Author of the publication

An Effective Approach for Routing the Bug Reports to the Right Fixers.

, , , , and . Internetware, page 11:1-11:10. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Behavior Query Discovery in System-Generated Temporal Graphs., , , , , , , and . Proc. VLDB Endow., 9 (4): 240-251 (2015)Paladin: Automated Generation of Reproducible Test Cases for Android Apps., , , , and . HotMobile, page 99-104. ACM, (2019)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Characterizing Android App Signing Issues., , , , and . ASE, page 280-292. IEEE, (2019)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit., , , , , , , , , and . WWW, page 3327-3335. ACM, (2022)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)On the Security Risks of Knowledge Graph Reasoning., , , , , , , , and . USENIX Security Symposium, page 3259-3276. USENIX Association, (2023)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)