• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20012020

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference article published in proceeding or book

Search results

  • 2020

    Exploring the Monero Peer-to-Peer Network

    Cao, T., Yu, J., Decouchant, J., Luo, X. & Esteves-Veríssimo, P., Jul 2020, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Revised Selected Papers. Bonneau, J. & Heninger, N. (eds.). p. 578-594 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps

    Liu, T., Wang, H., Li, L., Luo, X., Dong, F., Guo, Y., Wang, L., Bissyandé, T. & Klein, J., 20 Apr 2020, The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, Inc, p. 1715-1726 12 p. (The Web Conference 2020 - Proceedings of the World Wide Web Conference, WWW 2020).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
    5 Citations (Scopus)
  • Resource Race Attacks on Android

    Cai, Y., Tang, Y., Li, H., Yu, L., Zhou, H., Luo, X., He, L. & Su, P., Feb 2020, SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering. Kontogiannis, K., Khomh, F., Chatzigeorgiou, A., Fokaefs, M-E. & Zhou, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 47-58 12 p. 9054863. (SANER 2020 - Proceedings of the 2020 IEEE 27th International Conference on Software Analysis, Evolution, and Reengineering).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • SODA: A Generic Online Detection Framework for Smart Contracts

    Cao, R., Chen, T., Li, T., Luo, X., Gu, G., Zhang, Y., Liao, Z., Zhu, H., Chen, G., He, Z., Tang, Y., Lin, X. & Zhang, X., Feb 2020, Proceedings of the 27th Network and Distributed System Security Symposium (NDSS). p. 1-17

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • Understanding (Mis)Behavior on the EOSIO Blockchain

    Huang, Y., Wang, H., Wu, L., Tyson, G., Luo, X., Zhang, R., Liu, X., Huang, G. & Jiang, X., 8 Jun 2020, SIGMETRICS Performance 2020 - Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, Inc, p. 83-84 2 p. (SIGMETRICS Performance 2020 - Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer Systems).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2019

    A Blockchain-Based IoT Data Management System for Secure and Scalable Data Sharing

    Wang, Y., Wang, C., Luo, X., Zhang, K. & Li, H., 1 Jan 2019, Network and System Security - 13th International Conference, NSS 2019, Proceedings. Liu, J. K. & Huang, X. (eds.). Springer, p. 167-184 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11928 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts

    Chen, T., Li, Z., Zhang, Y., Luo, X., Wang, T., Hu, T., Xiao, X., Wang, D., Huang, J. & Zhang, X., Sep 2019, Proceedings - 13th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2019. IEEE Computer Society, p. 1-11 8870156. (International Symposium on Empirical Software Engineering and Measurement; vol. 2019-Septemer).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Analyzing use of high privileges on android: An empirical case study of screenshot and screen recording applications

    Meng, M. H., Bai, G., Liu, J. K., Luo, X. & Wang, Y., Feb 2019, Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Revised Selected Papers. Huang, X., Guo, F. & Yung, M. (eds.). Springer Verlag, p. 349-369 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11449 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • DataEther: Data exploration framework for ethereum

    Chen, T., Hu, T., Chen, J., Zhang, X., Li, Z., Zhang, Y., Luo, X., Chen, A., Yang, K., Hu, B., Zhu, T. & Deng, S., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 1369-1380 12 p. 8885041. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    6 Citations (Scopus)
  • Demystifying application performance management libraries for android

    Tang, Y., Zhan, X., Zhou, H., Luo, X., Xu, Z., Zhou, Y. & Yan, Q., Nov 2019, Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019. Institute of Electrical and Electronics Engineers Inc., p. 682-685 4 p. 8952393. (Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Detecting Vulnerable Android Inter-App Communication in Dynamically Loaded Code

    Alhanahnah, M., Yan, Q., Bagheri, H., Zhou, H., Tsutano, Y., Srisa-An, W. & Luo, X., Apr 2019, INFOCOM 2019 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 550-558 9 p. 8737637. (Proceedings - IEEE INFOCOM; vol. 2019-April).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • Graph Embedding Based Familial Analysis of Android Malware using Unsupervised Learning

