My papers are also available on Google Scholar.
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly BibLaTeX Neural Information Processing Systems (NeurIPS), New Orleans, LA, USA, December 10–16, 2023
Improving Adversarial Transferability via Intermediate-level Perturbation Decay BibLaTeX Neural Information Processing Systems (NeurIPS), New Orleans, LA, USA, December 10–16, 2023
HOPPER: Interpretative Fuzzing for Libraries PDF BibLaTeX ACM Conference on Computer and Communications Security (CCS), Copenhagen, Denmark, November 26–30, 2023
MHCN: a Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering BibLaTeX International Conference on Computer Vision (ICCV), Paris, France, October 4–6, 2023
Understanding Programs by Exploiting (Fuzzing) Test Cases PDF BibLaTeX Findings of the Association for Computational Linguistics (ACL), Toronto, Canada, July 9–14, 2023
Squeeze Training for Adversarial Robustness PDF BibLaTeX International Conference on Learning Representations (ICLR), Kigali, Rwanda, May 1–5, 2023 (32%)
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples PDF BibLaTeX International Conference on Learning Representations (ICLR), Kigali, Rwanda, May 1–5, 2023 (32%)
Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques PDF BibLaTeX IEEE International Conference on Software Quality, Reliability, and Security, Guangzhou, China, December 5–9, 2022. Best paper award (27%)
AflIot: Fuzzing on Linux-based IoT Device with Binary-Level Instrumentation PDF BibLaTeX Computers & Security, 2022.
Membership Inference Attack in Face of Data Transformations PDF BibLaTeX IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, October 3–5, 2022. (35%)
An Intermediate-level Attack Framework on The Basis of Linear Regression PDF BibLaTeX IEEE Transactions on Pattern Analysis and Machine Intelligence, 2022.
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations PDF BibLaTeX ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14–18, 2022. (26%)
Feder: communication-efficient byzantine-robust federated learning PDF BibLaTeX ICLR Workshop on Socially Responsible Machine Learning (SRML), April 29, 2022.
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs PDF BibLaTeX IEEE Transactions on Reliability, 2022.
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs BibLaTeX IEEE International Conference on Software Quality, Reliability, and Security (QRS), December 6–10, 2021. Best paper award (25%)
Protect Privacy of Deep Classification Networks by Exploiting Their Generative Power PDF BibLaTeX Machine Learning. 110, 651–674 (2021).
Automatically Detecting and Fixing Concurrency Bugs in Go Software Systems PDF BibLaTeX International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), April 19–23, 2021.
Backpropagating Linearly Improves Transferability of Adversarial Examples PDF BibLaTeX Neural Information Processing Systems (NeurIPS), December 6–12, 2020.
Practical No-box Adversarial Attacks against DNNs PDF BibLaTeX Neural Information Processing Systems (NeurIPS), December 6–12, 2020.
Integrity: Finding Integer Errors by Targeted Fuzzing PDF BibLaTeX International Conference on Security and Privacy in Communication Networks (SecureComm), October 21–23, 2020.
StyleCAPTCHA: CAPTCHA Based on Style-Transferred Images to Defend against Deep Convolutional Networks PDF BibLaTeX ACM-IMS Foundations of Data Science Conference (FODS), October 18–20, 2020.
Yet Another Intermediate-Level Attack PDF BibLaTeX European Conference on Computer Vision (ECCV), August 23–28, 2020.
senDroid: Auditing Sensor Access in Android System-Wide PDF BibLaTeX IEEE Transactions on Dependable and Secure Computing. 17(2):407–421, 2020.
Fooling Detection Alone Is Not Enough: Adversarial Attack Against Multiple Object Tracking PDF BibLaTeX International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia, April 26–30, 2020.
Explore the Transformation Space for Adversarial Images PDF BibLaTeX ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, USA, March 16–18, 2020. (20%)
Matryoshka: Fuzzing Deeply Nested Branches PDF BibLaTeX ACM Conference on Computer and Communications Security (CCS), London, UK, November 11–15, 2019. (16.0%)
Informer: Irregular Traffic Detection for Containerized Microservices RPC in the Real World PDF Abstract BibLaTeX ACM/IEEE Workshop on Security and Privacy in Edge Computing (Edge S&P), Washington DC, November 7–9, 2019.
Falsified Data Attack on Backpressure-Based Traffic Signal Control Algorithms PDF BibLaTeX IEEE Vehicular Networking Conference (VNC), Taipei, Taiwan, December 5–7, 2018.
Less Is More: Culling the Training Set to Improve Robustness of Deep Neural Networks PDF Abstract BibLaTeX Conference on Decision and Game Theory for Security (GameSec), Seattle, WA, October 29–31, 2018.
Angora: Efficient Fuzzing by Principled Search PDF Abstract BibLaTeX Code IEEE Symposium on Security & Privacy (S&P), San Francisco, CA, May 21–23, 2018. (10.0%)
Detecting Third-Party Libraries in Android Applications with High Precision and Recall PDF Abstract BibLaTeX IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Campobasso, Italy, March 20–23, 2018.
Magnet: a Two-Pronged Defense Against Adversarial Examples PDF Abstract Presentation BibLaTeX ACM Conference on Computer and Communications Security (CCS), Dallas, TX. October 30 – November 3, 2017. (17.9%)
Evaluating Private Modes in Desktop and Mobile Browsers and Their Resistance to Fingerprinting PDF Abstract BibLaTeX IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, October 9–11, 2017. (29.9%)
Surgescan: Enforcing Security Policies on Untrusted Third-Party Android Libraries PDF Abstract BibLaTeX The 14th IEEE Conference on Advanced and Trusted Computing (ATC), San Francisco, CA. August 4–8, 2017.
Rethinking Permission Enforcement Mechanism on Mobile Systems PDF BibLaTeX IEEE Transactions on Information Forensics & Security. 11(10):2227–2240, 2016.
AppShield: Enabling Multi-Entity Access Control Cross Platforms for Mobile App Management PDF BibLaTeX International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou, China. October 10–12, 2016. (23.4%)
Security Analysis of Personal Unmanned Aerial Vehicles BibLaTeX International Conference on Security and Privacy in Communication Networks (SECURECOMM), Guangzhou, China. October 10–12, 2016. (23.4%)
RevDroid: Code Analysis of the Side Effects After Dynamic Permission Revocation of Android Apps PDF BibLaTeX ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi'an, China. May 30 – June 3, 2016.(20.9%)
On the Origin of Mobile Apps: Network Provenance for Android Applications PDF Abstract BibLaTeX 6th ACM Conference on Data and Application Security and Privacy (CODASPY), New Orleans, LA, March 9–11, 2016. (22%)
FineDroid: Enforcing Permissions with System-Wide Application PDF Abstract BibLaTeX International Conference on Security and Privacy in Communication Networks (SECURECOMM), Dallas, TX, October 26–29, 2015.
Predictive Eviction: a Novel Policy for Optimizing TLS Session Cache Performance PDF Abstract BibLaTeX IEEE Global Communications Conference: Communications and Information System Security (GLOBECOM), San Diego, CA, December 6–10, 2015.
AnDarwin: Scalable Detection of Android Application Clones Based on Semantics PDF Abstract BibLaTeX IEEE Transactions on Mobile Computing, 14(10):2007–2019, 2015.
AppCracker: Widespread Vulnerabilities in User and Session Authentication in Mobile Apps PDF Abstract BibLaTeX IEEE Mobile Security Technologies (MoST), San Jose, CA, May 21, 2015. (30%)
MAdFraud: Investigating Ad Fraud in Android Application PDF Abstract Data Set Presentation BibLaTeX 12th International Conference on Mobile Systems, Applications and Services (MobiSys), Bretton Woods, NH, USA, June 16-19, 2014. (13.5%)
A First Look At Firefox OS Security PDF Abstract BibLaTeX IEEE Mobile Security Technologies (MoST), San Jose, CA, May 17, 2014. (37%)
Moving Target Defenses in the HELIX Self-Regenerative Architecture PDF Abstract BibLaTeX In Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Ed. by Sushil Jajodia et al., Springer-Verlag New York, 2013, pages 117–149.
Using and Asking: APIs Used in the Android Market and Asked About in Stackoverflow PDF Abstract BibLaTeX 5th International Conference on Social Informatics (SocInfo), Kyoto, Japan, November 25–27, 2013.
Andarwin: Scalable Semantics-Based Detection of Similar Android Applications PDF Abstract Dataset BibLaTeX 18th European Symposium on Research in Computer Security (ESORICS), Egham, U.K., September 9–13, 2013. (18%)
Retroskeleton: Retrofitting Android Apps
PDF
Abstract
Presentation
Video
BibLaTeX
11th International Conference on Mobile Systems,
Applications and Services (MobiSys), Taipei, Taiwan, June 25–28, 2013. (15.7%)
Adrob: Examining the Landscape and Impact of Android Application Plagiarism
PDF
Abstract
Presentation
Video
BibLaTeX
11th International Conference on Mobile Systems,
Applications and Services (MobiSys), Taipei, Taiwan, June 25–28, 2013.
(15.7%)
Quantifying the Effects of Removing Permissions from Android Applications PDF Abstract BibLaTeX IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 23, 2013. (40%)
Asking for (and About) Permissions Used by Android Apps PDF Abstract Presentation BibLaTeX 10th Working Conference on Mining Software Repositories (MSR), San Francisco, CA, May 18–19, 2013. (38.2%)
Attack of the Clones: Detecting Cloned Applications on Android Markets PDF Abstract BibLaTeX 17th European Symposium on Research in Computer Security (ESORICS), Pisa, Italy, September 10–12, 2012. (20%)
AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale PDF Abstract BibLaTeX 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13–15, 2012.
On the Practicality of Motion Based Keystroke Inference Attack PDF Abstract BibLaTeX 5th International Conference on Trust & Trustworthy Computing (TRUST), Vienna, Austria, June 13–15, 2012.
Investigating User Privacy in Android Ad Libraries. PDF Abstract BibLaTeX IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)
I-ARM-Droid: a Rewriting Framework for In-App Reference Monitors for Android Applications PDF Abstract BibLaTeX IEEE Mobile Security Technologies (MoST), San Francisco, CA, May 24, 2012. (39%)
Opaak: Using Mobile Phones to Limit Anonymous Identities Online PDF Abstract BibLaTeX 10th International Conference on Mobile Systems, Applications and Services (MobiSys), Low Wood Bay, Lake District, United Kingdom, June 26–28, 2012. (18%)
Privacy-Preserving Alibi Systems PDF Abstract BibLaTeX 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Seoul, South Korea, May 1–3, 2012. (30%)
Noncespaces: Using Randomization to Defeat Cross-Site Scripting Attacks PDF Abstract BibLaTeX Computer & Security, 31:612–628, 2012.
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion PDF Abstract Slides (PPT PDF) BibLaTeX 6th USENIX Workshop on Hot Topics in Security (HotSec '11), San Francisco, CA, August 9, 2011. (20%).
Gesture Authentication with Touch Input for Mobile Devices PDF Abstract BibLaTeX 3rd International Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec), Aalborg, Denmark, May 17–19, 2011.
Good Neighbor: Secure Pairing of Nearby Wireless Devices by Multiple Antennas PDF Abstract Slides BibLaTeX 18th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 6–9, 2011. (20%)
DBTaint: Cross-Application Information Flow Tracking Via Databases PDF Abstract Slides BibLaTeX USENIX Conference on Web Application, Boston, MA, June 23-24, 2010.
WebCallerID: Leveraging Cellular Networks for Web Authentication PDF Abstract BibLaTeX Journal of Computer Security, 19(5):869–893, 2011.
CapAuth: a Capability-Based Handover Scheme PDF Abstract BibLaTeX IEEE INFOCOM 2010: The 27th Conference on Computer Communications, San Diego, CA, March 15–19, 2010.
Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks PDF Abstract BibLaTeX IEEE Transactions on Mobile Computing, 9:609-620, 2010.
Secure File System Services for Web 2.0 Applications PDF Abstract BibLaTeX Proceedings of the The ACM Cloud Computing Security Workshop (CCSW), Chicago, IL, November 13, 2009. (37%)
Multi-Party Off-the-Record Messaging PDF Abstract BibLaTeX Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS), Chicago, IL, November 9–13, 2009. (18%)
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages PDF Abstract BibLaTeX Proceedings of the 5th International Conference on Security and Privacy in Communication Networks (SecureComm), Athens, Greece, September 14–18, 2009. (26%)
Noise Injection for Search Privacy Protection PDF Abstract BibLaTeX Proceedings of the 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), Vancouver, Canada, August 29–31, 2009. (13%)
Defending Against Sensor-Sniffing Attacks on Mobile Phones PDF Abstract BibLaTeX The First ACM SIGCOMM Workshop on Networking, Systems, Applications on Mobile Handhelds (MobiHeld), Barcelona, Spain, August 17, 2009.
Measuring Privacy Risk in Online Social Networks PDF Abstract BibLaTeX Web 2.0 Security and Privacy (W2SP), Oakland, CA, May 21, 2009. (36%)
Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks PDF Abstract Slide BibLaTeX Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009. (12%)
A General Framework for Benchmarking Firewall Optimization Techniques PDF Abstract BibLaTeX IEEE Transactions on Network and Service Management, 5(4):227-238, December 2008.
OMash: Enabling Secure Web Mashups Via Object Abstraction PDF Abstract Slides (PPTX PDF) BibLaTeX Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, October 27–31, 2008. (18%)
iPhish: Phishing Vulnerabilities on Consumer Electronics PDF Abstract BibLaTeX Proceedings of Usability, Psychology, and Security 2008, San Francisco, CA, April, 2008.
Distributed Authentication for Low-Cost Wireless Networks PDF Abstract BibLaTeX Proceedings of the Ninth Workshop on Mobile Computing Systems and Applications (ACM HotMobile), Napa Valley, CA, February 25–26, 2008. (23%)
Exploiting Opportunistic Scheduling in Cellular Data Networks PDF Abstract Slides BibLaTeX Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, February 10–13, 2008. (18%)
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms PDF Abstract BibLaTeX Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), Miami Beach, FL, December 10–14, 2007. (22%)
Spam Double-Funnel: Connecting Web Spammers with Advertisers PDF Abstract BibLaTeX Proceedings of the 16th International World Wide Web Conference (WWW2007), Banff, Canada, May 8–12, 2007. (15%)
A Quantitative Study of Forum Spamming Using Context-Based Analysis PDF Abstract Slides BibLaTeX Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), pages 79–92, San Diego, CA, February, 2007. (15%)
Back to the future: a framework for automatic malware removal and system repair PDF PS Abstract BibLaTeX Proceedings of 2006 Annual Computer Security Applications Conference (ACSAC 22), Miami Beach, FL, December, 2006 (30%)
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery PDF PS Abstract Slides BibLaTeX Proceedings of the Second IEEE Communications Society / CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm), Baltimore, MD, August, 2006. (25%)
FIREMAN: a Toolkit for FIREwall Modeling and ANalysis PDF Abstract BibLaTeX Proceedings of 2006 IEEE Symposium on Security and Privacy, Oakland, CA, May, 2006. (13%)
Model Checking an Entire Linux Distribution for Security Violations PDF PS Abstract Slides BibLaTeX Proceedings of 21st Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December, 2005. (23%)
Using Build-Integrated Static Checking to Preserve Correctness Invariants PDF PS Abstract Slides(OpenOfficePDF) BibLaTeX Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), pages 288–297, Washington, DC, October 2004. (14%)
Model checking one million lines of C code PDF PS Abstract Slides(PPT) BibLaTeX Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS), pages 171–185, San Diego, CA, February 2004.
Setuid Demystified PDF PS Abstract Slides(PPT) BibLaTeX Proceedings of the 11th USENIX Security Symposium, pages 171–190, San Francisco, CA, August 2002.
MOPS: an Infrastructure for Examining Security Properties of Software PDF PS Abstract BibLaTeX Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), pages 235–244, Washington, DC, November 2002.
Optimizing Search by Showing Results in Context PDF PS Abstract BibLaTeX Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 277–284, Seattle, WA, April 2001.
Bringing Order to the Web: Automatically Categorizing Search Results PDF PS Word Abstract Slides(PPT) BibLaTeX Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), pages 145–152, The Hague, The Netherlands, April 2000.
Hierarchical Classification of Web Content PDF PS Abstract BibLaTeX Proceedings of the 23rd ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR), pages 256–263, Athens, Greece, July 2000.
Classified Displays of Web Search Results BibLaTeX 11th ASIS&T SIG/CR Classification Research Workshop, pages 87–90, November 2000.
Evaluation of Decision Forests on Text Categorization PDF PS Abstract Slides(PPT) BibLaTeX Proceedings of the SPIE Conference on Document Recognition and Retrieval VII, volume 3967, pages 191–199, San Jose, CA, January 2000.
Integrating Geometrical and Linguistic Analysis for E-mail Signature Block Parsing PDF PS Abstract BibLaTeX ACM Transactions on Information Systems, 17(4):343–366, October 1999.
Emu: an E-mail Preprocessor for Text-to-speech PDF PS Abstract BibLaTeX 1998 Workshop on Multimedia Signal Processing, pages 239–244, Redondo Beach, CA, December 1998. IEEE Signal Processing Society.
E-mail Signature Block Analysis PDF PS Abstract BibLaTeX Proceedings of the 14th International Conference on Pattern Recognition (ICPR), pages 1153–1156, Brisbane, Australia, August 1998.
Piecewise Linear Modulation Model of Handwriting PDF PS Abstract BibLaTeX Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR), pages 363–367, Ulm, Germany, August 1997.