Hui Xu
Hui Xu
Computer Science, Fudan University
Потвърден имейл адрес: fudan.edu.cn - Начална страница
Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
H Xu, Y Zhou, MR Lyu
10th Symposium On Usable Privacy and Security (SOUPS), 187-198, 2014
Ar-tracker: Track the dynamics of mobile apps via user review mining
C Gao, H Xu, J Hu, Y Zhou
2015 IEEE Symposium on Service-Oriented System Engineering, 284-290, 2015
DiagDroid: Android performance diagnosis via anatomizing asynchronous executions
Y Kang, Y Zhou, H Xu, MR Lyu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
On Secure and Usable Program Obfuscation: A Survey
H Xu, Y Zhou, Y Kang, MR Lyu
https://arxiv.org/pdf/1710.01139.pdf, 2017
Deep Validation: Toward Detecting Real-world Corner Cases for Deep Neural Networks
W Wu, H Xu, S Zhong, MR Lyu, I King
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
Towards Intelligent Incident Management: Why We Need It and HowWe Make It
Z Chen, Y Kang, L Li, X Zhang, H Zhang, H Xu, Y Zhou, L Yang, J Sun, ...
Proceedings of the 28th ACM Joint European Software Engineer-ing Conference …, 2020
Memory-safety challenge considered solved? An in-depth study with all Rust CVEs
H Xu, Z Chen, M Sun, Y Zhou, MR Lyu
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-25, 2021
Manufacturing resilient bi-opaque predicates against symbolic execution
H Xu, Y Zhou, Y Kang, F Tu, M Lyu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Benchmarking the capability of symbolic execution tools with logic bombs
H Xu, Z Zhao, Y Zhou, MR Lyu
IEEE Transactions on Dependable and Secure Computing 17 (6), 1243-1256, 2018
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
H Xu, Y Zhou, J Ming, M Lyu
Cybersecurity 3, 1-18, 2020
NV-DNN: Towards Fault-Tolerant DNN Systems with N-Version Programming
H Xu, Z Chen, W Wu, Z Jin, S Kuo, MR Lyu
the 2nd Workshop on Dependable and Secure Machine Learning, 2019
Deepobfuscation: Securing the structure of convolutional neural networks via knowledge distillation
H Xu, Y Su, Z Zhao, Y Zhou, MR Lyu, I King
arXiv preprint arXiv:1806.10313, 2018
SpyAware: Investigating the privacy leakage signatures in app execution traces
H Xu, Y Zhou, C Gao, Y Kang, MR Lyu
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
Concolic execution on small-size binaries: Challenges and empirical study
H Xu, Y Zhou, Y Kang, MR Lyu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
N-version obfuscation
H Xu, Y Zhou, M Lyu
Proceedings of the 2Nd ACM International Workshop on Cyber-Physical System …, 2016
RULF: Rust library fuzzing via API dependency graph traversal
J Jiang, H Xu, Y Zhou
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
SafeDrop: Detecting memory deallocation bugs of rust programs via static data-flow analysis
M Cui, C Chen, H Xu, Y Zhou
ACM Transactions on Software Engineering and Methodology, 2022
IntelliAd: Assisting mobile app developers in measuring Ad costs automatically
C Gao, Y Man, H Xu, J Zhu, Y Zhou, MR Lyu
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
Textout: Detecting Text-layout Bugs in Mobile Apps via Visualization-oriented Learning
Y Wang, H Xu, Y Zhou, MR Lyu, X Wang
the 30th IEEE International Symposium on Software Reliability Engineering …, 2019
Assessing the security properties of software obfuscation
H Xu, MR Lyu
IEEE Security & Privacy 14 (5), 80-83, 2016
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20