    Fan, M., Luo, X., Liu, J., Wang, M., Nong, C., Zheng, Q. & Liu, T., May 2019, Proceedings - 2019 IEEE/ACM 41st International Conference on Software Engineering, ICSE 2019. IEEE Computer Society, p. 771-782 12 p. 8812083. (Proceedings - International Conference on Software Engineering; vol. 2019-May).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    17 Citations (Scopus)
  • Identifying Crashing Fault Residence Based on Cross Project Model

    Xu, Z., Zhang, T., Zhang, Y., Tang, Y., Liu, J., Luo, X., Keung, J. & Cui, X., Oct 2019, Proceedings - 2019 IEEE 30th International Symposium on Software Reliability Engineering, ISSRE 2019. Wolter, K., Schieferdecker, I., Gallina, B., Cukier, M., Natella, R., Ivaki, N. & Laranjeiro, N. (eds.). IEEE Computer Society, p. 183-194 12 p. 8987488. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2019-October).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • TokenScope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum

    Chen, T., Zhang, Y., Li, Z., Luo, X., Wang, T., Cao, R., Xiao, X. & Zhang, X., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1503-1520 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    13 Citations (Scopus)
  • Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum

    Cheng, Z., Hou, X., Li, R., Zhou, Y., Luo, X., Li, J. & Ren, K., 2019, Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). p. 47-60

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    Open Access
  • Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines

    Liu, Y. W. D., Leung, A. C. Y., Au, M. H. A., Luo, X., Chiu, P. H. P., Im, S. W. T. & Lam, W. M. W., Dec 2019, Proceedings of the 8th IEEE Conference on Engineering, Technology, and Education (TALE). p. (electronic version)

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2018

    A detailed and real-time performance monitoring framework for blockchain systems

    Zheng, P., Zheng, Z., Luo, X., Chen, X. & Liu, X., 27 May 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP 2018. IEEE Computer Society, p. 134-143 10 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    40 Citations (Scopus)
  • Can We Learn what People are Doing from Raw DNS Queries?

    Li, J., Ma, X., Guodong, L., Luo, X., Zhang, J., Li, W. & Guan, X., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 2240-2248 9 p. 8486210. (Proceedings - IEEE INFOCOM; vol. 2018-April).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    3 Citations (Scopus)
  • Cross-version defect prediction via hybrid active learning with kernel principal component analysis

    Xu, Z., Liu, J., Luo, X. & Zhang, T., 2 Apr 2018, 25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 209-220 12 p. 8330210. (25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings; vol. 2018-March).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    30 Citations (Scopus)
  • Cross version defect prediction with representative data via sparse subset selection

    Xu, Z., Li, S., Tang, Y., Luo, X., Zhang, T., Liu, J. & Xu, J., 28 May 2018, Proceedings - 2018 ACM/IEEE 26th International Conference on Program Comprehension, ICPC 2018. IEEE Computer Society, p. 132-143 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    8 Citations (Scopus)
  • DeepMatching: A structural seed identification framework for social network alignment

    Wang, C., Zhao, Z., Wang, Y., Qin, D., Luo, X. & Qin, T., 19 Jul 2018, Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018. Institute of Electrical and Electronics Engineers Inc., p. 600-610 11 p. (Proceedings - International Conference on Distributed Computing Systems; vol. 2018-July).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Localizing function errors in mobile apps with user reviews

    Yu, L., Chen, J., Zhou, H., Luo, X. & Liu, K., 19 Jul 2018, Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018. Institute of Electrical and Electronics Engineers Inc., p. 418-429 12 p. 8416503. (Proceedings - 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • Model-reuse attacks on deep learning systems

    Ji, Y., Zhang, X., Ji, S., Luo, X. & Wang, T., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 349-363 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    21 Citations (Scopus)
  • PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions

    Chen, T., Huang, W., Jiang, M., Luo, X., Xue, L., Wang, Y. & Zhang, X., 8 Jun 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Lung, C-H., Liu, L., Reisman, S., Takakura, H., Demartini, C., Akiyama, T., Hasan, K., Zhang, Z., Ahamed, S. I., Yang, J-J., Nakamura, M., Conte, T., Cimato, S., Tovar, E. & Claycomb, W. (eds.). IEEE Computer Society, p. 276-285 10 p. 8377668. (Proceedings - International Computer Software and Applications Conference; vol. 1).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Towards saving money in using smart contracts

    Chen, T., Li, Z., Zhou, H., Chen, J., Luo, X., Li, X. & Zhang, X., 27 May 2018, Proceedings 2018 ACM/IEEE 40th International Conference on Software Engineering: New Ideas and Emerging Results, ICSE-NIER 2018. IEEE Computer Society, p. 81-84 4 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    29 Citations (Scopus)
  • Understanding Ethereum via Graph Analysis

    Chen, T., Zhu, Y., Li, Z., Chen, J., Li, X., Luo, X., Lin, X. & Zhange, X., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1484-1492 9 p. 8486401. (Proceedings - IEEE INFOCOM; vol. 2018-April).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    66 Citations (Scopus)
  • 2017

    Adaptive unpacking of android apps

    Xue, L., Luo, X., Yu, L., Wang, S. & Wu, D., 19 Jul 2017, Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017. Institute of Electrical and Electronics Engineers Inc., p. 358-369 12 p. 7985676. (Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    45 Citations (Scopus)
  • An adaptive gas cost mechanism for ethereum to defend against under-priced DoS attacks

    Chen, T., Li, X., Wang, Y., Chen, J., Li, Z., Luo, X., Au, M. H. & Zhang, X., Dec 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    28 Citations (Scopus)
  • Are HTTP/2 Servers Ready Yet?

    Jiang, M., Luo, X., Miu, T., Hu, S. & Rao, W., 13 Jul 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. IEEE, p. 1661-1671 11 p. 7980103

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • AutoFlowLeaker: Circumventing web censorship through automation services

    Hu, S., Ma, X., Jiang, M., Luo, X. & Au, M. H., 13 Oct 2017, Proceedings - 2017 IEEE 36th International Symposium on Reliable Distributed Systems, SRDS 2017. IEEE Computer Society, p. 214-223 10 p. 8069084. (Proceedings of the IEEE Symposium on Reliable Distributed Systems; vol. 2017-September).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Bug Report Enrichment with Application of Automated Fixer Recommendation

    Zhang, T., Chen, J., Jiang, H., Luo, X. & Xia, X., 28 Jun 2017, Proceedings - 2017 IEEE 25th International Conference on Program Comprehension, ICPC 2017. IEEE Computer Society, p. 230-240 11 p. 7961520

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    20 Citations (Scopus)
  • Characterizing promotional attacks in mobile app store

    Sun, B., Luo, X., Akiyama, M., Watanabe, T. & Mori, T., 1 Jan 2017, Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Proceedings. Springer Verlag, p. 113-127 15 p. (Communications in Computer and Information Science; vol. 719).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    1 Citation (Scopus)
  • Characterizing the Impacts of Application Layer DDoS Attacks

    Jiang, M., Wang, C., Luo, X., Miu, M. T. & Chen, T., 7 Sep 2017, Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017. Chen, S. & Altintas, I. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 500-507 8 p. 8029800. (Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    8 Citations (Scopus)
  • Cloud-based parallel concolic execution

    Chen, T., Feng, Y., Luo, X., Lin, X. & Zhang, X., 21 Mar 2017, SANER 2017 - 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering. IEEE, p. 437-441 5 p. 7884649

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • Is what you measure what you expect? Factors affecting smartphone-based mobile network measurement

    Xue, L., Ma, X., Luo, X., Yu, L., Wang, S. & Chen, T., 2 Oct 2017, INFOCOM 2017 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 8057166. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    6 Citations (Scopus)
  • Malton: Towards on-device non-invasive mobile malware analysis for ART

    Xue, L., Zhou, Y., Chen, T., Luo, X. & Gu, G., Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 289-306 18 p. (Proceedings of the 26th USENIX Security Symposium).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    36 Citations (Scopus)
  • Modeling user browsing activity for application layer DDoS attack detection

    Miu, T. N., Wang, C., Luo, X. & Wang, J., 1 Jan 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Springer Verlag, p. 747-750 4 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • Under-optimized smart contracts devour your money

    Chen, T., Li, X., Luo, X. & Zhang, X., 21 Mar 2017, SANER 2017 - 24th IEEE International Conference on Software Analysis, Evolution, and Reengineering. IEEE, p. 442-446 5 p. 7884650

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    112 Citations (Scopus)
  • VCFI: Visible control flow integrity for cloud tenants

    Li, Y., Zhang, C. & Luo, X., 28 Oct 2017, SysTEX 2017 - 2nd Workshop on System Software for Trusted Execution, Colocated with ACM SOSP 2017. Association for Computing Machinery, Inc, a6

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2016

    AndroidPerf: A cross-layer profiling system for Android applications

    Xue, L., Qian, C. & Luo, X., 10 Feb 2016, 2015 IEEE 23rd International Symposium on Quality of Service, IWQoS 2015. IEEE, p. 115-124 10 p. 7404721

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    8 Citations (Scopus)
  • Can we trust the privacy policies of android apps?

    Yu, L., Luo, X., Liu, X. & Zhang, T., 29 Sep 2016, Proceedings - 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016. IEEE, p. 538-549 12 p. 7579770

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    24 Citations (Scopus)
  • Design and evaluation of advanced collusion attacks on collaborative intrusion detection networks in practice

    Meng, W., Luo, X., Li, W. & Li, Y., 1 Jan 2016, Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016. IEEE, p. 1061-1068 8 p. 7847059

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    18 Citations (Scopus)
  • Frequent Subgraph Based Familial Classification of Android Malware

    Fan, M., Liu, J., Luo, X., Chen, K., Chen, T., Tian, Z., Zhang, X., Zheng, Q. & Liu, T., 5 Dec 2016, Proceedings - 2016 IEEE 27th International Symposium on Software Reliability Engineering, ISSRE 2016. IEEE Computer Society, p. 24-35 12 p. 7774504

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    34 Citations (Scopus)
  • I know where you all are! exploiting mobile social apps for large-scale location privacy probing

    Zhao, S., Luo, X., Bai, B., Ma, X., Zou, W., Qiu, X. & Au, M. H. A., 1 Jan 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9722).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Muse: Towards robust and stealthy mobile botnets via multiple message push services

    Chen, W., Luo, X., Yin, C., Xiao, B., Au, M. H. A. & Tang, Y., 1 Jan 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Springer Verlag, p. 20-39 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9722).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    5 Citations (Scopus)
  • Revisiting the description-to-behavior fidelity in android applications

    Yu, L., Luo, X., Qian, C. X. & Wang, S., 2016, Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics). Springer, p. 415-426 12 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

  • 2015

    AutoPPG: Towards automatic generation of privacy policy for android applications

    Yu, L., Zhang, T., Luo, X. & Xue, L., 12 Oct 2015, SPSM 2015 - Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with: CCS 2015. Association for Computing Machinery, Inc, p. 39-50 12 p.

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    21 Citations (Scopus)
  • DexHunter: Toward extracting hidden code from packed android applications

    Zhang, Y., Luo, X. & Yin, H., 1 Jan 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 293-311 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9327).

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    49 Citations (Scopus)
  • 2014

    KTRxer: A portable toolkit for reliable internet probing

    Xue, L., Luo, X. & Shao, Y., 30 Sep 2014, 2014 IEEE 22nd International Symposium of Quality of Service, IWQoS. IEEE, p. 129-134 6 p. 6914311

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)
  • On measuring one-way path metrics from a web server

    Luo, X., Xue, L., Shi, C., Shao, Y., Qian, C. & Chan, E. W. W., 1 Jan 2014, Proceedings - IEEE 22nd International. IEEE Computer Society, p. 203-208 6 p. 6980379

    Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

    4 Citations (Scopus)