default search action
Xiapu Luo
Person information
- affiliation: Hong Kong Polytechnic University, Hong Kong
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j130]Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. Comput. Secur. 136: 103577 (2024) - [j129]Alven C. Y. Leung, Dennis Y. W. Liu, Xiapu Luo, Man Ho Au:
A constructivist and pragmatic training framework for blockchain education for IT practitioners. Educ. Inf. Technol. 29(12): 15813-15854 (2024) - [j128]Yonghao Long, Xiapu Luo, Yujie Zhu, Kun-Pyo Lee, Stephen Jia Wang:
Data Transparency Design in Internet of Things: A Systematic Review. Int. J. Hum. Comput. Interact. 40(18): 5003-5025 (2024) - [j127]Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, Hongxin Hu:
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 89:1-89:28 (2024) - [j126]Ruiyao Huang, Qingni Shen, Yuchen Wang, Yiqi Wu, Zhonghai Wu, Xiapu Luo, Anbang Ruan:
ReenRepair: Automatic and semantic equivalent repair of reentrancy in smart contracts. J. Syst. Softw. 216: 112107 (2024) - [j125]Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, Haipeng Cai:
Learning to Detect and Localize Multilingual Bugs. Proc. ACM Softw. Eng. 1(FSE): 2190-2213 (2024) - [j124]Ying Wang, Tao Zhang, Xiapu Luo, Peng Liang:
Special Issue on Selected Tools from the Tool Track of the 30th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER 2023 Tool Track). Sci. Comput. Program. 238: 103167 (2024) - [j123]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [j122]Yang Shi, Tianyuan Luo, Jingwen Liang, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2982-2996 (2024) - [j121]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Hexiang Wang, Baolei Hou, Lei Wu, Xiapu Luo:
An Empirical Study on the Insecurity of End-of-Life (EoL) IoT Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3501-3514 (2024) - [j120]Yulin Zhu, Tomasz P. Michalak, Xiapu Luo, Xiaoge Zhang, Kai Zhou:
Toward Secrecy-Aware Attacks Against Trust Prediction in Signed Social Networks. IEEE Trans. Inf. Forensics Secur. 19: 3567-3580 (2024) - [j119]Xiangming Wang, Yang Liu, Kexin Jiao, Pengfei Liu, Xiapu Luo, Ting Liu:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. IEEE Trans. Inf. Forensics Secur. 19: 4012-4027 (2024) - [j118]Yulin Zhu, Liang Tong, Gaolei Li, Xiapu Luo, Kai Zhou:
FocusedCleaner: Sanitizing Poisoned Graphs for Robust GNN-Based Node Classification. IEEE Trans. Knowl. Data Eng. 36(6): 2476-2489 (2024) - [j117]Zigui Jiang, Weilin Zheng, Bo Liu, Hong-Ning Dai, Haoran Xie, Xiapu Luo, Zibin Zheng, Qing Li:
Unravelling Token Ecosystem of EOSIO Blockchain. IEEE Trans. Knowl. Data Eng. 36(10): 5423-5439 (2024) - [j116]Henry Hong-Ning Dai, Daniel Xiapu Luo, Zibin Zheng, Yan Zhang, Qin Hu:
Guest Editorial Introduction to the Special Section on Advanced Networking Technologies for Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3915-3917 (2024) - [j115]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [j114]Xiaobo Ma, Jian Qu, Mawei Shi, Bingyu An, Jianfeng Li, Xiapu Luo, Junjie Zhang, Zhenhua Li, Xiaohong Guan:
Website Fingerprinting on Encrypted Proxies: A Flow-Context-Aware Approach and Countermeasures. IEEE/ACM Trans. Netw. 32(3): 1904-1919 (2024) - [j113]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. ACM Trans. Softw. Eng. Methodol. 33(2): 37:1-37:29 (2024) - [j112]Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Xiapu Luo, Jingzhu He, Yutian Tang:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. IEEE Trans. Software Eng. 50(4): 854-883 (2024) - [j111]Yutian Tang, Zhijie Liu, Zhichao Zhou, Xiapu Luo:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. IEEE Trans. Software Eng. 50(6): 1340-1359 (2024) - [j110]Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, Liang Feng Zhang:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. IEEE Trans. Software Eng. 50(6): 1548-1584 (2024) - [j109]Muhui Jiang, Xiaoye Zheng, Rui Chang, Yajin Zhou, Xiapu Luo:
Examiner-Pro: Testing Arm Emulators Across Different Privileges. IEEE Trans. Software Eng. 50(11): 2786-2806 (2024) - [j108]Pengcheng Zhang, Ben Wang, Xiapu Luo, Hai Dong:
SCAnoGenerator: Automatic Anomaly Injection for Ethereum Smart Contracts. IEEE Trans. Software Eng. 50(11): 2983-3006 (2024) - [c237]Xingyu Zhu, Guanhui Ye, Xiapu Luo, Xuetao Wei:
Rethinking Mesh Watermark: Towards Highly Robust and Adaptable Deep 3D Mesh Watermarking. AAAI 2024: 7784-7792 - [c236]Alven C. Y. Leung, Zoey Ziyi Li, Dennis Y. W. Liu, Richard W. C. Lui, Daniel Xiapu Luo, Siu Wo Tarloff Im:
Transfer of Learning from Metaverse to Blockchain for Secondary Students: Implementation and Effectiveness Evaluation. ACE 2024: 154-163 - [c235]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts Using Large Language Models. ACISP (3) 2024: 424-443 - [c234]Xiang Zhou, Xi Xiao, Qing Li, Bin Zhang, Guangwu Hu, Xiapu Luo, Tianwei Zhang:
CapsuleFormer: A Capsule and Transformer combined model for Decentralized Application encrypted traffic classification. AsiaCCS 2024 - [c233]Zihao Li, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen:
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup. CCS 2024: 971-985 - [c232]Feng Luo, Huangkun Lin, Zihao Li, Xiapu Luo, Ruijie Luo, Zheyuan He, Shuwei Song, Ting Chen, Wenxuan Luo:
Towards Automatic Discovery of Denial of Service Weaknesses in Blockchain Resource Models. CCS 2024: 1016-1030 - [c231]Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. CCS 2024: 1626-1640 - [c230]Zhiyuan Sun, Zihao Li, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou, Yinqian Zhang:
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back. CCS 2024: 2577-2590 - [c229]Shijian Chen, Muhui Jiang, Xiapu Luo:
Exploring the Security Issues of Real World Assets (RWA). DeFi@CCS 2024: 31-40 - [c228]Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou:
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach. ICDE 2024: 1213-1227 - [c227]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. ICME 2024: 1-6 - [c226]Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. ICSE 2024: 63:1-63:13 - [c225]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. ICSE 2024: 127:1-127:13 - [c224]Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai:
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. ICSE 2024: 149:1-149:13 - [c223]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c222]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. ICSE 2024: 159:1-159:13 - [c221]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. IMC 2024: 259-279 - [c220]Litao Qiao, Bang Wu, Heng Li, Cuiying Gao, Wei Yuan, Xiapu Luo:
Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense. INFOCOM 2024: 211-220 - [c219]Jianfeng Li, Zheng Lin, Xiaobo Ma, Jianhao Li, Jian Qu, Xiapu Luo, Xiaohong Guan:
DNSScope: Fine-Grained DNS Cache Probing for Remote Network Activity Characterization. INFOCOM 2024: 1651-1660 - [c218]Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang:
ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum. INFOCOM 2024: 1691-1700 - [c217]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. Internetware 2024 - [c216]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. ISSTA 2024: 528-540 - [c215]Peilin Zheng, Bowei Su, Xiapu Luo, Ting Chen, Neng Zhang, Zibin Zheng:
LENT-SSE: Leveraging Executed and Near Transactions for Speculative Symbolic Execution of Smart Contracts. ISSTA 2024: 566-577 - [c214]Shuohan Wu, Zihao Li, Hao Zhou, Xiapu Luo, Jianfeng Li, Haoyu Wang:
Following the "Thread": Toward Finding Manipulatable Bottlenecks in Blockchain Clients. ISSTA 2024: 1440-1452 - [c213]Shuwei Song, Jiachi Chen, Ting Chen, Xiapu Luo, Teng Li, Wenwu Yang, Leqing Wang, Weijie Zhang, Feng Luo, Zheyuan He, Yi Lu, Pan Li:
Empirical Study of Move Smart Contract Security: Introducing MoveScan for Enhanced Analysis. ISSTA 2024: 1682-1694 - [c212]Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu:
EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM. LCTES 2024: 131-142 - [c211]Liu Wang, Conghui Zheng, Haoyu Wang, Xiapu Luo, Gareth Tyson, Yi Wang, Shangguang Wang:
Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity. MSR 2024: 322-334 - [c210]Elliott Wen, Jiaxiang Zhou, Xiapu Luo, Giovanni Russello, Jens Dietrich:
Keep Me Updated: An Empirical Study on Embedded JavaScript Engines in Android Apps. MSR 2024: 361-372 - [c209]Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, Chao Zhang:
Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack. NDSS 2024 - [c208]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. NDSS 2024 - [c207]Jincheng Wang, Le Yu, Xiapu Luo:
LLMIF: Augmented Large Language Model for Fuzzing IoT Devices. SP 2024: 881-896 - [c206]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. SP 2024: 2180-2197 - [c205]Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. SP 2024: 2255-2272 - [c204]Pengfei Jing, Zhiqiang Cai, Yingjie Cao, Le Yu, Yuefeng Du, Wenkai Zhang, Chenxiong Qian, Xiapu Luo, Sen Nie, Shi Wu:
Revisiting Automotive Attack Surfaces: a Practitioners' Perspective. SP 2024: 2348-2365 - [c203]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. USENIX Security Symposium 2024 - [c202]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [c201]Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, Hongxin Hu:
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces. WWW 2024: 1081-1091 - [c200]Yi Xie, Jiahao Feng, Wenju Huang, Yixi Zhang, Xueliang Sun, Xiaochou Chen, Xiapu Luo:
Contrastive Fingerprinting: A Novel Website Fingerprinting Attack over Few-shot Traces. WWW 2024: 1203-1214 - [i97]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i96]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i95]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i94]Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. CoRR abs/2402.02973 (2024) - [i93]Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. CoRR abs/2402.13815 (2024) - [i92]Zhijie Liu, Yutian Tang, Meiyun Li, Xin Jin, Yunfei Long, Liang Feng Zhang, Xiapu Luo:
LLM-CompDroid: Repairing Configuration Compatibility Bugs in Android Apps with Pre-trained Large Language Models. CoRR abs/2402.15078 (2024) - [i91]Junjie Ma, Muhui Jiang, Jinan Jiang, Xiapu Luo, Yufeng Hu, Yajin Zhou, Qi Wang, Fengwei Zhang:
Demystifying the DAO Governance Process. CoRR abs/2403.11758 (2024) - [i90]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. CoRR abs/2405.20561 (2024) - [i89]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. CoRR abs/2406.10687 (2024) - [i88]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
Detect Llama - Finding Vulnerabilities in Smart Contracts using Large Language Models. CoRR abs/2407.08969 (2024) - [i87]Youqian Zhang, Chunxi Yang, Eugene Yujun Fu, Qinhong Jiang, Chen Yan, Sze-Yiu Chau, Grace Ngai, Hong Va Leong, Xiapu Luo, Wenyuan Xu:
Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection. CoRR abs/2407.16327 (2024) - [i86]Zhensu Sun, Xiaoning Du, Xiapu Luo, Fu Song, David Lo, Li Li:
FDI: Attack Neural Code Generation Systems through User Feedback Channel. CoRR abs/2408.04194 (2024) - [i85]Youqian Zhang, MK Michael Cheung, Chunxi Yang, Xinwei Zhai, Zitong Shen, Xinyu Ji, Eugene Yujun Fu, Sze-Yiu Chau, Xiapu Luo:
Modeling Electromagnetic Signal Injection Attacks on Camera-based Smart Systems: Applications and Mitigation. CoRR abs/2408.05124 (2024) - [i84]Raphael Hiesgen, Marcin Nawrocki, Marinho P. Barcellos, Daniel Kopp, Oliver Hohlfeld, Echo Chan, Roland Dobbins, Christian Doerr, Christian Rossow, Daniel R. Thomas, Mattijs Jonker, Ricky K. P. Mok, Xiapu Luo, John Kristoff, Thomas C. Schmidt, Matthias Wählisch, kc claffy:
The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS Assessments. CoRR abs/2410.11708 (2024) - [i83]Zihao Li, Xinghao Peng, Zheyuan He, Xiapu Luo, Ting Chen:
fAmulet: Finding Finalization Failure Bugs in Polygon zkRollup. CoRR abs/2410.12210 (2024) - 2023
- [j107]Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo:
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. Comput. Secur. 135: 103479 (2023) - [j106]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation for Smart Contracts: A Comprehensive Survey. ACM Comput. Surv. 55(14s): 326:1-326:37 (2023) - [j105]Zigui Jiang, Xiuwen Tang, Zibin Zheng, Jinyan Guo, Xiapu Luo, Yin Li:
Calling relationship investigation and application on Ethereum Blockchain System. Empir. Softw. Eng. 28(2): 31 (2023) - [j104]Zuchao Ma, Liang Liu, Weizhi Meng, Xiapu Luo, Lisong Wang, Wenjuan Li:
ADCL: Toward an Adaptive Network Intrusion Detection System Using Collaborative Learning in IoT Networks. IEEE Internet Things J. 10(14): 12521-12536 (2023) - [j103]Shipeng Li, Jingwei Li, Yuxing Tang, Xiapu Luo, Zheyuan He, Zihao Li, Xi Cheng, Yang Bai, Ting Chen, Yuzhe Tang, Zhe Liu, Xiaosong Zhang:
BlockExplorer: Exploring Blockchain Big Data Via Parallel Processing. IEEE Trans. Computers 72(8): 2377-2389 (2023) - [j102]Jingjing Zhang, Yongjie Ye, Weigang Wu, Xiapu Luo:
Boros: Secure and Efficient Off-Blockchain Transactions via Payment Channel Hub. IEEE Trans. Dependable Secur. Comput. 20(1): 407-421 (2023) - [j101]Cuiying Gao, Minghui Cai, Shuijun Yin, Gaozhun Huang, Heng Li, Wei Yuan, Xiapu Luo:
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features. IEEE Trans. Inf. Forensics Secur. 18: 5056-5068 (2023) - [j100]Litao Qiao, Bang Wu, Shuijun Yin, Heng Li, Wei Yuan, Xiapu Luo:
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Trans. Inf. Forensics Secur. 18: 5375-5386 (2023) - [j99]Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Sherman Shen:
Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Trans. Mob. Comput. 22(6): 3303-3317 (2023) - [j98]Qing Li, Xiao Ma, Ao Zhou, Xiapu Luo, Fangchun Yang, Shangguang Wang:
User-Oriented Edge Node Grouping in Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(6): 3691-3705 (2023) - [j97]Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, Xiaosong Zhang:
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts. ACM Trans. Softw. Eng. Methodol. 32(1): 26:1-26:35 (2023) - [j96]Yuan Huang, Hanyang Guo, Xi Ding, Junhuai Shu, Xiangping Chen, Xiapu Luo, Zibin Zheng, Xiaocong Zhou:
A Comparative Study on Method Comment and Inline Comment. ACM Trans. Softw. Eng. Methodol. 32(5): 126:1-126:26 (2023) - [j95]Dawei Yuan, Sen Fang, Tao Zhang, Zhou Xu, Xiapu Luo:
Java Code Clone Detection by Exploiting Semantic and Syntax Information From Intermediate Code-Based Graph. IEEE Trans. Reliab. 72(2): 511-526 (2023) - [j94]Zigui Jiang, Zibin Zheng, Kai Chen, Xiapu Luo, Xiuwen Tang, Yin Li:
Exploring Smart Contract Recommendation: Towards Efficient Blockchain Development. IEEE Trans. Serv. Comput. 16(3): 1822-1832 (2023) - [j93]Zhou Liao, Shuwei Song, Hang Zhu, Xiapu Luo, Zheyuan He, Renkai Jiang, Ting Chen, Jiachi Chen, Tao Zhang, Xiaosong Zhang:
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart Contracts. IEEE Trans. Software Eng. 49(2): 777-801 (2023) - [j92]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [j91]Muhui Jiang, Qinming Dai, Wenlong Zhang, Rui Chang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
A Comprehensive Study on ARM Disassembly Tools. IEEE Trans. Software Eng. 49(4): 1683-1703 (2023) - [j90]Yu Nong, Rainy Sharma, Abdelwahab Hamou-Lhadj, Xiapu Luo, Haipeng Cai:
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection. IEEE Trans. Software Eng. 49(4): 1983-2005 (2023) - [j89]Yibo Wang, Kai Li, Yuzhe Tang, Jiaqi Chen, Qi Zhang, Xiapu Luo, Ting Chen:
Towards Saving Blockchain Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. IEEE Trans. Software Eng. 49(4): 2980-2995 (2023) - [j88]Youshuai Tan, Jinfu Chen, Weiyi Shang, Tao Zhang, Sen Fang, Xiapu Luo, Zijie Chen, Shuhao Qi:
STRE: An Automated Approach to Suggesting App Developers When to Stop Reading Reviews. IEEE Trans. Software Eng. 49(8): 4135-4151 (2023) - [j87]Pengcheng Zhang, Qifan Yu, Yan Xiao, Hai Dong, Xiapu Luo, Xiao Wang, Meng Zhang:
BiAn: Smart Contract Source Code Obfuscation. IEEE Trans. Software Eng. 49(9): 4456-4476 (2023) - [j86]Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan:
Do Pretrained Language Models Indeed Understand Software Engineering Tasks? IEEE Trans. Software Eng. 49(10): 4639-4655 (2023) - [c199]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c198]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CCS 2023: 165-179 - [c197]Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, Haipeng Cai:
PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing. CCS 2023: 1645-1659 - [c196]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c195]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c194]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c193]Tianqi Li, Rujun Hu, Lei Xue, Xiapu Luo:
State-Aware Unsafe Driving Action Detection and Defense. ICDCS 2023: 1077-1078 - [c192]Peilin Zheng, Xiapu Luo, Zibin Zheng:
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts. ICSE 2023: 307-318 - [c191]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c190]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c189]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c188]Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen, Chao Zhang:
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. ISSTA 2023: 867-879 - [c187]Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. ISSTA 2023: 917-928 - [c186]Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. ASE 2023: 939-950 - [c185]Tao Ni, Jianfeng Li, Xiaokuan Zhang, Chaoshun Zuo, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning. MobiCom 2023: 73:1-73:15 - [c184]Tiru Wu, Xi Xiao, Qing Li, Qixu Liu, Guangwu Hu, Xiapu Luo, Yong Jiang:
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs. SECON 2023: 456-464 - [c183]Zhutian Lin, Xi Xiao, Guangwu Hu, Bin Zhang, Qixu Liu, Xiapu Luo:
Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum. SECON 2023: 501-509 - [c182]Kunsong Zhao, Zihao Li, Jianfeng Li, He Ye, Xiapu Luo, Ting Chen:
DeepInfer: Deep Type Inference from Smart Contract Bytecode. ESEC/SIGSOFT FSE 2023: 745-757 - [c181]Huancheng Zhou, Sungmin Hong, Yangyang Liu, Xiapu Luo, Weichao Li, Guofei Gu:
Mew: Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches. SP 2023: 3178-3192 - [c180]Tao Ni, Xiaokuan Zhang, Chaoshun Zuo, Jianfeng Li, Zhenyu Yan, Wubing Wang, Weitao Xu, Xiapu Luo, Qingchuan Zhao:
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels. SP 2023: 3399-3415 - [c179]Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
MATH - Finding and Fixing Exploits in Algorand. TrustCom 2023: 1572-1579 - [c178]Jian Qu, Xiaobo Ma, Jianfeng Li, Xiapu Luo, Lei Xue, Junjie Zhang, Zhenhua Li, Li Feng, Xiaohong Guan:
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic Fingerprinting. USENIX Security Symposium 2023: 589-606 - [c177]Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo:
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. USENIX Security Symposium 2023: 1181-1198 - [c176]Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, Haipeng Cai:
PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems. USENIX Security Symposium 2023: 1379-1396 - [c175]Zhiyuan Sun, Xiapu Luo, Yinqian Zhang:
Panda: Security Analysis of Algorand Smart Contracts. USENIX Security Symposium 2023: 1811-1828 - [c174]Ming Yuan, Bodong Zhao, Penghui Li, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang:
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. USENIX Security Symposium 2023: 2849-2866 - [c173]Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan Zhang, Yaowen Zheng, Xian Zhan, Xiaofei Xie, Xiapu Luo, Xinghua Li, Yang Liu, Sheikh Mahbub Habib:
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation. USENIX Security Symposium 2023: 2867-2884 - [c172]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. USENIX Security Symposium 2023: 3259-3276 - [c171]Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He:
SHELTER: Extending Arm CCA with Isolation in User Space. USENIX Security Symposium 2023: 6257-6274 - [c170]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [c169]Zhiying Wu, Jieli Liu, Jiajing Wu, Zibin Zheng, Xiapu Luo, Ting Chen:
Know Your Transactions: Real-time and Generic Transaction Semantic Representation on Blockchain & Web3 Ecosystem. WWW 2023: 1918-1927 - [c168]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. WWW 2023: 2066-2075 - [i82]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. CoRR abs/2301.12102 (2023) - [i81]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. CoRR abs/2301.12348 (2023) - [i80]Nikolay Ivanov, Chenning Li, Qiben Yan, Zhiyuan Sun, Zhichao Cao, Xiapu Luo:
Security Threat Mitigation For Smart Contracts: A Survey. CoRR abs/2302.07347 (2023) - [i79]Kai Wang, Maike Tong, Changhao Wu, Jun Pang, Chen Chen, Xiapu Luo, Weili Han:
Exploring Unconfirmed Transactions for Effective Bitcoin Address Clustering. CoRR abs/2303.01012 (2023) - [i78]Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo:
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. CoRR abs/2303.08509 (2023) - [i77]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. CoRR abs/2305.02383 (2023) - [i76]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. CoRR abs/2305.07067 (2023) - [i75]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. CoRR abs/2307.00549 (2023) - [i74]Yutian Tang, Zhijie Liu, Zhichao Zhou, Xiapu Luo:
ChatGPT vs SBST: A Comparative Assessment of Unit Test Suite Generation. CoRR abs/2307.00588 (2023) - [i73]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023) - [i72]Xingyu Zhu, Guanhui Ye, Xuetao Wei, Xiapu Luo:
WM-NET: Robust Deep 3D Watermarking with Limited Data. CoRR abs/2307.11628 (2023) - [i71]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. CoRR abs/2307.16713 (2023) - [i70]Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou:
Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach. CoRR abs/2308.01063 (2023) - [i69]Zhijie Liu, Yutian Tang, Xiapu Luo, Yuming Zhou, Liang Feng Zhang:
No Need to Lift a Finger Anymore? Assessing the Quality of Code Generation by ChatGPT. CoRR abs/2308.04838 (2023) - [i68]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i67]Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Xiapu Luo, Jingzhu He, Yutian Tang:
Coverage Goal Selector for Combining Multiple Criteria in Search-Based Unit Test Generation. CoRR abs/2309.07518 (2023) - [i66]Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai:
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. CoRR abs/2310.15436 (2023) - [i65]Li Li, Xiang Gao, Hailong Sun, Chunming Hu, Xiaoyu Sun, Haoyu Wang, Haipeng Cai, Ting Su, Xiapu Luo, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy, Tao Xie, Haibo Chen, Huaimin Wang:
Software Engineering for OpenHarmony: A Research Roadmap. CoRR abs/2311.01311 (2023) - [i64]Xingyu Zhu, Guanhui Ye, Chengdong Dong, Xiapu Luo, Xuetao Wei:
Towards Function Space Mesh Watermarking: Protecting the Copyright of Signed Distance Fields. CoRR abs/2311.12059 (2023) - [i63]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CoRR abs/2312.01091 (2023) - [i62]Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang, Zibin Zheng:
The Dark Side of NFTs: A Large-Scale Empirical Study of Wash Trading. CoRR abs/2312.12544 (2023) - [i61]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 672 (2023) - [i60]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. IACR Cryptol. ePrint Arch. 2023: 1855 (2023) - 2022
- [j85]Yuan Huang, Xingjian Liang, Zhihao Chen, Nan Jia, Xiapu Luo, Xiangping Chen, Zibin Zheng, Xiaocong Zhou:
Reviewing rounds prediction for code patches. Empir. Softw. Eng. 27(1): 7 (2022) - [j84]Haotong Cao, Jianbo Du, Haitao Zhao, Daniel Xiapu Luo, Neeraj Kumar, Longxiang Yang, F. Richard Yu:
Toward Tailored Resource Allocation of Slices in 6G Networks With Softwarization and Virtualization. IEEE Internet Things J. 9(9): 6623-6637 (2022) - [j83]Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, T.-H. Hubert Chan, Fengwei Zhang, Xiapu Luo, Sen Wang, Gong Zhang, Heming Cui:
Efficient and DoS-resistant Consensus for Permissioned Blockchains. Perform. Evaluation 153: 102244 (2022) - [j82]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst. 6(2): 40:1-40:27 (2022) - [j81]Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, T.-H. Hubert Chan, Fengwei Zhang, Xiapu Luo, Sen Wang, Gong Zhang, Heming Cui:
Efficient and DoS-resistant Consensus for Permissioned Blockchains. SIGMETRICS Perform. Evaluation Rev. 49(3): 61-62 (2022) - [j80]Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang, Xiapu Luo, Heming Cui:
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network. IEEE Trans. Dependable Secur. Comput. 19(4): 2286-2303 (2022) - [j79]Xi Xiao, Wentao Xiao, Rui Li, Xiapu Luo, Haitao Zheng, Shutao Xia:
EBSNN: Extended Byte Segment Neural Network for Network Traffic Classification. IEEE Trans. Dependable Secur. Comput. 19(5): 3521-3538 (2022) - [j78]Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. IEEE Trans. Inf. Forensics Secur. 17: 1573-1582 (2022) - [j77]Yuming Feng, Weizhe Zhang, Xiapu Luo, Bin Zhang:
A Consortium Blockchain-Based Access Control Framework With Dynamic Orderer Node Selection for 5G-Enabled Industrial IoT. IEEE Trans. Ind. Informatics 18(4): 2840-2848 (2022) - [j76]Peilin Zheng, Quanqing Xu, Xiapu Luo, Zibin Zheng, Weilin Zheng, Xu Chen, Zhiyuan Zhou, Ying Yan, Hui Zhang:
Aeolus: Distributed Execution of Permissioned Blockchain Transactions via State Sharding. IEEE Trans. Ind. Informatics 18(12): 9227-9238 (2022) - [j75]Haotong Cao, Haitao Zhao, Daniel Xiapu Luo, Neeraj Kumar, Longxiang Yang:
Dynamic Virtual Resource Allocation Mechanism for Survivable Services in Emerging NFV-Enabled Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(11): 22492-22504 (2022) - [j74]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [j73]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
Defining Smart Contract Defects on Ethereum. IEEE Trans. Software Eng. 48(2): 327-345 (2022) - [j72]Lei Xue, Hao Zhou, Xiapu Luo, Le Yu, Dinghao Wu, Yajin Zhou, Xiaobo Ma:
PackerGrind: An Adaptive Unpacking System for Android Apps. IEEE Trans. Software Eng. 48(2): 551-570 (2022) - [j71]Jiachi Chen, Xin Xia, David Lo, John Grundy, Xiapu Luo, Ting Chen:
DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. IEEE Trans. Software Eng. 48(7): 2189-2207 (2022) - [j70]Yuan Huang, Jinyu Jiang, Xiapu Luo, Xiangping Chen, Zibin Zheng, Nan Jia, Gang Huang:
Change-Patterns Mapping: A Boosting Way for Change Impact Analysis. IEEE Trans. Software Eng. 48(7): 2376-2398 (2022) - [j69]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [j68]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Trans. Software Eng. 48(8): 3066-3086 (2022) - [j67]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. IEEE Trans. Software Eng. 48(10): 4181-4213 (2022) - [j66]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-Party Library Detection Tools. IEEE Trans. Software Eng. 48(11): 4249-4273 (2022) - [j65]Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. IEEE Trans. Software Eng. 48(11): 4501-4520 (2022) - [c167]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM. ASPLOS 2022: 846-858 - [c166]Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. CCS 2022: 3239-3252 - [c165]Kaifa Zhao, Le Yu, Shiyao Zhou, Jing Li, Xiapu Luo, Yat Fei Aemon Chiu, Yutong Liu:
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification. EMNLP 2022: 10266-10277 - [c164]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. EuroS&P 2022: 684-702 - [c163]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. ICDE 2022: 14-26 - [c162]Tingting Yin, Chao Zhang, Yuandong Ni, Yixiong Wu, Taiyu Wong, Xiapu Luo, Zheming Li, Yu Guo:
An Empirical Study on Implicit Constraints in Smart Contract Static Analysis. ICSE (SEIP) 2022: 31-32 - [c161]Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung:
APER: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. ICSE 2022: 125-137 - [c160]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson:
Challenges in decentralized name management: the case of ENS. IMC 2022: 65-82 - [c159]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
Landing Reinforcement Learning onto Smart Scanning of The Internet of Things. INFOCOM 2022: 2088-2097 - [c158]Zheyu Ma, Bodong Zhao, Letu Ren, Zheming Li, Siqi Ma, Xiapu Luo, Chao Zhang:
PrIntFuzz: fuzzing Linux drivers via automated virtual device simulation. ISSTA 2022: 404-416 - [c157]Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai:
NCScope: hardware-assisted analyzer for native code in Android apps. ISSTA 2022: 629-641 - [c156]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. ISSTA 2022: 703-715 - [c155]Peilin Zheng, Zibin Zheng, Xiapu Luo:
Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution. ISSTA 2022: 740-751 - [c154]Jianzhong Su, Hong-Ning Dai, Lingjun Zhao, Zibin Zheng, Xiapu Luo:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing. ASE 2022: 36:1-36:12 - [c153]Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. ASE 2022: 69:1-69:13 - [c152]He Ye, Matias Martinez, Xiapu Luo, Tao Zhang, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. ASE 2022: 92:1-92:13 - [c151]Jianyu Jiang, Ji Qi, Tianxiang Shen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Gong Zhang, Xiapu Luo, Heming Cui:
CRONUS: Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment. MICRO 2022: 124-143 - [c150]Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma:
Packet-Level Open-World App Fingerprinting on Wireless Traffic. NDSS 2022 - [c149]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c148]Rui Yang, Ricky K. P. Mok, Shuohan Wu, Xiapu Luo, Hongyu Zou, Weichao Li:
Design and Implementation of Web-Based Speed Test Analysis Tool Kit. PAM 2022: 83-96 - [c147]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. SIGMETRICS (Abstracts) 2022: 21-22 - [c146]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. SIGMETRICS (Abstracts) 2022: 23-24 - [c145]Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui:
Demystifying the underground ecosystem of account registration bots. ESEC/SIGSOFT FSE 2022: 897-909 - [c144]Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. ESEC/SIGSOFT FSE 2022: 1430-1440 - [c143]Liu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang, Shangguang Wang, Xuanzhe Liu:
Demystifying "removed reviews" in iOS app store. ESEC/SIGSOFT FSE 2022: 1489-1499 - [c142]Tianxiang Shen, Ji Qi, Jianyu Jiang, Xian Wang, Siyuan Wen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Xiapu Luo, Fengwei Zhang, Heming Cui:
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge. USENIX ATC 2022: 723-738 - [c141]Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma:
FOAP: Fine-Grained Open-World Android App Fingerprinting. USENIX Security Symposium 2022: 1579-1596 - [c140]Lei Xue, Yangyang Liu, Tianqi Li, Kaifa Zhao, Jianfeng Li, Le Yu, Xiapu Luo, Yajin Zhou, Guofei Gu:
SAID: State-aware Defense Against Injection Attacks on In-vehicle Network. USENIX Security Symposium 2022: 1921-1938 - [c139]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [c138]Wen Li, Jiang Ming, Xiapu Luo, Haipeng Cai:
PolyCruise: A Cross-Language Dynamic Information Flow Analysis. USENIX Security Symposium 2022: 2513-2530 - [c137]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. USENIX Security Symposium 2022: 3953-3970 - [c136]Haotong Cao, Xiaoming Wang, Rui Jiang, Ting Liu, Lei Xue, Daniel Xiapu Luo:
Resource Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks. WCSP 2022: 610-614 - [c135]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - [e5]Davor Svetinovic, Yin Zhang, Xiapu Luo, Xiaoyan Huang, Xingping Chen:
Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers. Communications in Computer and Information Science 1679, Springer 2022, ISBN 978-981-19-8042-8 [contents] - [i59]Sinan Wang, Yibo Wang, Xian Zhan, Ying Wang, Yepang Liu, Xiapu Luo, Shing-Chi Cheung:
Aper: Evolution-Aware Runtime Permission Misuse Detection for Android Apps. CoRR abs/2201.12542 (2022) - [i58]He Ye, Matias Martinez, Xiapu Luo, Tao Zhang, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. CoRR abs/2203.12755 (2022) - [i57]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jun Wu, Jian Ren, Kai Zhou:
From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection. CoRR abs/2206.08260 (2022) - [i56]Yulin Zhu, Tomasz P. Michalak, Xiapu Luo, Kai Zhou:
Towards Secrecy-Aware Attacks Against Trust Prediction in Signed Graphs. CoRR abs/2206.13104 (2022) - [i55]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i54]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - [i53]Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, Dawei Yuan:
Do Pre-trained Language Models Indeed Understand Software Engineering Tasks? CoRR abs/2211.10623 (2022) - [i52]Kaifa Zhao, Le Yu, Shiyao Zhou, Jing Li, Xiapu Luo, Yat Fei Aemon Chiu, Yutong Liu:
A Fine-grained Chinese Software Privacy Policy Dataset for Sequence Labeling and Regulation Compliant Identification. CoRR abs/2212.04357 (2022) - 2021
- [j64]Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". Digit. Commun. Networks 7(2): 245-246 (2021) - [j63]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j62]Wei Zheng, Ying Wu, Xiaoxue Wu, Chen Feng, Yulei Sui, Xiapu Luo, Yajin Zhou:
A survey of Intel SGX and its applications. Frontiers Comput. Sci. 15(3): 153808 (2021) - [j61]Zhou Xu, Tao Zhang, Jacky Keung, Meng Yan, Xiapu Luo, Xiaohong Zhang, Ling Xu, Yutian Tang:
Feature selection and embedding based cross project framework for identifying crashing fault residence. Inf. Softw. Technol. 131: 106452 (2021) - [j60]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [j59]Zhou Xu, Li Li, Meng Yan, Jin Liu, Xiapu Luo, John Grundy, Yifeng Zhang, Xiaohong Zhang:
A comprehensive comparative study of clustering-based unsupervised defect prediction models. J. Syst. Softw. 172: 110862 (2021) - [j58]Xiapu Luo, Weiyi Shang, Xiaobing Sun, Tao Zhang:
Special Issue on New Generation of Bug Fixing. J. Syst. Softw. 178: 110992 (2021) - [j57]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [j56]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 39:1-39:26 (2021) - [j55]Ting Chen, Youzheng Feng, Zihao Li, Hao Zhou, Xiapu Luo, Xiaoqi Li, Xiuzhuo Xiao, Jiachi Chen, Xiaosong Zhang:
GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts. IEEE Trans. Emerg. Top. Comput. 9(3): 1433-1448 (2021) - [j54]Yongjie Ye, Zhifeng Ren, Xiapu Luo, Jingjing Zhang, Weigang Wu:
Garou: An Efficient and Secure Off-Blockchain Multi-Party Payment Hub. IEEE Trans. Netw. Serv. Manag. 18(4): 4450-4461 (2021) - [j53]Le Yu, Xiapu Luo, Jiachi Chen, Hao Zhou, Tao Zhang, Henry Chang, Hareton K. N. Leung:
PPChecker: Towards Accessing the Trustworthiness of Android Apps' Privacy Policies. IEEE Trans. Software Eng. 47(2): 221-242 (2021) - [j52]Tao Zhang, Jiachi Chen, Xian Zhan, Xiapu Luo, David Lo, He Jiang:
