发表论文
(1) SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning, NDSS, 2024, 其他(合作组作者)(2) GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (CCF-A), 2023, 第 5 作者(3) Aliasing Backdoor Attacks on Pre-trained Models, USENIX Security (CCF-A类), 2023, 第 4 作者(4) ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning, International Conference on Software Engineering (ICSE, CCF-A), 2023, 第 4 作者(5) Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing, CCS (CCF-A类), 2023, 第 3 作者(6) Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities, USENIX Security 2023 (CCF-A类), 2023, 通讯作者(7) TransRepair: Context-aware Program Repair for Compilation Errors, IEEE/ACM International Conference on Automated Software Engineering (ASE, CCF-A), 2022, 通讯作者(8) Learning Program Semantics with Code Representations: An Empirical Study, IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER, CCF-B), 2022, 第 4 作者(9) MalRadar: Demystifying Android Malware in the New Era, International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2022, 第 5 作者(10) Towards Security Threats of Deep Learning Systems: A Survey, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (CCF-A), 2022, 通讯作者(11) Understanding Real-world Threats to Deep Learning Models in Android Apps, CCS (CCF-A), 2022, 通讯作者(12) SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization, PROCEEDINGS OF THE 30TH THE WEB CONFERENCE (WWW, CCF-A), 2021, 通讯作者(13) DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks, The 30th USENIX Security Symposium (CCF-A), 2021, 通讯作者(14) Have You been Properly Notified? Automatic Compliance Analysis of Privacy Policy Text with GDPR Article 13, 30th The Web Conference (WWW, CCF-A), 2021, 第 4 作者(15) VALL-NUT: Principled Anti-Greybox-Fuzzing, The 32nd International Symposium on Software Reliability Engineering (ISSRE, CCF-B), 2021, 通讯作者(16) A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS, CCF-A), 2021, 第 4 作者(17) A(3)IDENT: A Two-phased Approach to Identify the Leading Authors of Android Apps, 2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME, CCF-B), 2020, 第 2 作者(18) Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods, IEEE TRANSACTIONS ON RELIABILITY, 2020, 第 4 作者(19) An Empirical Assessment of Security Risks of Global Android Banking Apps, The 42th International Conference on Software Engineering (ICSE, CCF-A), 2020, 第 3 作者(20) A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned, 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE, CCF-A), 2020, 通讯作者(21) RoLMA: A Practical Adversarial Attack against Deep Learning-based LPR Systems, The 15th International Conference on Information Security and Cryptology, 2019, 第 2 作者(22) Characterizing Android App Signing Issues, 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE, CCF-A), 2019, 第 4 作者(23) Securing android applications via edge assistant third-party library detection, COMPUTERS & SECURITY (C&S, CCF-B), 2019, 第 3 作者(24) Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS, CCF-A), 2019, 第 1 作者(25) MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform, 2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS, CCF-C), 2019, 第 5 作者(26) From UI Design Image to GUI Skeleton: A Neural Machine Translator to Bootstrap Mobile GUI Implementation, PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE, CCF-A), 2018, 通讯作者(27) Are Mobile Banking Apps Secure? What Can Be Improved?, ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, 第 4 作者(28) Large-Scale Analysis of Framework-Specific Exceptions in Android Apps, PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE, CCF-A), 2018, 第 4 作者(29) Efficiently Manifesting Asynchronous Programming Errors in Android Apps, PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE, CCF-A), 2018, 第 4 作者(30) DroidEcho:an in-depth dissection of malicious behaviors in Android applications, DroidEcho:an in-depth dissection of malicious behaviors in Android applications, CYBERSECURITY, 2018, 通讯作者(31) Mining Implicit Design Templates for Actionable Code Reuse, PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE, CCF-A), 2017, 第 2 作者(32) Battery-Aware Mobile Data Service, IEEE TRANSACTIONS ON MOBILE COMPUTING (TMC, CCF-A), 2017, 第 2 作者(33) Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS, CCF-A), 2017, 通讯作者(34) Guided, Stochastic Model-Based GUI Testing of Android Apps, PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE, CCF-A), 2017, 第 2 作者(35) Mystique: Evolving Android Malware for Auditing Anti-Malware Tools, ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, 通讯作者(36) Semantic Modelling of Android Malware for Effective Malware Comprehension, Detection, and Classification, The International Symposium on Software Testing and Analysis (ISSTA, CCF-A), 2016, 第 1 作者(37) Collaborative Security: A Survey and Taxonomy, ACM COMPUTING SURVEYS, 2015, 第 1 作者(38) AuthScan: Automatic Extraction of Web Authentication Protocols from Implementations, 20th Annual Network and Distributed System Security Symposium (NDSS, CCF-B), 2013, 第 3 作者(39) Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection, 第 2 作者