Search Results - "Meng, Guozhu"

Refine Results
  1. 1

    Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets by Guozhu Meng, Patrick, Matthew, Yinxing Xue, Yang Liu, Jie Zhang

    “…The Android ecosystem has recently dominated mobile devices. Android app markets, including official Google Play and other third party markets, are becoming…”
    Get full text
    Journal Article
  2. 2

    Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique by Xue, Yinxing, Meng, Guozhu, Liu, Yang, Tan, Tian Huat, Chen, Hongxu, Sun, Jun, Zhang, Jie

    “…Although a previous paper shows that existing anti-malware tools (AMTs) may have high detection rate, the report is based on existing malware and thus it does…”
    Get full text
    Journal Article
  3. 3

    Revealing the exploitability of heap overflow through PoC analysis by Shen, Qintao, Meng, Guozhu, Chen, Kai

    Published in Cybersecurity (Singapore) (01-12-2024)
    “…The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications. Prior studies have focused on…”
    Get full text
    Journal Article
  4. 4

    SkillSim: voice apps similarity detection by Guo, Zhixiu, Liang, Ruigang, Meng, Guozhu, Chen, Kai

    Published in Cybersecurity (Singapore) (01-12-2023)
    “…Virtual personal assistants (VPAs), such as Amazon Alexa and Google Assistant, are software agents designed to perform tasks or provide services to individuals…”
    Get full text
    Journal Article
  5. 5

    Are our clone detectors good enough? An empirical study of code effects by obfuscation by Huang, Weihao, Meng, Guozhu, Lin, Chaoyang, Yan, Qiucun, Chen, Kai, Ma, Zhuo

    Published in Cybersecurity (Singapore) (01-12-2023)
    “…Clone detection has received much attention in many fields such as malicious code detection, vulnerability hunting, and code copyright infringement detection…”
    Get full text
    Journal Article
  6. 6

    The inconsistency of documentation: a study of online C standard library documents by Li, Ruishi, Yang, Yunfei, Liu, Jinghua, Hu, Peiwei, Meng, Guozhu

    Published in Cybersecurity (Singapore) (02-07-2022)
    “…The C standard libraries are basic function libraries standardized by the C language. Programmers usually refer to their API documentation provided by…”
    Get full text
    Journal Article
  7. 7

    DroidEcho: an in-depth dissection of malicious behaviors in Android applications by Meng, Guozhu, Feng, Ruitao, Bai, Guangdong, Chen, Kai, Liu, Yang

    Published in Cybersecurity (Singapore) (05-06-2018)
    “…A precise representation for attacks can benefit the detection of malware in both accuracy and efficiency. However, it is still far from expectation to…”
    Get full text
    Journal Article
  8. 8

    Towards Security Threats of Deep Learning Systems: A Survey by He, Yingzhe, Meng, Guozhu, Chen, Kai, Hu, Xingbo, He, Jinwen

    Published in IEEE transactions on software engineering (01-05-2022)
    “…Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent…”
    Get full text
    Journal Article
  9. 9

    From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation by Chen, Chunyang, Su, Ting, Meng, Guozhu, Xing, Zhenchang, Liu, Yang

    “…A GUI skeleton is the starting point for implementing a UI design image. To obtain a GUI skeleton from a UI design image, developers have to visually…”
    Get full text
    Conference Proceeding
  10. 10

    GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search by Liu, Shangqing, Xie, Xiaofei, Siow, Jingkai, Ma, Lei, Meng, Guozhu, Liu, Yang

    Published in IEEE transactions on software engineering (01-04-2023)
    “…Code search aims to retrieve accurate code snippets based on a natural language query to improve software productivity and quality. With the massive amount of…”
    Get full text
    Journal Article
  11. 11

    A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices by Feng, Ruitao, Chen, Sen, Xie, Xiaofei, Meng, Guozhu, Lin, Shang-Wei, Liu, Yang

    “…Currently, Android malware detection is mostly performed on server side against the increasing number of malware. Powerful computing resource provides more…”
    Get full text
    Journal Article
  12. 12

    Contextual Weisfeiler-Lehman graph kernel for malware detection by Narayanan, Annamalai, Guozhu Meng, Liu Yang, Jinliang Liu, Lihui Chen

    “…In this paper, we propose a novel graph kernel specifically to address a challenging problem in the field of cyber-security, namely, malware detection…”
    Get full text
    Conference Proceeding
  13. 13

    Large-Scale Empirical Studies on Effort-Aware Security Vulnerability Prediction Methods by Chen, Xiang, Zhao, Yingquan, Cui, Zhanqi, Meng, Guozhu, Liu, Yang, Wang, Zan

    Published in IEEE transactions on reliability (01-03-2020)
    “…Security vulnerability prediction (SVP) can identify potential vulnerable modules in advance and then help developers to allocate most of the test resources to…”
    Get full text
    Journal Article
  14. 14

    An Empirical Assessment of Security Risks of Global Android Banking Apps by Chen, Sen, Fan, Lingling, Meng, Guozhu, Su, Ting, Xue, Minhui, Xue, Yinxing, Liu, Yang, Xu, Lihua

    “…Mobile banking apps, belonging to the most security-critical app category, render massive and dynamic transactions susceptible to security risks. Given huge…”
    Get full text
    Conference Proceeding
  15. 15

    Mining implicit design templates for actionable code reuse by Yun Lin, Guozhu Meng, Yinxing Xue, Zhenchang Xing, Jun Sun, Xin Peng, Yang Liu, Wenyun Zhao, Jinsong Dong

    “…In this paper, we propose an approach to detecting project-specific recurring designs in code base and abstracting them into design templates as reuse…”
    Get full text
    Conference Proceeding
  16. 16

    ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning by Liu, Shangqing, Wu, Bozhi, Xie, Xiaofei, Meng, Guozhu, Liu, Yang

    “…Large-scale pre-trained models such as CodeBERT, GraphCodeBERT have earned widespread attention from both academia and industry. Attributed to the superior…”
    Get full text
    Conference Proceeding
  17. 17

    Large-scale analysis of framework-specific exceptions in Android apps by Fan, Lingling, Su, Ting, Chen, Sen, Meng, Guozhu, Liu, Yang, Xu, Lihua, Pu, Geguang, Su, Zhendong

    “…Mobile apps have become ubiquitous. For app developers, it is a key priority to ensure their apps' correctness and reliability. However, many apps still suffer…”
    Get full text
    Conference Proceeding
  18. 18

    Battery state-of-health estimation for mobile devices by He, Liang, Kim, Eugene, Shin, Kang G., Meng, Guozhu, He, Tian

    “…Insufficient support of electric current sensing on commodity mobile devices leads to inaccurate estimation of their battery's state-of-health (SoH), which, in…”
    Get full text
    Conference Proceeding
  19. 19

    Efficiently Manifesting Asynchronous Programming Errors in Android Apps by Fan, Lingling, Sus, Ting, Chen, Sen, Meng, Guozhu, Liu, Yang, Xu, Lihua, Pu, Geguang

    “…Android, the #1 mobile app framework, enforces the single-GUI-thread model, in which a single UI thread manages GUI rendering and event dispatching. Due to…”
    Get full text
    Conference Proceeding
  20. 20

    Characterizing Android App Signing Issues by Wang, Haoyu, Liu, Hongxuan, Xiao, Xusheng, Meng, Guozhu, Guo, Yao

    “…In the app releasing process, Android requires all apps to be digitally signed with a certificate before distribution. Android uses this certificate to…”
    Get full text
    Conference Proceeding