Xusheng Xiao
Case Western Reserve University
H-index: 27
North America-United States
Top articles of Xusheng Xiao
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools | Feng Dong Shaofei Li Peng Jiang Ding Li Haoyu Wang | 2023/11/15 | |
Prompt Learning Unlocked for App Promotion in the Wild | Zhongyu Ouyang Shifu Hou Shang Ma Chaoran Chen Chunhui Zhang | 2023/12/21 | |
On the Security Risks of Knowledge Graph Reasoning | Zhaohan Xi Tianyu Du Changjiang Li Ren Pang Shouling Ji | 2023/5/3 | |
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation | arXiv preprint arXiv:2311.02331 | Shaofei Li Feng Dong Xusheng Xiao Haoyu Wang Fei Shao | 2023/11/4 |
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System | Feng Dong Liu Wang Xu Nie Fei Shao Haoyu Wang | 2023 | |
Wemint: Tainting Sensitive Data Leaks in WeChat Mini-Programs | Shi Meng Liu Wang Shenao Wang Kailong Wang Xusheng Xiao | 2023/9/11 | |
iSyn: Semi-automated smart contract synthesis from legal financial agreements | Pengcheng Fang Zhenhua Zou Xusheng Xiao Zhuotao Liu | 2023/7/12 | |
LegoDroid: flexible Android app decomposition and instant installation | Science China Information Sciences | Yi Liu Yun Ma Xusheng Xiao Tao Xie Xuanzhe Liu | 2023/4 |
Lie to me: Abusing the mobile content sharing service for fun and profit | Guosheng Xu Siyi Li Hao Zhou Shucen Liu Yutian Tang | 2022/4/25 | |
FAIRification, Quality Assessment, and Missingness Pattern Discovery for Spatiotemporal Photovoltaic Data | William C Oltjen Yangxin Fan Jiqi Liu Liangyi Huang Xuanji Yu | 2022/6/5 | |
Back-Propagating System Dependency Impact for Attack Investigation | Pengcheng Fang Peng Gao Changlin Liu Erman Ayday Kangkook Jee | 2022 | |
Towards automatically localizing function errors in mobile apps with user reviews | IEEE Transactions on Software Engineering | Le Yu Haoyu Wang Xiapu Luo Tao Zhang Kang Liu | 2022/5/26 |
Depcomm: Graph summarization on system audit logs for attack investigation | Zhiqiang Xu Pengcheng Fang Changlin Liu Xusheng Xiao Yu Wen | 2022/5/22 | |
What did you pack in my app? a systematic analysis of commercial Android packers | Zikan Dong Hongxuan Liu Liu Wang Xiapu Luo Yao Guo | 2022/11/7 | |
Describectx: context-aware description synthesis for sensitive behaviors in mobile apps | Shao Yang Yuehan Wang Yuan Yao Haoyu Wang Yanfang Ye | 2022/5/21 | |
System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems | Liangyi Huang Sophia Hall Fei Shao Arafath Nihar Vipin Chaudhary | 2022/10/17 | |
ProMal: precise window transition graphs for android via synergy of program analysis and machine learning | Changlin Liu Hanlin Wang Tianming Liu Diandian Gu Yun Ma | 2022/5/21 | |
Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange | ACM SIGMETRICS Performance Evaluation Review | Pengcheng Xia Haoyu Wang Bingyu Gao Weihang Su Zhou Yu | 2022/6/6 |
System and method for detecting security risks in a computer system | 2021/2/2 | ||
WebEvo: taming web application evolution via semantic structure change detection | Fei Shao | 2021/5/25 |