Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Behavior Query Discovery in System-Generated Temporal Graphs., , , , , , , and . Proc. VLDB Endow., 9 (4): 240-251 (2015)Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Paladin: Automated Generation of Reproducible Test Cases for Android Apps., , , , and . HotMobile, page 99-104. ACM, (2019)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit., , , , , , , , , and . WWW, page 3327-3335. ACM, (2022)Characterizing Android App Signing Issues., , , , and . ASE, page 280-292. IEEE, (2019)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps., , , , , and . ICSE, page 685-697. ACM, (2022)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)