Author of the publication

High Fidelity Data Reduction for Big Data Security Dependency Analyses.

, , , , , , , , and . ACM Conference on Computer and Communications Security, page 504-516. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Paladin: Automated Generation of Reproducible Test Cases for Android Apps., , , , and . HotMobile, page 99-104. ACM, (2019)A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Behavior Query Discovery in System-Generated Temporal Graphs., , , , , , , and . Proc. VLDB Endow., 9 (4): 240-251 (2015)Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit., , , , , , , , , and . WWW, page 3327-3335. ACM, (2022)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)Characterizing Android App Signing Issues., , , , and . ASE, page 280-292. IEEE, (2019)On the Security Risks of Knowledge Graph Reasoning., , , , , , , , and . USENIX Security Symposium, page 3259-3276. USENIX Association, (2023)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)