mobile Security and Privacy, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
J. Syst. Softw., 2016
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection.
Comput. Secur., 2016
A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions.
Comput. J., 2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Micro, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2014
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps.
CoRR, 2014
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014
Proceedings of the 28th Large Installation System Administration Conference, 2014
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Towards a scalable resource-driven approach for detecting repackaged Android applications.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events.
IEEE J. Sel. Areas Commun., 2013
Comput. Secur., 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the NETWORKING 2012, 2012
Proceedings of the Third Annual ACM SIGMM Conference on Multimedia Systems, 2012
2011
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011
Proceedings of the Passive and Active Measurement - 12th International Conference, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
A combinatorial approach to network covert communications with applications in Web Leaks.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of The ACM CoNEXT Student Workshop, 2011
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 49th IEEE Conference on Decision and Control, 2010
2009
EURASIP J. Adv. Signal Process., 2009
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring.
Proceedings of the 2009 USENIX Annual Technical Conference, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009
2008
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Proceedings of the Computer Security, 2007
2006
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
2005
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the 13th International Symposium on Modeling, 2005
Proceedings of the 5th Internet Measurement Conference, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005