Seguir
Xusheng Xiao
Título
Citado por
Citado por
Año
WHYPER: Towards Automating Risk Assessment of Mobile Applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
5222013
Machine learning: new ideas and tools in environmental science and engineering
S Zhong, K Zhang, M Bagheri, JG Burken, A Gu, B Li, X Ma, BL Marrone, ...
Environmental Science & Technology 55 (19), 12741-12754, 2021
4412021
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
3192015
Inferring method specifications from natural language API descriptions
R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar
2012 34th international conference on software engineering (ICSE), 815-825, 2012
2342012
Automated Extraction of Security Policies from Natural-Language Software Documents
X Xiao, A Paradkar, S Thummalapenta, T Xie
FSE '12 Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
1752012
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1632016
SUPOR: precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 2015), 977-992, 2015
1622015
Hyperservice: Interoperability and programmability across heterogeneous blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1272019
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 2018
1062018
Precise identification of problems for structural test generation
X Xiao, T Xie, N Tillmann, J De Halleux
Proceedings of the 33rd International Conference on Software Engineering …, 2011
982011
Enabling efficient cyber threat hunting with cyber threat intelligence
P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu, P Mittal, SR Kulkarni, D Song
2021 IEEE 37th International Conference on Data Engineering (ICDE), 193-204, 2021
972021
Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks
X Xiao, S Han, D Zhang, T Xie
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
902013
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
842018
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
812018
Make Web3. 0 Connected
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu
IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021
752021
User-aware privacy control via extended static-information-flow analysis
X Xiao, N Tillmann, M Fahndrich, J De Halleux, M Moskal
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
682012
Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution
X Xiao, S Li, T Xie, N Tillmann
Proceedings of the 28th IEEE/ACM International Conference on Automated …, 2013
672013
IconIntent: Automatic Identification Of Sensitive UI Widgets Based On Icon Classification For Android Apps
X Xiao, X Wang, Z Cao, H Wang, P Gao
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
622019
Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange
P Xia, H Wang, B Gao, W Su, Z Yu, X Luo, C Zhang, X Xiao, G Xu
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (3 …, 2021
592021
DeepIntent: Deep Icon-Behavior Learning For Detecting Intention-Behavior Discrepancy In Mobile Apps
S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
582019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20