Where2Change: Change Request Localization for App Reviews. IEEE Trans. Software Eng. 47(11): 2590-2616 (2021) - [j51]Haotong Cao, Jianbo Du, Haitao Zhao, Daniel Xiapu Luo, Neeraj Kumar, Longxiang Yang, F. Richard Yu:
Resource-Ability Assisted Service Function Chain Embedding and Scheduling for 6G Networks With Virtualization. IEEE Trans. Veh. Technol. 70(4): 3846-3859 (2021) - [c134]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c133]Kaifa Zhao, Hao Zhou, Yulin Zhu, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. CCS 2021: 3218-3235 - [c132]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: A Practitioners' Perspective: The Artifact of a Paper Accepted in the 43rd IEEE/ACM International Conference on Software Engineering (ICSE 2021). ICSE (Companion Volume) 2021: 227-228 - [c131]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c130]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. ICSE 2021: 1410-1422 - [c129]Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu:
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. ICSE 2021: 1695-1707 - [c128]Xiaobo Ma, Mawei Shi, Bingyu An, Jianfeng Li, Daniel Xiapu Luo, Junjie Zhang, Xiaohong Guan:
Context-aware Website Fingerprinting over Encrypted Proxies. INFOCOM 2021: 1-10 - [c127]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c126]Yang Shi, Mianhong Li, Wujing Wei, Yangyang Liu, Xiapu Luo:
Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing. ISSRE 2021: 446-456 - [c125]Lei Xue, Yuxiao Yan, Luyi Yan, Muhui Jiang, Xiapu Luo, Dinghao Wu, Yajin Zhou:
Parema: an unpacking framework for demystifying VM-based Android packers. ISSTA 2021: 152-164 - [c124]Kelong Mao, Xi Xiao, Guangwu Hu, Xiapu Luo, Bin Zhang, Shutao Xia:
Byte-Label Joint Attention Learning for Packet-grained Network Traffic Classification. IWQoS 2021: 1-10 - [c123]Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c122]Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c121]Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, Xiapu Luo:
As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service. NDSS 2021 - [c120]Xiaoqi Li, Ting Chen, Xiapu Luo, Chenxu Wang:
CLUE: towards discovering locked cryptocurrencies in ethereum. SAC 2021: 1584-1587 - [c119]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. SIGMETRICS (Abstracts) 2021: 33-34 - [c118]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c117]Kunpeng Yu, Chenxu Wang, Yan Cai, Xiapu Luo, Zijiang Yang:
Detecting concurrency vulnerabilities based on partial orders of memory and thread events. ESEC/SIGSOFT FSE 2021: 280-291 - [c116]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Tang, Jiaqi Chen, Xiapu Luo, Ting Chen:
iBatch: saving Ethereum fees via secure and cost-effective batching of smart-contract invocations. ESEC/SIGSOFT FSE 2021: 566-577 - [c115]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - [c114]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c113]Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu:
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. USENIX Security Symposium 2021: 3237-3254 - [c112]Jianfeng Li, Kaifa Zhao, Yajuan Tang, Xiapu Luo, Xiaobo Ma:
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis. VTC Spring 2021: 1-7 - [c111]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [c110]Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Guoai Xu, Xuanzhe Liu:
Demystifying Illegal Mobile Gambling Apps. WWW 2021: 1447-1458 - [c109]Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen:
Robust Android Malware Detection against Adversarial Example Attacks. WWW 2021: 3603-3612 - [e4]Hong-Ning Dai, Xuanzhe Liu, Daniel Xiapu Luo, Jiang Xiao, Xiangping Chen:
Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised Selected Papers. Communications in Computer and Information Science 1490, Springer 2021, ISBN 978-981-16-7992-6 [contents] - [i51]Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu:
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. CoRR abs/2102.08172 (2021) - [i50]Zhiyuan Wan, Xin Xia, David Lo, Jiachi Chen, Xiapu Luo, Xiaohu Yang:
Smart Contract Security: a Practitioners' Perspective. CoRR abs/2102.10963 (2021) - [i49]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - [i48]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i47]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu:
Ethereum Name Service: the Good, the Bad, and the Ugly. CoRR abs/2104.05185 (2021) - [i46]Muhui Jiang, Tianyi Xu, Yajin Zhou, Yufeng Hu, Ming Zhong, Lei Wu, Xiapu Luo, Kui Ren:
Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and CPU Emulators for ARM. CoRR abs/2105.14273 (2021) - [i45]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - [i44]Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren:
A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices. CoRR abs/2105.14298 (2021) - [i43]Yibo Wang, Qi Zhang, Kai Li, Yuzhe Richard Tang, Xiapu Luo, Ting Chen:
iBatch: Saving Ethereum Fees via Secure and Cost-Effective Batching of Smart-Contract Invocations. CoRR abs/2106.08554 (2021) - [i42]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. CoRR abs/2106.09989 (2021) - [i41]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-party Library Detection Tools. CoRR abs/2108.01964 (2021) - [i40]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview. CoRR abs/2108.03787 (2021) - [i39]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Demystifying Scam Tokens on Uniswap Decentralized Exchange. CoRR abs/2109.00229 (2021) - [i38]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. CoRR abs/2110.06018 (2021) - [i37]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - [i36]Zhaohan Xi, Ren Pang, Changjiang Li, Shouling Ji, Xiapu Luo, Xusheng Xiao, Ting Wang:
Towards Robust Reasoning over Knowledge Graphs. CoRR abs/2110.14693 (2021) - 2020
- [j50]Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. Comput. Secur. 98: 101993 (2020) - [j49]Chenxu Wang, Yang Wang, Zhiyuan Zhao, Dong Qin, Xiapu Luo, Tao Qin:
Credible seed identification for large-scale structural network alignment. Data Min. Knowl. Discov. 34(6): 1744-1776 (2020) - [j48]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107: 841-853 (2020) - [j47]Yuan Huang, Shaohao Huang, Huanchao Chen, Xiangping Chen, Zibin Zheng, Xiapu Luo, Nan Jia, Xinyu Hu, Xiaocong Zhou:
Towards automatically generating block comments for code snippets. Inf. Softw. Technol. 127: 106373 (2020) - [j46]Youshuai Tan, Sijie Xu, Zhaowei Wang, Tao Zhang, Zhou Xu, Xiapu Luo:
Bug severity prediction using question-and-answer pairs from Stack Overflow. J. Syst. Softw. 165: 110567 (2020) - [j45]Yuan Huang, Xinyu Hu, Nan Jia, Xiangping Chen, Zibin Zheng, Xiapu Luo:
CommtPst: Deep learning source code for commenting positions prediction. J. Syst. Softw. 170: 110754 (2020) - [j44]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - [j43]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 50:1-50:28 (2020) - [j42]Xiaobo Ma, Bo An, Mengchen Zhao, Xiapu Luo, Lei Xue, Zhenhua Li, Tony T. N. Miu, Xiaohong Guan:
Randomized Security Patrolling for Link Flooding Attack Detection. IEEE Trans. Dependable Secur. Comput. 17(4): 795-812 (2020) - [j41]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
DINA: Detecting Hidden Android Inter-App Communication in Dynamic Loaded Code. IEEE Trans. Inf. Forensics Secur. 15: 2782-2797 (2020) - [j40]Yang Shi, Wujing Wei, Fangguo Zhang, Xiapu Luo, Zongjian He, Hongfei Fan:
SDSRS: A Novel White-Box Cryptography Scheme for Securing Embedded Devices in IIoT. IEEE Trans. Ind. Informatics 16(3): 1602-1616 (2020) - [j39]Ting Chen, Zihao Li, Yuxiao Zhu, Jiachi Chen, Xiapu Luo, John Chi-Shing Lui, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. ACM Trans. Internet Techn. 20(2): 18:1-18:32 (2020) - [j38]Ming Fan, Xiapu Luo, Jun Liu, Chunyin Nong, Qinghua Zheng, Ting Liu:
CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis. IEEE Trans. Reliab. 69(1): 124-138 (2020) - [c108]Meng Zhang, Pengcheng Zhang, Xiapu Luo, Feng Xiao:
Source Code Obfuscation for Smart Contracts. APSEC 2020: 513-514 - [c107]Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang:
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. CCS 2020: 85-99 - [c106]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c105]Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. Financial Cryptography 2020: 578-594 - [c104]Jia Xu, Yongqi Wu, Xiapu Luo, Dejun Yang:
Improving the Efficiency of Blockchain Applications with Smart Contract based Cyber-insurance. ICC 2020: 1-7 - [c103]Pengcheng Zhang, Feng Xiao, Xiapu Luo:
A Framework and DataSet for Bugs in Ethereum Smart Contracts. ICSME 2020: 139-150 - [c102]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. ISSRE 2020: 253-264 - [c101]Muhui Jiang, Yajin Zhou, Xiapu Luo, Ruoyu Wang, Yang Liu, Kui Ren:
An empirical study on ARM disassembly tools. ISSTA 2020: 401-414 - [c100]Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu:
Characterizing Erasable Accounts in Ethereum. ISC 2020: 352-371 - [c99]Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [c98]Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c97]Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c96]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. KDD 2020: 1899-1907 - [c95]Ting Chen, Rong Cao, Ting Li, Xiapu Luo, Guofei Gu, Yufei Zhang, Zhou Liao, Hang Zhu, Gang Chen, Zheyuan He, Yuxing Tang, Xiaodong Lin, Xiaosong Zhang:
SODA: A Generic Online Detection Framework for Smart Contracts. NDSS 2020 - [c94]Xiaoqi Li, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, Zhou Xu:
STAN: Towards Describing Bytecodes of Smart Contract. QRS 2020: 273-284 - [c93]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - [c92]Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. ESEC/SIGSOFT FSE 2020: 914-926 - [c91]Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo:
Programmable In-Network Security for Context-aware BYOD Policies. USENIX Security Symposium 2020: 595-612 - [c90]Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang:
Interpretable Deep Learning under Fire. USENIX Security Symposium 2020: 1659-1676 - [c89]Yan Cai, Yutian Tang, Haicheng Li, Le Yu, Hao Zhou, Xiapu Luo, Liang He, Purui Su:
Resource Race Attacks on Android. SANER 2020: 47-58 - [c88]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [e3]Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu:
Information and Communications Security - 21st International Conference, ICICS 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11999, Springer 2020, ISBN 978-3-030-41578-5 [contents] - [i35]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - [i34]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i33]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i32]Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, Guoai Xu:
Characterizing Cryptocurrency Exchange Scams. CoRR abs/2003.07314 (2020) - [i31]Weilin Zheng, Xu Chen, Zibin Zheng, Xiapu Luo, Jiahui Cui:
AxeChain: A Secure and Decentralized blockchain for solving Easily-Verifiable problems. CoRR abs/2003.13999 (2020) - [i30]Yutian Tang, Hao Zhou, Zhou Xu, Xiapu Luo, Yan Cai, Tao Zhang:
Feature Location Benchmark for Decomposing and Reusing Android Apps. CoRR abs/2005.04008 (2020) - [i29]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i28]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i27]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. CoRR abs/2006.09539 (2020) - [i26]Xiaoqi Li, Ting Chen, Xiapu Luo, Tao Zhang, Le Yu, Zhou Xu:
STAN: Towards Describing Bytecodes of Smart Contract. CoRR abs/2007.09696 (2020) - [i25]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i24]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. CoRR abs/2008.05864 (2020) - [i23]Xiaoqi Li, Ting Chen, Xiapu Luo, Jiangshan Yu:
Characterizing Erasable Accounts in Ethereum. CoRR abs/2009.00607 (2020) - [i22]Pengcheng Zhang, Feng Xiao, Xiapu Luo:
A Framework and DataSet for Bugs in Ethereum Smart Contracts. CoRR abs/2009.02066 (2020) - [i21]Jiachi Chen, Xin Xia, David Lo, John C. Grundy, Xiapu Luo, Ting Chen:
DEFECTCHECKER: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode. CoRR abs/2009.02663 (2020) - [i20]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i19]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. CoRR abs/2011.02673 (2020) - [i18]Xiaoqi Li, Ting Chen, Xiapu Luo, Chenxu Wang:
CLUE: Towards Discovering Locked Cryptocurrencies in Ethereum. CoRR abs/2012.01370 (2020) - [i17]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020)
2010 – 2019
- 2019
- [j37]Tao Zhang, Wenjun Hu, Xiapu Luo, Xiaobo Ma:
A Commit Messages-Based Bug Localization for Android Applications. Int. J. Softw. Eng. Knowl. Eng. 29(4): 457-487 (2019) - [j36]Zhou Xu, Jin Liu, Xiapu Luo, Zijiang Yang, Yifeng Zhang, Peipei Yuan, Yutian Tang, Tao Zhang:
Software defect prediction based on kernel PCA and weighted extreme learning machine. Inf. Softw. Technol. 106: 182-200 (2019) - [j35]Zhou Xu, Shuai Pang, Tao Zhang, Xiapu Luo, Jin Liu, Yutian Tang, Xiao Yu, Lei Xue:
Cross Project Defect Prediction via Balanced Distribution Adaptation Based Transfer Learning. J. Comput. Sci. Technol. 34(5): 1039-1062 (2019) - [j34]Zhou Xu, Shuai Li, Xiapu Luo, Jin Liu, Tao Zhang, Yutian Tang, Jun Xu, Peipei Yuan, Jacky Keung:
TSTSS: A two-stage training subset selection framework for cross version defect prediction. J. Syst. Softw. 154: 59-78 (2019) - [j33]Zhou Xu, Shuai Li, Jun Xu, Jin Liu, Xiapu Luo, Yifeng Zhang, Tao Zhang, Jacky Keung, Yutian Tang:
LDFR: Learning deep feature representation for software defect prediction. J. Syst. Softw. 158 (2019) - [j32]Qian Meng, Li-Ta Hsu, Bing Xu, Xiapu Luo, Ahmed el-Mowafy:
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver. Sensors 19(18): 3993 (2019) - [j31]Tao Zhang, Jiachi Chen, Xiapu Luo, Tao Li:
Bug Reports for Desktop Software and Mobile Apps in GitHub: What's the Difference? IEEE Softw. 36(1): 63-71 (2019) - [j30]Yang Shi, Wujing Wei, Hongfei Fan, Man Ho Au, Xiapu Luo:
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Trans. Computers 68(10): 1411-1427 (2019) - [j29]Lei Xue, Chenxiong Qian, Hao Zhou, Xiapu Luo, Yajin Zhou, Yuru Shao, Alvin T. S. Chan:
NDroid: Toward Tracking Information Flows Across Multiple Android Contexts. IEEE Trans. Inf. Forensics Secur. 14(3): 814-828 (2019) - [j28]He Jiang, Liming Nie, Zeyi Sun, Zhilei Ren, Weiqiang Kong, Tao Zhang, Xiapu Luo:
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets. IEEE Trans. Serv. Comput. 12(1): 34-46 (2019) - [c87]Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. CCS 2019: 1503-1520 - [c86]Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ting Wang, Teng Hu, Xiuzhuo Xiao, Dong Wang, Jin Huang, Xiaosong Zhang:
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts. ESEM 2019: 1-11 - [c85]Ting Chen, Teng Hu, Jiachi Chen, Xiaosong Zhang, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng:
DataEther: Data Exploration Framework For Ethereum. ICDCS 2019: 1369-1380 - [c84]Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu:
Graph embedding based familial analysis of Android malware using unsupervised learning. ICSE 2019: 771-782 - [c83]Mohannad Alhanahnah, Qiben Yan, Hamid Bagheri, Hao Zhou, Yutaka Tsutano, Witawas Srisa-an, Xiapu Luo:
Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code. INFOCOM 2019: 550-558 - [c82]Zhou Xu, Tao Zhang, Yifeng Zhang, Yutian Tang, Jin Liu, Xiapu Luo, Jacky Keung, Xiaohui Cui:
Identifying Crashing Fault Residence Based on Cross Project Model. ISSRE 2019: 183-194 - [c81]Yutian Tang, Xian Zhan, Hao Zhou, Xiapu Luo, Zhou Xu, Yajin Zhou, Qiben Yan:
Demystifying Application Performance Management Libraries for Android. ASE 2019: 682-685 - [c80]Yawei Wang, Chenxu Wang, Xiapu Luo, Kaixiang Zhang, Huizhong Li:
A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing. NSS 2019: 167-184 - [c79]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. RAID 2019: 47-60 - [c78]Dennis Y. W. Liu, Alven C. Y. Leung, Man Ho Au, Xiapu Luo, Pit Ho Patrio Chiu, Siu Wo Tarloff Im, Winnie W. M. Lam:
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. TALE 2019: 1-6 - [i16]Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, Kui Ren:
Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum. CoRR abs/1904.01981 (2019) - [i15]Jiachi Chen, Xin Xia, David Lo, John Grundy, Daniel Xiapu Luo, Ting Chen:
Domain Specific Code Smells in Smart Contracts. CoRR abs/1905.01467 (2019) - [i14]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Daniel Xiapu Luo:
Automated Deobfuscation of Android Native Binary Code. CoRR abs/1907.06828 (2019) - [i13]Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, Xiapu Luo:
Programmable In-Network Security for Context-aware BYOD Policies. CoRR abs/1908.01405 (2019) - [i12]Ren Pang, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Ting Wang:
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models. CoRR abs/1911.01559 (2019) - [i11]Pengcheng Zhang, Feng Xiao, Xiapu Luo:
SolidityCheck : Quickly Detecting Smart Contract Problems Through Regular Expressions. CoRR abs/1911.09425 (2019) - [i10]Yongjie Ye, Jingjing Zhang, Weigang Wu, Xiapu Luo, Jiannong Cao:
Boros: Secure Cross-Channel Transfers via Channel Hub. CoRR abs/1911.12929 (2019) - [i9]Tong Cao, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, Paulo Veríssimo:
Exploring the Monero Peer-to-Peer Network. IACR Cryptol. ePrint Arch. 2019: 411 (2019) - 2018
- [j27]Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo:
A Survey on Access Control in Fog Computing. IEEE Commun. Mag. 56(2): 144-149 (2018) - [j26]Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Camera Placement Based on Vehicle Traffic for Better City Security Surveillance. IEEE Intell. Syst. 33(4): 49-61 (2018) - [j25]Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
PADetective: A Systematic Approach to Automate Detection of Promotional Attackers in Mobile App Store. J. Inf. Process. 26: 212-223 (2018) - [j24]Shuang Zhao, Xiapu Luo, Xiaobo Ma, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Secur. Commun. Networks 2018: 3182402:1-3182402:22 (2018) - [j23]Zijiang Yang, Ting Liu, Daniel Xiapu Luo, Chao Wang:
Guest editorial: special issue on concurrent software quality. Softw. Qual. J. 26(3): 851-853 (2018) - [j22]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
System-level attacks against android by exploiting asynchronous programming. Softw. Qual. J. 26(3): 1037-1062 (2018) - [j21]Chenxu Wang, TungNgai Miu, Xiapu Luo, Jinhe Wang:
SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks. IEEE Trans. Inf. Forensics Secur. 13(3): 559-573 (2018) - [j20]Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 13(8): 1890-1905 (2018) - [j19]Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, TungNgai Miu, Guofei Gu:
LinkScope: Toward Detecting Target Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 13(10): 2423-2438 (2018) - [j18]Le Yu, Xiapu Luo, Chenxiong Qian, Shuai Wang, Hareton K. N. Leung:
Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy. IEEE Trans. Software Eng. 44(9): 834-854 (2018) - [c77]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CCS 2018: 349-363 - [c76]Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. Inscrypt 2018: 349-369 - [c75]Ting Chen, Wanyu Huang, Muhui Jiang, Xiapu Luo, Lei Xue, Ying Wang, Xiaosong Zhang:
PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions. COMPSAC (1) 2018: 276-285 - [c74]Le Yu, Jiachi Chen, Hao Zhou, Xiapu Luo, Kang Liu:
Localizing Function Errors in Mobile Apps with User Reviews. DSN 2018: 418-429 - [c73]Adam Morrison, Lei Xue, Ang Chen, Xiapu Luo:
Enforcing Context-Aware BYOD Policies with In-Network Security. HotCloud 2018 - [c72]Chenxu Wang, Zhiyuan Zhao, Yang Wang, Dong Qin, Xiapu Luo, Tao Qin:
DeepMatching: A Structural Seed Identification Framework for Social Network Alignment. ICDCS 2018: 600-610 - [c71]Ting Chen, Zihao Li, Hao Zhou, Jiachi Chen, Xiapu Luo, Xiaoqi Li, Xiaosong Zhang:
Towards saving money in using smart contracts. ICSE (NIER) 2018: 81-84 - [c70]Peilin Zheng, Zibin Zheng, Xiapu Luo, Xiangping Chen, Xuanzhe Liu:
A detailed and real-time performance monitoring framework for blockchain systems. ICSE (SEIP) 2018: 134-143 - [c69]Ting Chen, Yuxiao Zhu, Zihao Li, Jiachi Chen, Xiaoqi Li, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Understanding Ethereum via Graph Analysis. INFOCOM 2018: 1484-1492 - [c68]Jianfeng Li, Xiaobo Ma, Guodong Li, Xiapu Luo, Junjie Zhang, Wei Li, Xiaohong Guan:
Can We Learn what People are Doing from Raw DNS Queries? INFOCOM 2018: 2240-2248 - [c67]Zhou Xu, Shuai Li, Yutian Tang, Xiapu Luo, Tao Zhang, Jin Liu, Jun Xu:
Cross version defect prediction with representative data via sparse subset selection. ICPC 2018: 132-143 - [c66]Zhou Xu, Jin Liu, Xiapu Luo, Tao Zhang:
Cross-version defect prediction via hybrid active learning with kernel principal component analysis. SANER 2018: 209-220 - [e2]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i8]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A Survey on the Security of Blockchain Systems. CoRR abs/1802.06993 (2018) - [i7]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CoRR abs/1812.00483 (2018) - 2017
- [j17]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j16]Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, Henry Chang:
Toward Automatically Generating Privacy Policy for Android Apps. IEEE Trans. Inf. Forensics Secur. 12(4): 865-880 (2017) - [c65]Bo Sun, Xiapu Luo, Mitsuaki Akiyama, Takuya Watanabe, Tatsuya Mori:
Characterizing Promotional Attacks in Mobile App Store. ATIS 2017: 113-127 - [c64]Muhui Jiang, Xiapu Luo, TungNgai Miu, Shengtuo Hu, Weixiong Rao:
Are HTTP/2 Servers Ready Yet? ICDCS 2017: 1661-1671 - [c63]Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu:
Adaptive unpacking of Android apps. ICSE 2017: 358-369 - [c62]Muhui Jiang, Chenxu Wang, Xiapu Luo, MiuTung Miu, Ting Chen:
Characterizing the Impacts of Application Layer DDoS Attacks. ICWS 2017: 500-507 - [c61]Lei Xue, Xiaobo Ma, Xiapu Luo, Le Yu, Shuai Wang, Ting Chen:
Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement. INFOCOM 2017: 1-9 - [c60]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. ISPEC 2017: 3-24 - [c59]Tao Zhang, Jiachi Chen, He Jiang, Xiapu Luo, Xin Xia:
Bug report enrichment with application of automated fixer recommendation. ICPC 2017: 230-240 - [c58]Yuan Li, Chao Zhang, Xiapu Luo:
vCFI: Visible Control Flow Integrity for Cloud Tenants. SysTEX@SOSP 2017: 6:1-6:2 - [c57]Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo, Man Ho Au:
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017: 214-223 - [c56]Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu:
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. USENIX Security Symposium 2017: 289-306 - [c55]Ting Chen, Youzheng Feng, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang:
Cloud-based parallel concolic execution. SANER 2017: 437-441 - [c54]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
Under-optimized smart contracts devour your money. SANER 2017: 442-446 - [p2]Xiaoqi Li, Le Yu, Xiapu Luo:
On Discovering Vulnerabilities in Android Applications. Mobile Security and Privacy 2017: 155-166 - [p1]Dennis Y. W. Liu, Guozhi Xue, Yi Xie, Xiapu Luo, Man Ho Au:
Performance of Digital Signature Schemes on Mobile Devices. Mobile Security and Privacy 2017: 247-256 - [i6]He Jiang, Liming Nie, Zeyi Sun, Zhilei Ren, Weiqiang Kong, Tao Zhang, Xiapu Luo:
ROSF: Leveraging Information Retrieval and Supervised Learning for Recommending Code Snippets. CoRR abs/1703.01446 (2017) - [i5]Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang:
Under-Optimized Smart Contracts Devour Your Money. CoRR abs/1703.03994 (2017) - [i4]Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan:
Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance. CoRR abs/1705.08508 (2017) - [i3]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. CoRR abs/1712.06438 (2017) - 2016
- [j15]Tao Zhang, He Jiang, Xiapu Luo, Alvin T. S. Chan:
A Literature Review of Research in Bug Resolution: Tasks, Challenges and Future Directions. Comput. J. 59(5): 741-773 (2016) - [j14]Xiapu Luo, Haocheng Zhou, Le Yu, Lei Xue, Yi Xie:
Characterizing mobile *-box applications. Comput. Networks 103: 228-239 (2016) - [j13]Wenjuan Li, Weizhi Meng, Xiapu Luo, Lam-for Kwok:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. Comput. Secur. 60: 177-192 (2016) - [j12]Tao Zhang, Jiachi Chen, Geunseok Yang, Byungjeong Lee, Xiapu Luo:
Towards more accurate severity prediction and fixer recommendation of software bugs. J. Syst. Softw. 117: 166-184 (2016) - [c53]Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. ACISP (1) 2016: 3-19 - [c52]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. ACISP (1) 2016: 20-39 - [c51]Le Yu, Xiapu Luo, Xule Liu, Tao Zhang:
Can We Trust the Privacy Policies of Android Apps? DSN 2016: 538-549 - [c50]Ming Fan, Jun Liu, Xiapu Luo, Kai Chen, Tianyi Chen, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
Frequent Subgraph Based Familial Classification of Android Malware. ISSRE 2016: 24-35 - [c49]TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang:
Modeling User Browsing Activity for Application Layer DDoS Attack Detection. SecureComm 2016: 747-750 - [c48]Weizhi Meng, Xiapu Luo, Wenjuan Li, Yan Li:
Design and Evaluation of Advanced Collusion Attacks on Collaborative Intrusion Detection Networks in Practice. Trustcom/BigDataSE/ISPA 2016: 1061-1068 - [c47]Le Yu, Xiapu Luo, Chenxiong Qian, Shuai Wang:
Revisiting the Description-to-Behavior Fidelity in Android Applications. SANER 2016: 415-426 - [e1]Zijiang Yang, Ting Liu, Daniel Xiapu Luo:
Proceedings of the 1st International Workshop on Specification, Comprehension, Testing, and Debugging of Concurrent Programs, SCTDCP@ASE 2016, Singapore, Singapore, September 3, 2016. ACM 2016, ISBN 978-1-4503-4510-1 [contents] - 2015
- [j11]Chenxiong Qian, Xiapu Luo, Le Yu, Guofei Gu:
VulHunter: Toward Discovering Vulnerabilities in Android Applications. IEEE Micro 35(1): 44-53 (2015) - [c46]Le Yu, Tao Zhang, Xiapu Luo, Lei Xue:
AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications. SPSM@CCS 2015: 39-50 - [c45]Yueqian Zhang, Xiapu Luo, Haoyang Yin:
DexHunter: Toward Extracting Hidden Code from Packed Android Applications. ESORICS (2) 2015: 293-311 - [c44]Lei Xue, Chenxiong Qian, Xiapu Luo:
AndroidPerf: A cross-layer profiling system for Android applications. IWQoS 2015: 115-124 - 2014
- [j10]Yuru Shao, Xiapu Luo, Chenxiong Qian:
RootGuard: Protecting Rooted Android Phones. Computer 47(6): 32-40 (2014) - [j9]Junjie Zhang, Roberto Perdisci, Wenke Lee, Xiapu Luo, Unum Sarfraz:
Building a Scalable System for Stealthy P2P-Botnet Detection. IEEE Trans. Inf. Forensics Secur. 9(1): 27-38 (2014) - [j8]Yajuan Tang, Xiapu Luo, Qing Hui, Rocky K. C. Chang:
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks. IEEE Trans. Inf. Forensics Secur. 9(3): 339-353 (2014) - [c43]Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu, Lei Zhang:
Towards a scalable resource-driven approach for detecting repackaged Android applications. ACSAC 2014: 56-65 - [c42]Chenxiong Qian, Xiapu Luo, Yuru Shao, Alvin T. S. Chan:
On Tracking Information Flows through JNI in Android Applications. DSN 2014: 180-191 - [c41]Xiapu Luo, Lei Xue, Cong Shi, Yuru Shao, Chenxiong Qian, Edmond W. W. Chan:
On Measuring One-Way Path Metrics from a Web Server. ICNP 2014: 203-208 - [c40]Lei Xue, Xiapu Luo, Yuru Shao:
kTRxer: A portable toolkit for reliable internet probing. IWQoS 2014: 129-134 - [c39]Lei Xue, Xiapu Luo, Edmond W. W. Chan, Xian Zhan:
Towards Detecting Target Link Flooding Attack. LISA 2014: 81-96 - [c38]Pei Tu, Xiapu Luo, Weigang Wu, Yajuan Tang:
Speeding Up Multi-level Route Analysis Through Improved Multi-LCS Algorithm. TRIDENTCOM 2014: 327-337 - [i2]Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang:
A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps. CoRR abs/1405.6282 (2014) - 2013
- [j7]Peng Zhou, Xiapu Luo, Ang Chen, Rocky K. C. Chang:
SGor: Trust graph based onion routing. Comput. Networks 57(17): 3522-3544 (2013) - [j6]Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
Inference attacks against trust-based onion routing: Trust degree to the rescue. Comput. Secur. 39: 431-446 (2013) - [j5]Yujing Liu, Xiapu Luo, Rocky K. C. Chang, Jinshu Su:
Characterizing Inter-Domain Rerouting by Betweenness Centrality after Disruptive Events. IEEE J. Sel. Areas Commun. 31(6): 1147-1157 (2013) - [c37]Ang Chen, Edmond W. W. Chan, Xiapu Luo, Waiting W. T. Fok, Rocky K. C. Chang:
An efficient approach to multi-level route analytics. IM 2013: 101-108 - [c36]Waiting W. T. Fok, Xiapu Luo, Ricky K. P. Mok, Weichao Li, Yujing Liu, Edmond W. W. Chan, Rocky K. C. Chang:
MonoScope: Automating network faults diagnosis based on active measurements. IM 2013: 210-217 - [c35]Zhaoyan Su, Xiapu Luo, Weigang Wu, Jiannong Cao:
ACC: Anonymous Cooperative Caching in Wireless Ad Hoc Networks. MASS 2013: 64-72 - 2012
- [j4]Cong Shi, Xiapu Luo, Patrick Traynor, Mostafa H. Ammar, Ellen W. Zegura:
ARDEN: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10(6): 918-930 (2012) - [j3]Changwang Zhang, Zhiping Cai, Weifeng Chen, Xiapu Luo, Jianping Yin:
Flow level detection and filtering of low-rate DDoS. Comput. Networks 56(15): 3417-3431 (2012) - [j2]Xiapu Luo, Edmond W. W. Chan, Peng Zhou, Rocky K. C. Chang:
Robust Network Covert Communications Based on TCP and Enumerative Combinatorics. IEEE Trans. Dependable Secur. Comput. 9(6): 890-902 (2012) - [c34]Ricky K. P. Mok, Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
QDASH: a QoE-aware DASH system. MMSys 2012: 11-22 - [c33]Yujing Liu, Xiapu Luo, Rocky K. C. Chang, Jinshu Su:
Characterizing Inter-domain Rerouting after Japan Earthquake. Networking (2) 2012: 124-135 - [c32]Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
More Anonymity through Trust Degree in Trust-Based Onion Routing. SecureComm 2012: 273-291 - 2011
- [c31]Xiapu Luo, Peng Zhou, Junjie Zhang, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang:
Exposing invisible timing-based traffic watermarks with BACKLIT. ACSAC 2011: 197-206 - [c30]Junjie Zhang, Xiapu Luo, Roberto Perdisci, Guofei Gu, Wenke Lee, Nick Feamster:
Boosting the scalability of botnet detection using adaptive traffic sampling. AsiaCCS 2011: 124-134 - [c29]Ang Chen, Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang:
An integrative multi-level analysis of internet path changes. StudentWorkshop@CoNEXT 2011: 4:1-4:2 - [c28]Edmond W. W. Chan, Ang Chen, Xiapu Luo, Ricky K. P. Mok, Weichao Li, Rocky K. C. Chang:
TRIO: measuring asymmetric capacity with three minimum round-trip times. CoNEXT 2011: 15 - [c27]Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo:
Detecting stealthy P2P botnets using statistical traffic fingerprints. DSN 2011: 121-132 - [c26]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. DSN 2011: 474-485 - [c25]Weichao Li, Waiting W. T. Fok, Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang:
Planetopus: A system for facilitating collaborative network monitoring. Integrated Network Management 2011: 911-924 - [c24]Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Wenke Lee, Rocky K. C. Chang, Roberto Perdisci:
HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows. NDSS 2011 - [c23]Edmond W. W. Chan, Xiapu Luo, Waiting W. T. Fok, Weichao Li, Rocky K. C. Chang:
Non-cooperative Diagnosis of Submarine Cable Faults. PAM 2011: 224-234 - [c22]Ricky K. P. Mok, Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang:
Inferring the QoE of HTTP video streaming from user-viewing activities. W-MUST@SIGCOMM 2011: 31-36 - [i1]Peng Zhou, Xiapu Luo, Ang Chen, Rocky K. C. Chang:
STor: Social Network based Anonymous Communication in Tor. CoRR abs/1110.5794 (2011) - 2010
- [c21]Qing Hui, Xiapu Luo, Wenke Lee:
Control of low-rate denial-of-service attacks on web servers and TCP flows. CDC 2010: 4186-4191 - [c20]Xiapu Luo, Junjie Zhang, Roberto Perdisci, Wenke Lee:
On the Secrecy of Spread-Spectrum Flow Watermarks. ESORICS 2010: 232-248 - [c19]Rocky K. C. Chang, Waiting W. T. Fok, Weichao Li, Edmond W. W. Chan, Xiapu Luo:
Neighbor-Cooperative Measurement of Network Path Quality. GLOBECOM 2010: 1-5 - [c18]Edmond W. W. Chan, Xiapu Luo, Weichao Li, Waiting W. T. Fok, Rocky K. C. Chang:
Measurement of loss pairs in network paths. Internet Measurement Conference 2010: 88-101 - [c17]Manos Antonakakis, David Dagon, Xiapu Luo, Roberto Perdisci, Wenke Lee, Justin Bellmor:
A Centralized Monitoring Infrastructure for Improving DNS Security. RAID 2010: 18-37
2000 – 2009
- 2009
- [j1]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals. EURASIP J. Adv. Signal Process. 2009 (2009) - [c16]Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang:
Reliable asymmetric path capacity measurement. StudentWorkshop@CoNEXT 2009: 55-56 - [c15]Edmond W. W. Chan, Xiapu Luo, Rocky K. C. Chang:
A minimum-delay-difference method for mitigating cross-traffic impact on capacity measurement. CoNEXT 2009: 205-216 - [c14]Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee:
WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. DSN 2009: 3-12 - [c13]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding. ICC 2009: 1-5 - [c12]Yajuan Tang, Xiapu Luo, Qing Hui, Rocky K. C. Chang:
On generalized low-rate denial-of-quality attack against Internet services. IWQoS 2009: 1-5 - [c11]David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee, Wenke Lee:
Recursive DNS Architectures and Vulnerability Implications. NDSS 2009 - [c10]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Design and Implementation of TCP Data Probes for Reliable and Metric-Rich Network Path Monitoring. USENIX ATC 2009 - 2008
- [c9]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
TCP covert timing channels: Design and detection. DSN 2008: 420-429 - 2007
- [c8]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Cloak: A Ten-Fold Way for Reliable Covert Communications. ESORICS 2007: 283-298 - [c7]Yajuan Tang, Xiapu Luo, Rocky K. C. Chang:
Protecting Internet Services from Low-Rate DoS Attacks. Critical Infrastructure Protection 2007: 251-265 - [c6]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Crafting Web Counters into Covert Channels. SEC 2007: 337-348 - 2006
- [c5]Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. NOMS 2006: 507-518 - 2005
- [c4]Xiapu Luo, Rocky K. C. Chang:
Optimizing the Pulsing Denial-of-Service Attacks. DSN 2005: 582-591 - [c3]Xiapu Luo, Rocky K. C. Chang:
Novel Approaches to End-to-End Packet Reordering Measurement. Internet Measurement Conference 2005: 227-238 - [c2]Xiapu Luo, Rocky K. C. Chang, Edmond W. W. Chan:
Performance Analysis of TCP/AQM Under Denial-of-Service Attacks. MASCOTS 2005: 97-104 - [c1]Xiapu Luo, Rocky K. C. Chang:
On a New Class of Pulsing Denial-of-Service Attacks and the Defense. NDSS 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint