default search action
Haoyu Wang 0001
Person information
- affiliation: Huazhong University of Science and Technology, Wuhan, China
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
- affiliation (PhD 2016): Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China
Other persons with the same name
- Haoyu Wang (aka: Hao-Yu Wang) — disambiguation page
- Haoyu Wang 0002 — Amazon Alexa, Cambridge, MA, USA (and 1 more)
- Haoyu Wang 0003 — University of Virginia, Charlottesville, VA, USA
- Haoyu Wang 0004 — Purdue University, West Lafayette, IN, USA
- Haoyu Wang 0005 — University of Pennsylvania, PA, USA (and 1 more)
- Haoyu Wang 0006 — University of Ilinois at Chicago, IL, USA
- Haoyu Wang 0007 — ShanghaiTech University, Shanghai, China
- Haoyu Wang 0008 — China University of Mining and Technology, Engineering Research Center of Intelligent Control for Underground Space, China (and 1 more)
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WalletRadar: towards automating the detection of vulnerabilities in browser-based cryptocurrency wallets. Autom. Softw. Eng. 31(1): 32 (2024) - [j34]Ningke Li, Yuekang Li, Yi Liu, Ling Shi, Kailong Wang, Haoyu Wang:
Drowzee: Metamorphic Testing for Fact-Conflicting Hallucination Detection in Large Language Models. Proc. ACM Program. Lang. 8(OOPSLA2): 1843-1872 (2024) - [j33]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. Proc. ACM Softw. Eng. 1(FSE): 2075-2097 (2024) - [j32]Xiao Cheng, Xu Nie, Ningke Li, Haoyu Wang, Zheng Zheng, Yulei Sui:
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors. IEEE Trans. Dependable Secur. Comput. 21(2): 542-558 (2024) - [j31]Siwei Wu, Zhou Yu, Dabao Wang, Yajin Zhou, Lei Wu, Haoyu Wang, Xingliang Yuan:
DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 4147-4161 (2024) - [j30]Yixuan Zhang, Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. ACM Trans. Model. Perform. Evaluation Comput. Syst. 9(2): 5:1-5:24 (2024) - [j29]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. ACM Trans. Softw. Eng. Methodol. 33(2): 37:1-37:29 (2024) - [j28]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-Based Detectors. ACM Trans. Softw. Eng. Methodol. 33(5): 127:1-127:33 (2024) - [j27]Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. IEEE Trans. Software Eng. 50(6): 1325-1339 (2024) - [c125]Shenao Wang, Feng Dong, Hangfeng Yang, Jingheng Xu, Haoyu Wang:
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments. CCS 2024: 2326-2340 - [c124]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. ESORICS (3) 2024: 88-109 - [c123]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. FORGE 2024: 12-23 - [c122]Liuhuo Wan, Chuan Yan, Mark Huasong Meng, Kailong Wang, Haoyu Wang:
Analyzing Excessive Permission Requests in Google Workspace Add-Ons. ICECCS 2024: 323-345 - [c121]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c120]Taiyu Wong, Chao Zhang, Yuandong Ni, Mingsen Luo, Heying Chen, Yufei Yu, Weilin Li, Xiapu Luo, Haoyu Wang:
ConFuzz: Towards Large Scale Fuzz Testing of Smart Contracts in Ethereum. INFOCOM 2024: 1691-1700 - [c119]Kai Ma, Zhuo Wang, Yanjie Zhao, Haoyu Wang:
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain. Internetware 2024 - [c118]Jikai Wang, Haoyu Wang:
NativeSummary: Summarizing Native Binary Code for Inter-language Static Analysis of Android Apps. ISSTA 2024: 971-982 - [c117]Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang:
WASMaker: Differential Testing of WebAssembly Runtimes via Semantic-Aware Binary Generation. ISSTA 2024: 1262-1273 - [c116]Ningyu He, Zhehao Zhao, Hanqin Guan, Jikai Wang, Shuo Peng, Ding Li, Haoyu Wang, Xiangqun Chen, Yao Guo:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. ISSTA 2024: 1816-1820 - [c115]Chao Wang, Tianming Liu, Yanjie Zhao, Lin Zhang, Xiaoning Du, Li Li, Haoyu Wang:
Towards Demystifying Android Adware: Dataset and Payload Location. ASE Workshops 2024: 167-175 - [c114]Liangxuan Wu, Yanjie Zhao, Chao Wang, Tianming Liu, Haoyu Wang:
A First Look at LLM-powered Smartphones. ASE Workshops 2024: 208-217 - [c113]Weimin Chen, Xiapu Luo, Haoyu Wang, Heming Cui, Shuyu Zheng, Xuanzhe Liu:
