default search action
Xiaojing Liao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c51]Yue Xiao, Chaoqi Zhang, Yue Qin, Fares Fahad S. Alharbi, Luyi Xing, Xiaojing Liao:
Measuring Compliance Implications of Third-party Libraries' Privacy Label Disclosure Guidelines. CCS 2024: 1641-1655 - [c50]Mingming Zha, Zilong Lin, Siyuan Tang, Xiaojing Liao, Yuhong Nan, XiaoFeng Wang:
Understanding Cross-Platform Referral Traffic for Illicit Drug Promotion. CCS 2024: 2132-2146 - [c49]Ece Gumusel, Yue Xiao, Yue Qin, Jiaxin Qin, Xiaojing Liao:
Understanding Legal Professionals' Practices and Expectations in Data Breach Incident Reporting. CCS 2024: 2711-2725 - [c48]Xinyao Ma, Chaoqi Zhang, Huadi Zhu, L. Jean Camp, Ming Li, Xiaojing Liao:
Avara: A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks. CCS 2024: 4792-4806 - [c47]Zhengyi Li, Xiaojing Liao:
Understanding and Analyzing Appraisal Systems in the Underground Marketplaces. NDSS 2024 - [c46]Yue Xiao, Adwait Nadkarni, Xiaojing Liao:
Enhancing Transparency and Accountability of TPLs with PBOM: A Privacy Bill of Materials. SCORED@CCS 2024: 1-11 - [c45]Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. SP 2024: 388-406 - [c44]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. USENIX Security Symposium 2024 - [c43]Haoran Lu, Yichen Liu, Xiaojing Liao, Luyi Xing:
Towards Privacy-Preserving Social-Media SDKs on Android. USENIX Security Symposium 2024 - [e2]Bo Luo, Xiaojing Liao, Jun Xu, Engin Kirda, David Lie:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-0636-3 [contents] - [i7]Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang:
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services. CoRR abs/2401.03315 (2024) - [i6]Jian Cui, Hanna Kim, Eugene Jang, Dayeon Yim, Kicheol Kim, Yongjae Lee, Jin-Woo Chung, Seungwon Shin, Xiaojing Liao:
Tweezers: A Framework for Security Event Detection via Event Attribution-centric Tweet Embedding. CoRR abs/2409.08221 (2024) - 2023
- [j6]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. Proc. ACM Meas. Anal. Comput. Syst. 7(1): 18:1-18:27 (2023) - [c42]Yue Qin, Zhuoqun Fu, Chuyun Deng, Xiaojing Liao, Jia Zhang, Haixin Duan:
Stolen Risks of Models with Security Properties. CCS 2023: 756-770 - [c41]Yue Qin, Yue Xiao, Xiaojing Liao:
Vulnerability Intelligence Alignment via Masked Graph Attention Networks. CCS 2023: 2202-2216 - [c40]Geng Hong, Mengying Wu, Pei Chen, Xiaojing Liao, Guoyi Ye, Min Yang:
Understanding and Detecting Abused Image Hosting Modules as Malicious Services. CCS 2023: 3213-3227 - [c39]Zhiqiang Lin, Xiaojing Liao:
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps. CCS 2023: 3655-3656 - [c38]Haoran Lu, Qingchuan Zhao, Yongliang Chen, Xiaojing Liao, Zhiqiang Lin:
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding. SIGMETRICS (Abstracts) 2023: 45-46 - [c37]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels. USENIX Security Symposium 2023: 1091-1108 - [c36]Yuhong Nan, Xueqiang Wang, Luyi Xing, Xiaojing Liao, Ruoyu Wu, Jianliang Wu, Yifan Zhang, XiaoFeng Wang:
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps. USENIX Security Symposium 2023: 6665-6682 - [e1]Zhiqiang Lin, Xiaojing Liao:
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [i5]Zilong Lin, Zhengyi Li, Xiaojing Liao, XiaoFeng Wang, Xiaozhong Liu:
MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion. CoRR abs/2304.11300 (2023) - 2022
- [c35]Peng Wang, Zilong Lin, Xiaojing Liao, XiaoFeng Wang:
Demystifying Local Business Search Poisoning for Illicit Drug Promotion. NDSS 2022 - [c34]Geng Hong, Zhemin Yang, Sen Yang, Xiaojing Liao, Xiaolin Du, Min Yang, Haixin Duan:
Analyzing Ground-Truth Data of Mobile Gambling Scams. SP 2022: 2176-2193 - [c33]Zhi Li, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Xiaojing Liao, Luyi Xing, Mingming Zha, Hai Jin, Deqing Zou:
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms. SP 2022: 2397-2412 - [c32]Qiushi Wu, Yue Xiao, Xiaojing Liao, Kangjie Lu:
OS-Aware Vulnerability Prioritization via Differential Severity Analysis. USENIX Security Symposium 2022: 395-412 - [i4]Yue Xiao, Zhengyi Li, Yue Qin, Xiaolong Bai, Jiale Guan, Xiaojing Liao, Luyi Xing:
Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. CoRR abs/2206.06274 (2022) - [i3]Yue Qin, Xiaojing Liao:
Cybersecurity Entity Alignment via Masked Graph Attention Networks. CoRR abs/2207.01434 (2022) - 2021
- [j5]Yeonjoon Lee, Xueqiang Wang, Xiaojing Liao, XiaoFeng Wang:
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis. IEEE Trans. Dependable Secur. Comput. 18(5): 2390-2402 (2021) - [c31]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CCS 2021: 477-494 - [c30]Xianghang Mi, Siyuan Tang, Zhengyi Li, Xiaojing Liao, Feng Qian, XiaoFeng Wang:
Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks. NDSS 2021 - [c29]Liya Su, Xinyue Shen, Xiangyu Du, Xiaojing Liao, XiaoFeng Wang, Luyi Xing, Baoxu Liu:
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications. USENIX Security Symposium 2021: 1307-1324 - [c28]Jice Wang, Yue Xiao, Xueqiang Wang, Yuhong Nan, Luyi Xing, Xiaojing Liao, Jinwei Dong, Nicolás Serrano, Haoran Lu, XiaoFeng Wang, Yuqing Zhang:
Understanding Malicious Cross-library Data Harvesting on Android. USENIX Security Symposium 2021: 4133-4150 - [i2]Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David A. Wagner:
Learning Security Classifiers with Verified Global Robustness Properties. CoRR abs/2105.11363 (2021) - 2020
- [c27]Haoran Lu, Luyi Xing, Yue Xiao, Yifan Zhang, Xiaojing Liao, XiaoFeng Wang, Xueqiang Wang:
Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems. CCS 2020: 569-585 - [c26]Eihal Alowaisheq, Siyuan Tang, Zhihao Wang, Fatemah Alharbi, Xiaojing Liao, XiaoFeng Wang:
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral. CCS 2020: 1307-1322 - [c25]Tao Lv, Ruishi Li, Yi Yang, Kai Chen, Xiaojing Liao, XiaoFeng Wang, Peiwei Hu, Luyi Xing:
RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection. CCS 2020: 1837-1852 - [c24]Peng Wang, Xiaojing Liao, Yue Qin, XiaoFeng Wang:
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals. NDSS 2020
2010 – 2019
- 2019
- [j4]Xiaojing Liao, Preethi Srinivasan, David Formby, Raheem A. Beyah:
Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid. IEEE Trans. Dependable Secur. Comput. 16(6): 1026-1039 (2019) - [j3]Zhen Hong, Qian Shao, Xiaojing Liao, Raheem Beyah:
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home. Wirel. Networks 25(7): 3805-3823 (2019) - [c23]Eihal Alowaisheq, Peng Wang, Sumayah A. Alrwais, Xiaojing Liao, XiaoFeng Wang, Tasneem Alowaisheq, Xianghang Mi, Siyuan Tang, Baojun Liu:
Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs. NDSS 2019 - [c22]Kan Yuan, Di Tang, Xiaojing Liao, XiaoFeng Wang, Xuan Feng, Yi Chen, Menghan Sun, Haoran Lu, Kehuan Zhang:
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion. IEEE Symposium on Security and Privacy 2019: 952-966 - [c21]Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah A. Alrwais, Limin Sun, Ying Liu:
Resident Evil: Understanding Residential IP Proxy as a Dark Service. IEEE Symposium on Security and Privacy 2019: 1185-1201 - [c20]Yi Chen, Luyi Xing, Yue Qin, Xiaojing Liao, XiaoFeng Wang, Kai Chen, Wei Zou:
Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis. USENIX Security Symposium 2019: 747-764 - [c19]Yeonjoon Lee, Xueqiang Wang, Kwangwuk Lee, Xiaojing Liao, XiaoFeng Wang, Tongxin Li, Xianghang Mi:
Understanding iOS-based Crowdturfing Through Hidden UI Analysis. USENIX Security Symposium 2019: 765-781 - [c18]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - 2018
- [j2]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem Beyah:
Cloud repository as a malicious service: challenge, identification and implication. Cybersecur. 1(1): 14 (2018) - [c17]Peng Wang, Xianghang Mi, Xiaojing Liao, XiaoFeng Wang, Kan Yuan, Feng Qian, Raheem A. Beyah:
Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations. NDSS 2018 - [c16]Kan Yuan, Haoran Lu, Xiaojing Liao, XiaoFeng Wang:
Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces. USENIX Security Symposium 2018: 1027-1041 - 2017
- [b1]Xiaojing Liao:
Towards automatically evaluating security risks and providing cyber intelligence. Georgia Institute of Technology, Atlanta, GA, USA, 2017 - [j1]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos. IEEE Secur. Priv. 15(2): 42-49 (2017) - [c15]Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154 - [c14]Sumayah A. Alrwais, Xiaojing Liao, Xianghang Mi, Peng Wang, Xiaofeng Wang, Feng Qian, Raheem A. Beyah, Damon McCoy:
Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks. IEEE Symposium on Security and Privacy 2017: 805-823 - 2016
- [c13]Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang, Zhou Li:
Catching predators at watering holes: finding and understanding strategically compromised websites. ACSAC 2016: 153-166 - [c12]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhou Li, Luyi Xing, Raheem A. Beyah:
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence. CCS 2016: 755-766 - [c11]Xiaojing Liao, Sumayah A. Alrwais, Kan Yuan, Luyi Xing, XiaoFeng Wang, Shuang Hao, Raheem A. Beyah:
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service. CCS 2016: 1541-1552 - [c10]Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu:
Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf. IEEE Symposium on Security and Privacy 2016: 655-674 - [c9]Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Hai-Xin Duan, Kun Du, Eihal Alowaisheq, Sumayah A. Alrwais, Luyi Xing, Raheem A. Beyah:
Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search. IEEE Symposium on Security and Privacy 2016: 707-723 - [c8]Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem A. Beyah:
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services. WWW 2016: 321-332 - 2015
- [c7]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS. CCS 2015: 31-43 - [c6]Xiaojing Liao:
Design of Literature Management Tool. HCI (13) 2015: 230-240 - [i1]Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, Shi-Min Hu, Xinhui Han:
Unauthorized Cross-App Resource Access on MAC OS X and iOS. CoRR abs/1505.06836 (2015) - 2014
- [c5]Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah:
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. DSN 2014: 287-298 - [c4]Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah:
Towards Secure Metering Data Analysis via Distributed Differential Privacy. DSN 2014: 780-785 - 2013
- [c3]Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah:
S-Match: An efficient privacy-preserving profile matching scheme. CNS 2013: 377-378 - [c2]Jing He, Shouling Ji, Xiaojing Liao, Hisham M. Haddad, Raheem A. Beyah:
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences. IPCCC 2013: 1-8 - 2012
- [c1]Xiaojing Liao, Jianzhong Li:
Privacy-preserving and secure top-k query in two-tier wireless sensor network. GLOBECOM 2012: 335-341
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint