Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Structural Attack against Graph Based Android Malware Detection., , , , , , , , and . CCS, page 3218-3235. ACM, (2021)Feature Location Benchmark for Decomposing and Reusing Android Apps., , , , , and . CoRR, (2020)A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices., , , , , , , and . CoRR, (2021)Demystifying Scam Tokens on Uniswap Decentralized Exchange., , , , , , , , and . CoRR, (2021)Towards Robust Reasoning over Knowledge Graphs., , , , , , and . CoRR, (2021)VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses., , , , , , and . CoRR, (2023)LLM-CompDroid: Repairing Configuration Compatibility Bugs in Android Apps with Pre-trained Large Language Models., , , , , , and . CoRR, (2024)Examiner: Automatically Locating Inconsistent Instructions Between Real Devices and CPU Emulators for ARM., , , , , , , and . CoRR, (2021)The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models., , , , , and . CoRR, (2019)Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review., , , , , , and . IEEE Trans. Software Eng., 48 (10): 4181-4213 (2022)