EVMBT: A Binary Translation Scheme for Upgrading EVM Smart Contracts to WASM. LCTES 2024: 131-142 - [c112]Liangxuan Wu, Yanjie Zhao, Xinyi Hou, Tianming Liu, Haoyu Wang:
ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle. MSR 2024: 142-146 - [c111]Liu Wang, Conghui Zheng, Haoyu Wang, Xiapu Luo, Gareth Tyson, Yi Wang, Shangguang Wang:
Global Prosperity or Local Monopoly? Understanding the Geography of App Popularity. MSR 2024: 322-334 - [c110]Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots. NDSS 2024 - [c109]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. NDSS 2024 - [c108]Levi Taiji Li, Ningyu He, Haoyu Wang, Mu Zhang:
VETEOS: Statically Vetting EOSIO Contracts for the "Groundhog Day" Vulnerabilities. NDSS 2024 - [c107]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. NDSS 2024 - [c106]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
Miracle or Mirage? A Measurement Study of NFT Rug Pulls. SIGMETRICS/Performance (Abstracts) 2024: 87-88 - [c105]Weimin Chen, Xiapu Luo, Haipeng Cai, Haoyu Wang:
Towards Smart Contract Fuzzing on GPUs. SP 2024: 2255-2272 - [c104]Zikan Dong, Tianming Liu, Jiapeng Deng, Haoyu Wang, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu:
Exploring Covert Third-party Identifiers through External Storage in the Android New Era. USENIX Security Symposium 2024 - [c103]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. USENIX Security Symposium 2024 - [c102]Jintao Huang, Pengcheng Xia, Jiefeng Li, Kai Ma, Gareth Tyson, Xiapu Luo, Lei Wu, Yajin Zhou, Wei Cai, Haoyu Wang:
Unveiling the Paradox of NFT Prosperity. WWW 2024: 167-177 - [c101]Liuhuo Wan, Kailong Wang, Haoyu Wang, Guangdong Bai:
Is It Safe to Share Your Files? An Empirical Security Analysis of Google Workspace. WWW 2024: 1892-1901 - [c100]Liuhuo Wan, Kailong Wang, Kulani Mahadewa, Haoyu Wang, Guangdong Bai:
Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations. WWW 2024: 3106-3116 - [i92]Haodong Li, Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu, Guoai Xu, Guosheng Xu, Haoyu Wang:
Digger: Detecting Copyright Content Mis-usage in Large Language Model Training. CoRR abs/2401.00676 (2024) - [i91]Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang:
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack. CoRR abs/2401.02659 (2024) - [i90]Baijun Cheng, Shengming Zhao, Kailong Wang, Meizhen Wang, Guangdong Bai, Ruitao Feng, Yao Guo, Lei Ma, Haoyu Wang:
Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors. CoRR abs/2401.02686 (2024) - [i89]Baijun Cheng, Kailong Wang, Cuiyun Gao, Xiapu Luo, Li Li, Yao Guo, Xiangqun Chen, Haoyu Wang:
The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors. CoRR abs/2401.02737 (2024) - [i88]Shenao Wang, Yuekang Li, Kailong Wang, Yi Liu, Hui Li, Yang Liu, Haoyu Wang:
MiniScope: Automated UI Exploration and Privacy Inconsistency Detection of MiniApps via Two-phase Iterative Hybrid Analysis. CoRR abs/2401.03218 (2024) - [i87]Pengcheng Xia, Zhou Yu, Kailong Wang, Kai Ma, Shuo Chen, Xiapu Luo, Yajin Zhou, Lei Wu, Guangdong Bai, Haoyu Wang:
The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web. CoRR abs/2401.04662 (2024) - [i86]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. CoRR abs/2402.14480 (2024) - [i85]Yuxi Li, Yi Liu, Gelei Deng, Ying Zhang, Wenjia Song, Ling Shi, Kailong Wang, Yuekang Li, Yang Liu, Haoyu Wang:
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection. CoRR abs/2404.09894 (2024) - [i84]Yixuan Zhang, Mugeng Liu, Haoyu Wang, Yun Ma, Gang Huang, Xuanzhe Liu:
Research on WebAssembly Runtimes: A Survey. CoRR abs/2404.12621 (2024) - [i83]Shenao Wang, Yanjie Zhao, Xinyi Hou, Haoyu Wang:
Large Language Model Supply Chain: A Research Agenda. CoRR abs/2404.12736 (2024) - [i82]Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
LLM App Store Analysis: A Vision and Roadmap. CoRR abs/2404.12737 (2024) - [i81]Ningke Li, Yuekang Li, Yi Liu, Ling Shi, Kailong Wang, Haoyu Wang:
HalluVault: A Novel Logic Programming-aided Metamorphic Testing Framework for Detecting Fact-Conflicting Hallucinations in Large Language Models. CoRR abs/2405.00648 (2024) - [i80]Pengcheng Xia, Yanhui Guo, Zhaowen Lin, Jun Wu, Pengbo Duan, Ningyu He, Kailong Wang, Tianming Liu, Yinliang Yue, Guoai Xu, Haoyu Wang:
WALLETRADAR: Towards Automating the Detection of Vulnerabilities in Browser-based Cryptocurrency Wallets. CoRR abs/2405.04332 (2024) - [i79]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - [i78]Dongxun Su, Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
GPT Store Mining and Analysis. CoRR abs/2405.10210 (2024) - [i77]Wangchenlu Huang, Shenao Wang, Yanjie Zhao, Guosheng Xu, Haoyu Wang:
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards. CoRR abs/2405.10758 (2024) - [i76]Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. CoRR abs/2405.15630 (2024) - [i75]Tianyang Chi, Ningyu He, Xiaohui Hu, Haoyu Wang:
Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum. CoRR abs/2405.17944 (2024) - [i74]Tianle Sun, Ningyu He, Jiang Xiao, Yinliang Yue, Xiapu Luo, Haoyu Wang:
All Your Tokens are Belong to Us: Demystifying Address Verification Vulnerabilities in Solidity Smart Contracts. CoRR abs/2405.20561 (2024) - [i73]Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. CoRR abs/2406.09807 (2024) - [i72]Xinyu She, Yanjie Zhao, Haoyu Wang:
WaDec: Decompile WebAssembly Using Large Language Model. CoRR abs/2406.11346 (2024) - [i71]Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li:
LLM for Mobile: An Initial Roadmap. CoRR abs/2407.06573 (2024) - [i70]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
On the (In)Security of LLM App Stores. CoRR abs/2407.08422 (2024) - [i69]Yi Liu, Guanyu Wang, Xinyi Zheng, Gelei Deng, Kailong Wang, Yang Liu, Haoyu Wang:
SPOLRE: Semantic Preserving Object Layout Reconstruction for Image Captioning System Testing. CoRR abs/2407.18512 (2024) - [i68]Shide Zhou, Tianlin Li, Yihao Huang, Ling Shi, Kailong Wang, Yang Liu, Haoyu Wang:
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing. CoRR abs/2407.20281 (2024) - [i67]Yanhui Guo, Dong Wang, Liu Wang, Yongsheng Fang, Chao Wang, Minghui Yang, Tianming Liu, Haoyu Wang:
Beyond App Markets: Demystifying Underground Mobile App Distribution Via Telegram. CoRR abs/2408.03482 (2024) - [i66]Baijun Cheng, Ce Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. CoRR abs/2408.04344 (2024) - [i65]Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. CoRR abs/2408.04905 (2024) - [i64]Ningyu He, Zhehao Zhao, Hanqin Guan, Jikai Wang, Shuo Peng, Ding Li, Haoyu Wang, Xiangqun Chen, Yao Guo:
SeeWasm: An Efficient and Fully-Functional Symbolic Execution Engine for WebAssembly Binaries. CoRR abs/2408.08537 (2024) - [i63]Minghao Liu, Zonglin Di, Jiaheng Wei, Zhongruo Wang, Hengxiang Zhang, Ruixuan Xiao, Haoyu Wang, Jinlong Pang, Hao Chen, Ankit Shah, Hongxin Wei, Xinlei He, Zhaowei Zhao, Haobo Wang, Lei Feng, Jindong Wang, James Davis, Yang Liu:
Automatic Dataset Construction (ADC): Sample Collection, Data Curation, and Beyond. CoRR abs/2408.11338 (2024) - [i62]Shide Zhou, Tianlin Li, Kailong Wang, Yihao Huang, Ling Shi, Yang Liu, Haoyu Wang:
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks. CoRR abs/2408.15207 (2024) - [i61]Shenao Wang, Feng Dong, Hangfeng Yang, Jingheng Xu, Haoyu Wang:
CanCal: Towards Real-time and Lightweight Ransomware Detection and Response in Industrial Environments. CoRR abs/2408.16515 (2024) - [i60]Xinyi Zheng, Chen Wei, Shenao Wang, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. CoRR abs/2409.09356 (2024) - [i59]Jian Zhao, Shenao Wang, Yanjie Zhao, Xinyi Hou, Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. CoRR abs/2409.09368 (2024) - [i58]Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li:
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach. CoRR abs/2409.14177 (2024) - [i57]Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang:
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization. CoRR abs/2410.08858 (2024) - [i56]Fan Yang, Yihao Huang, Kailong Wang, Ling Shi, Geguang Pu, Yang Liu, Haoyu Wang:
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models. CoRR abs/2410.11639 (2024) - 2023
- [j26]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
Miracle or Mirage? A Measurement Study of NFT Rug Pulls. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 51:1-51:25 (2023) - [j25]Xuanzhe Liu, Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin:
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing. ACM Trans. Softw. Eng. Methodol. 32(5): 119:1-119:29 (2023) - [j24]Xuanzhe Liu, Diandian Gu, Zhenpeng Chen, Jinfeng Wen, Zili Zhang, Yun Ma, Haoyu Wang, Xin Jin:
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective. ACM Trans. Softw. Eng. Methodol. 32(6): 156:1-156:26 (2023) - [j23]Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John C. Grundy:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023) - [j22]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [c99]Bowen He, Yuan Chen, Zhuo Chen, Xiaohui Hu, Yufeng Hu, Lei Wu, Rui Chang, Haoyu Wang, Yajin Zhou:
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum. CCS 2023: 120-134 - [c98]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c97]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ICDCS 2023: 1073-1074 - [c96]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c95]Jingjing Wang, Liu Wang, Feng Dong, Haoyu Wang:
Re-measuring the Label Dynamics of Online Anti-Malware Engines from Millions of Samples. IMC 2023: 253-267 - [c94]Liu Wang, Haoyu Wang, Huiyi Wang, Li Li, Yi Wang:
A Deep Dive into the Featured iOS Apps. Internetware 2023: 112-122 - [c93]Shuohan Wu, Jianfeng Li, Hao Zhou, Yongsheng Fang, Kaifa Zhao, Haoyu Wang, Chenxiong Qian, Xiapu Luo:
CydiOS: A Model-Based Testing Framework for iOS Apps. ISSTA 2023: 1-13 - [c92]Xu Nie, Ningke Li, Kailong Wang, Shangguang Wang, Xiapu Luo, Haoyu Wang:
Understanding and Tackling Label Errors in Deep Learning-Based Vulnerability Detection (Experience Paper). ISSTA 2023: 52-63 - [c91]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. ISSTA 2023: 385-397 - [c90]Shiyao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang, Xiapu Luo:
WADIFF: A Differential Testing Framework for WebAssembly Runtimes. ASE 2023: 939-950 - [c89]Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. ASE 2023: 1403-1415 - [c88]Ningke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang:
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains. ASE 2023: 1993-2005 - [c87]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
BREWasm: A General Static Binary Rewriting Framework for WebAssembly. SAS 2023: 139-163 - [c86]Shenao Wang, Yanjie Zhao, Kailong Wang, Haoyu Wang:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32 - [c85]Yanjie Zhao, Yue Zhang, Haoyu Wang:
Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins. SaTS@CCS 2023: 59-64 - [c84]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. SIGMETRICS (Abstracts) 2023: 91-92 - [c83]Xingman Chen, Yinghao Shi, Zheyu Jiang, Yuan Li, Ruoyu Wang, Haixin Duan, Haoyu Wang, Chao Zhang:
MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries. USENIX Security Symposium 2023: 841-858 - [c82]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [c81]Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John C. Grundy, Li Li:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141 - [i55]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. CoRR abs/2301.12102 (2023) - [i54]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. CoRR abs/2301.12348 (2023) - [i53]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. CoRR abs/2304.07204 (2023) - [i52]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
A General Static Binary Rewriting Framework for WebAssembly. CoRR abs/2305.01454 (2023) - [i51]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
A Deep Dive into NFT Rug Pulls. CoRR abs/2305.06108 (2023) - [i50]Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu:
Prompt Injection attack against LLM-integrated Applications. CoRR abs/2306.05499 (2023) - [i49]Xin-Cheng Wen, Cuiyun Gao, Feng Luo, Haoyu Wang, Ge Li, Qing Liao:
LIVABLE: Exploring Long-Tailed Classification of Software Vulnerability Types. CoRR abs/2306.06935 (2023) - [i48]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. CoRR abs/2307.00549 (2023) - [i47]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023) - [i46]Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu:
Jailbreaker: Automated Jailbreak Across Multiple Large Language Model Chatbots. CoRR abs/2307.08715 (2023) - [i45]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. CoRR abs/2308.03123 (2023) - [i44]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i43]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023) - [i42]Li Li, Xiang Gao, Hailong Sun, Chunming Hu, Xiaoyu Sun, Haoyu Wang, Haipeng Cai, Ting Su, Xiapu Luo, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy, Tao Xie, Haibo Chen, Huaimin Wang:
Software Engineering for OpenHarmony: A Research Roadmap. CoRR abs/2311.01311 (2023) - [i41]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. CoRR abs/2311.02331 (2023) - [i40]Kai Ma, Jintao Huang, Ningyu He, Zhuo Wang, Haoyu Wang:
SoK: On the Security of Non-Fungible Tokens. CoRR abs/2312.08000 (2023) - [i39]Shangtong Cao, Ningyu He, Xinyu She, Yixuan Zhang, Mu Zhang, Haoyu Wang:
WRTester: Differential Testing of WebAssembly Runtimes via Semantic-aware Binary Generation. CoRR abs/2312.10456 (2023) - 2022
- [j21]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst. 6(2): 40:1-40:27 (2022) - [j20]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j19]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [j18]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-Party Library Detection Tools. IEEE Trans. Software Eng. 48(11): 4249-4273 (2022) - [j17]Yutian Tang, Hao Zhou, Xiapu Luo, Ting Chen, Haoyu Wang, Zhou Xu, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. IEEE Trans. Software Eng. 48(11): 4501-4520 (2022) - [c80]Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. CCS 2022: 3239-3252 - [c79]Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, Xusheng Xiao:
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. ICSE 2022: 685-697 - [c78]Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao:
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning. ICSE 2022: 1755-1767 - [c77]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson:
Challenges in decentralized name management: the case of ENS. IMC 2022: 65-82 - [c76]Xiao Cheng, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. ISSTA 2022: 519-531 - [c75]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. ISSTA 2022: 703-715 - [c74]Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. ASE 2022: 10:1-10:12 - [c73]Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. ASE 2022: 69:1-69:13 - [c72]Zikan Dong, Liu Wang, Hao Xie, Guoai Xu, Haoyu Wang:
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era. ASE 2022: 203:1-203:6 - [c71]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. MOBILESoft 2022: 62-72 - [c70]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c69]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. SIGMETRICS (Abstracts) 2022: 21-22 - [c68]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. SIGMETRICS (Abstracts) 2022: 23-24 - [c67]Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. ESEC/SIGSOFT FSE 2022: 1430-1440 - [c66]Liu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang, Shangguang Wang, Xuanzhe Liu:
Demystifying "removed reviews" in iOS app store. ESEC/SIGSOFT FSE 2022: 1489-1499 - [c65]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - [i38]Yan Lin, Tianming Liu, Wei Liu, Zhigaoyuan Wang, Li Li, Guoai Xu, Haoyu Wang:
Dataset Bias in Android Malware Detection. CoRR abs/2205.15532 (2022) - [i37]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i36]Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin, Xuanzhe Liu:
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing. CoRR abs/2207.08175 (2022) - [i35]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - 2021
- [j16]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j15]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [j14]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 39:1-39:26 (2021) - [j13]Kailong Wang, Yuxi Ling, Yanjun Zhang, Zhou Yu, Haoyu Wang, Guangdong Bai, Beng Chin Ooi, Jin Song Dong:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. Proc. ACM Meas. Anal. Comput. Syst. 6(3): 43:1-43:31 (2021) - [j12]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. IEEE Trans. Dependable Secur. Comput. 18(3): 1033-1050 (2021) - [j11]Xiao Cheng, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Trans. Softw. Eng. Methodol. 30(3): 38:1-38:33 (2021) - [j10]Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021) - [c64]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards A First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. SBC@AsiaCCS 2021: 23-28 - [c63]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c62]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories. COMPSAC 2021: 914-923 - [c61]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. ICSE 2021: 263-274 - [c60]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. ICSE 2021: 674-685 - [c59]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c58]Haoyu Wang, John Chen, Majid Laali, Kevin Durda, Jeff King, William Campbell, Yang Liu:
Leveraging ASR N-Best in Deep Entity Retrieval. Interspeech 2021: 261-265 - [c57]Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c56]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. MOBILESoft@ICSE 2021: 12-23 - [c55]Siming Su, Haoyu Wang, Guoai Xu:
Towards Understanding iOS App Store Search Advertising: An Explorative Study. MOBILESoft@ICSE 2021: 40-51 - [c54]Jiayi Hua, Haoyu Wang:
On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection. MSR 2021: 530-534 - [c53]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang:
Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study. SEKE 2021: 249-254 - [c52]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. SIGMETRICS (Abstracts) 2021: 33-34 - [c51]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c50]Jiayi Hua, Yuanchun Li, Haoyu Wang:
MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps. SP (Workshops) 2021: 71-77 - [c49]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c48]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [c47]Fuqi Lin, Haoyu Wang, Liu Wang, Xuanzhe Liu:
A Longitudinal Study of Removed Apps in iOS App Store. WWW 2021: 1435-1446 - [c46]Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Guoai Xu, Xuanzhe Liu:
Demystifying Illegal Mobile Gambling Apps. WWW 2021: 1447-1458 - [i34]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. CoRR abs/2101.04930 (2021) - [i33]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. CoRR abs/2101.06896 (2021) - [i32]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. CoRR abs/2102.06528 (2021) - [i31]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - [i30]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i29]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu:
Ethereum Name Service: the Good, the Bad, and the Ugly. CoRR abs/2104.05185 (2021) - [i28]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-party Library Detection Tools. CoRR abs/2108.01964 (2021) - [i27]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Demystifying Scam Tokens on Uniswap Decentralized Exchange. CoRR abs/2109.00229 (2021) - [i26]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - 2020
- [j9]Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. Comput. Secur. 98: 101993 (2020) - [j8]Yulei Sui, Xiao Cheng, Guanqin Zhang, Haoyu Wang:
Flow2Vec: value-flow-based precise code embedding. Proc. ACM Program. Lang. 4(OOPSLA): 233:1-233:27 (2020) - [j7]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - [j6]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 50:1-50:28 (2020) - [c45]Maria K. Wolters, Shuobing Li, Haoyu Wang, Xinyu Yang, Yao Guo:
Does the Presence of Privacy Relevant Information Affect App Market Choice? CHI Extended Abstracts 2020: 1-7 - [c44]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c43]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c42]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [c41]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c40]Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li, Tegawendé F. Bissyandé:
KnowledgeZooClient: constructing knowledge graph for Android. ASE Workshops 2020: 73-78 - [c39]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level analysis of government-backed COVID-19 contact tracing apps. ASE Workshops 2020: 79-84 - [c38]Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [c37]Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c36]Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c35]Xu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang:
Dissecting Mobile Offerwall Advertisements: An Explorative Study. QRS 2020: 518-526 - [c34]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - [c33]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
A comprehensive study on challenges in deploying deep learning based software. ESEC/SIGSOFT FSE 2020: 750-762 - [c32]Yutian Tang, Yulei Sui, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. ESEC/SIGSOFT FSE 2020: 914-926 - [c31]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [c30]Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo, Lei Wu, Guoai Xu:
Mobile App Squatting. WWW 2020: 1727-1738 - [i25]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - [i24]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i23]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i22]Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, Guoai Xu:
Characterizing Cryptocurrency Exchange Scams. CoRR abs/2003.07314 (2020) - [i21]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study. CoRR abs/2005.00760 (2020) - [i20]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i19]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020) - [i18]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i17]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020) - [i16]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. CoRR abs/2010.12218 (2020) - [i15]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i14]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i13]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. CoRR abs/2011.02673 (2020) - [i12]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. CoRR abs/2011.04654 (2020) - [i11]Jinfeng Wen, Yi Liu, Zhenpeng Chen, Yun Ma, Haoyu Wang, Xuanzhe Liu:
Understanding Characteristics of Commodity Serverless Computing Platforms. CoRR abs/2012.00992 (2020) - [i10]Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. CoRR abs/2012.01032 (2020) - [i9]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. CoRR abs/2012.10866 (2020) - [i8]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j5]Guoai Xu, Chengpeng Zhang, Bowen Sun, Xinyu Yang, Yanhui Guo, Chengze Li, Haoyu Wang:
AppAuth: Authorship Attribution for Android App Clones. IEEE Access 7: 141850-141867 (2019) - [j4]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
On Identifying and Explaining Similarities in Android Apps. J. Comput. Sci. Technol. 34(2): 437-455 (2019) - [j3]Li Li, Timothée Riom, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein, Yves Le Traon:
Revisiting the impact of common libraries for android-related investigations. J. Syst. Softw. 154: 157-175 (2019) - [c29]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c28]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c27]Xiao Cheng, Haoyu Wang, Jiayi Hua, Miao Zhang, Guoai Xu, Li Yi, Yulei Sui:
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding. ICECCS 2019: 41-50 - [c26]Haoyu Wang, Xupu Wang, Yao Guo:
Characterizing the global mobile app developers: a large-scale empirical study. MOBILESoft@ICSE 2019: 150-161 - [c25]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Guoai Xu:
Deobfuscating Android native binary code. ICSE (Companion Volume) 2019: 322-323 - [c24]Quanqi Ye, Yan Zhang, Guangdong Bai, Naipeng Dong, Zhenkai Liang, Jin Song Dong, Haoyu Wang:
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking. ISC 2019: 299-318 - [c23]Tianming Liu, Haoyu Wang, Li Li, Guangdong Bai, Yao Guo, Guoai Xu:
DaPanda: Detecting Aggressive Push Notifications in Android Apps. ASE 2019: 66-78 - [c22]Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo:
Characterizing Android App Signing Issues. ASE 2019: 280-292 - [c21]Haoyu Wang, Junjun Si, Hao Li, Yao Guo:
RmvDroid: towards a reliable Android malware dataset with app metadata. MSR 2019: 404-408 - [c20]Qian Guo, Haoyu Wang, Chenwei Zhang, Yao Guo, Guoai Xu:
AppNet: understanding app recommendation in Google Play. WAMA@ESEC/SIGSOFT FSE 2019: 19-25 - [c19]Yangyu Hu, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Ren He:
Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps. SANER 2019: 332-343 - [c18]Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. SANER 2019: 599-603 - [c17]Haoyu Wang, Hao Li, Yao Guo:
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play. WWW 2019: 1988-1999 - [i7]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. CoRR abs/1905.00272 (2019) - [i6]Lijin Quan, Lei Wu, Haoyu Wang:
EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level. CoRR abs/1906.10362 (2019) - [i5]Zeliang Kan, Haoyu Wang, Lei Wu, Yao Guo, Daniel Xiapu Luo:
Automated Deobfuscation of Android Native Binary Code. CoRR abs/1907.06828 (2019) - [i4]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [c16]Zeliang Kan, Haoyu Wang, Guoai Xu, Yao Guo, Xiangqun Chen:
Towards Light-Weight Deep Learning Based Malware Detection. COMPSAC (1) 2018: 600-609 - [c15]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. Internet Measurement Conference 2018: 293-307 - [c14]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein:
CiD: automating the detection of API-related compatibility issues in Android apps. ISSTA 2018: 153-163 - [c13]Haoyu Wang, Hao Li, Li Li, Yao Guo, Guoai Xu:
Why are Android apps removed from Google Play?: a large-scale empirical study. MSR 2018: 231-242 - [c12]Chengpeng Zhang, Haoyu Wang, Ran Wang, Yao Guo, Guoai Xu:
Re-checking App Behavior against App Description in the Context of Third-party Libraries. SEKE 2018: 665-664 - [c11]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Tegawendé F. Bissyandé, Tianming Liu, Guoai Xu, Jacques Klein:
FraudDroid: automated ad fraud detection for Android apps. ESEC/SIGSOFT FSE 2018: 257-268 - [c10]Feng Dong, Haoyu Wang, Li Li, Yao Guo, Guoai Xu, Shaodong Zhang:
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries? HotMobile 2018: 75-80 - [i3]Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. CoRR abs/1807.04901 (2018) - [i2]Haoyu Wang, Zhe Liu, Jingyue Liang, Narseo Vallina-Rodriguez, Yao Guo, Li Li, Juan Tapiador, Jingcun Cao, Guoai Xu:
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. CoRR abs/1810.07780 (2018) - 2017
- [j2]Chengze Li, Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu, Yanhui Guo:
CRSPR: PageRank for Android Apps. IEEE Access 5: 18004-18015 (2017) - [j1]Haoyu Wang, Yuanchun Li, Yao Guo, Yuvraj Agarwal, Jason I. Hong:
Understanding the Purpose of Permission Use in Mobile Apps. ACM Trans. Inf. Syst. 35(4): 43:1-43:40 (2017) - [c9]Haoyu Wang, Yao Guo:
Understanding third-party libraries in mobile app analysis. ICSE (Companion Volume) 2017: 515-516 - [c8]Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, Jason I. Hong:
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective. WWW 2017: 163-172 - [i1]Feng Dong, Haoyu Wang, Yuanchun Li, Yao Guo, Li Li, Shaodong Zhang, Guoai Xu:
FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection. CoRR abs/1709.01213 (2017) - 2016
- [c7]Ziang Ma, Haoyu Wang, Yao Guo, Xiangqun Chen:
LibRadar: fast and accurate detection of third-party libraries in Android apps. ICSE (Companion Volume) 2016: 653-656 - [c6]Minxing Liu, Haoyu Wang, Yao Guo, Jason I. Hong:
Identifying and Analyzing the Privacy of Apps for Kids. HotMobile 2016: 105-110 - 2015
- [c5]Haoyu Wang, Yao Guo, Zihao Tang, Guangdong Bai, Xiangqun Chen:
Reevaluating Android Permission Gaps with Static and Dynamic Analysis. GLOBECOM 2015: 1-6 - [c4]Haoyu Wang, Jason I. Hong, Yao Guo:
Using text mining to infer the purpose of permission use in mobile apps. UbiComp 2015: 1107-1118 - [c3]Haoyu Wang, Yao Guo, Ziang Ma, Xiangqun Chen:
WuKong: a scalable and accurate two-phase approach to Android app clone detection. ISSTA 2015: 71-82 - 2014
- [c2]Haoyu Wang, Mengxin Liu, Yao Guo, Xiangqun Chen:
Similarity-based web browser optimization. WWW 2014: 575-584 - 2013
- [c1]Haoyu Wang, Junjun Kong, Yao Guo, Xiangqun Chen:
Mobile Web Browser Optimizations in the Cloud Era: A Survey. SOSE 2013: 527-536
Coauthor Index
aka: Daniel Xiapu Luo
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint