Xusheng Xiao

Orcid: 0000-0003-4797-4294

According to our database1, Xusheng Xiao authored at least 78 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph.
CoRR, 2024

Symbolic Prompt Tuning Completes the App Promotion Graph.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews.
IEEE Trans. Software Eng., April, 2023

LegoDroid: flexible Android app decomposition and instant installation.
Sci. China Inf. Sci., April, 2023

CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts.
CoRR, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

DISTDET: A Cost-Effective Distributed Cyber Threat Detection System.
Proceedings of the 32nd USENIX Security Symposium, 2023

Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

What did you pack in my app? a systematic analysis of commercial Android packers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

WebEvo: taming web application evolution via detecting semantic structure changes.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

DroidMutator: an effective mutation analysis tool for Android applications.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Metagraph Aggregated Heterogeneous Graph Neural Network for Illicit Traded Product Identification in Underground Market.
Proceedings of the 20th IEEE International Conference on Data Mining, 2020

APTrace: A Responsive System for Agile Enterprise Level Causality Analysis.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

2019
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security.
Proc. VLDB Endow., 2019

Bug Triaging Based on Tossing Sequence Modeling.
J. Comput. Sci. Technol., 2019

A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security.
CoRR, 2019

Paladin: Automated Generation of Reproducible Test Cases for Android Apps.
Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications, 2019

PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019

An Image-Inspired and CNN-Based Android Malware Detection Approach.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Characterizing Android App Signing Issues.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Progressive processing of system-behavioral query.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Are vulnerabilities discovered and resolved like other defects?
Empir. Softw. Eng., 2018

A Query Tool for Efficiently Investigating Risky Software Behaviors.
CoRR, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
CoRR, 2018

Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation.
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018

SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection.
Proceedings of the 27th USENIX Security Symposium, 2018

AIQL: Enabling Efficient Attack Investigation from System Monitoring Data.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

An Effective Approach for Routing the Bug Reports to the Right Fixers.
Proceedings of the Tenth Asia-Pacific Symposium on Internetware, 2018

PreInfer: Automatic Inference of Preconditions via Symbolic Analysis.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
RunDroid: recovering execution call graphs for Android applications.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

An energy-efficient offloading framework with predictable temporal correctness.
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

2016
Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems.
J. Comput. Sci. Technol., 2016

High-confidence software evolution.
Sci. China Inf. Sci., 2016

Measuring code behavioral similarity for programming and software engineering education.
Proceedings of the 38th International Conference on Software Engineering, 2016

High Fidelity Data Reduction for Big Data Security Dependency Analyses.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Behavior Query Discovery in System-Generated Temporal Graphs.
Proc. VLDB Endow., 2015

User-aware privacy control via extended static-information-flow analysis.
Autom. Softw. Eng., 2015

SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps.
Proceedings of the 24th USENIX Security Symposium, 2015

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Cooperative Software Testing and Analysis: Advances and Challenges.
J. Comput. Sci. Technol., 2014

ARC++: effective typestate and lifetime dependency analysis.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

Context-sensitive delta inference for identifying workload-dependent performance bottlenecks (invited talk abstract).
Proceedings of the 2014 Joint International Workshop on Dynamic Analysis (WODA) and Software and System Performance Testing, 2014

Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Relation extraction for inferring access control rules from natural language artifacts.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Characteristic studies of loop problems for structural test generation via symbolic execution.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013

Context-sensitive delta inference for identifying workload-dependent performance bottlenecks.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

2012
Advances on Improving Automation in Developer Testing.
Adv. Comput., 2012

Automated extraction of security policies from natural-language software documents.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

User-aware privacy control via extended static-information-flow analysis.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Inferring method specifications from natural language API descriptions.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
Covana: precise identification of problems in pex.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Precise identification of problems for structural test generation.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Problem identification for structural test generation: first step towards cooperative developer testing.
Proceedings of the 33rd International Conference on Software Engineering, 2011


  Loading...