Libradar: Fast and accurate detection of third-party libraries in android apps Z Ma, H Wang, Y Guo, X Chen Proceedings of the 38th international conference on software engineering …, 2016 | 278 | 2016 |
Wukong: A scalable and accurate two-phase approach to android app clone detection H Wang, Y Guo, Z Ma, X Chen Proceedings of the 2015 international symposium on software testing and …, 2015 | 249 | 2015 |
Large Language Models for Software Engineering: A Systematic Literature Review X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li, X Luo, D Lo, J Grundy, ... https://arxiv.org/abs/2308.10620, 112011, 2023 | 182* | 2023 |
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network X Cheng, H Wang, J Hua, G Xu, Y Sui ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021 | 176 | 2021 |
Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets H Wang, Z Liu, J Liang, N Vallina-Rodriguez, Y Guo, L Li, J Tapiador, ... Proceedings of the 2018 Internet Measurement Conference (IMC), 2018 | 155 | 2018 |
Cid: Automating the detection of api-related compatibility issues in android apps L Li, TF Bissyandé, H Wang, J Klein Proceedings of the 27th ACM SIGSOFT International Symposium on Software …, 2018 | 144 | 2018 |
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, YC Hu The 26th ACM Conference on Computer and Communications Security (ACM CCS 2019), 2019 | 128 | 2019 |
Jailbreaker: Automated jailbreak across multiple large language model chatbots G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu arXiv preprint arXiv:2307.08715, 2023 | 122 | 2023 |
Towards a first step to understand flash loan and its applications in defi ecosystem D Wang, S Wu, Z Lin, L Wu, X Yuan, Y Zhou, H Wang, K Ren Proceedings of the Ninth International Workshop on Security in Blockchain …, 2021 | 118* | 2021 |
Prompt Injection attack against LLM-integrated Applications Y Liu, G Deng, Y Li, K Wang, T Zhang, Y Liu, H Wang, Y Zheng, Y Liu arXiv preprint arXiv:2306.05499, 2023 | 115 | 2023 |
A comprehensive study on challenges in deploying deep learning based software Z Chen, Y Cao, Y Liu, H Wang, T Xie, X Liu Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 109 | 2020 |
Characterizing cryptocurrency exchange scams P Xia, H Wang, B Zhang, R Ji, B Gao, L Wu, X Luo, G Xu Computers & Security 98, 101993, 2020 | 100 | 2020 |
FraudDroid: Automated Ad Fraud Detection for Android Apps F Dong, H Wang, L Li, Y Guo, TF Bissyande, T Liu, G Xu, J Klein ESEC/FSE 2018, 2018 | 100 | 2018 |
Flow2vec: Value-flow-based precise code embedding Y Sui, X Cheng, G Zhang, H Wang Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020 | 96 | 2020 |
Understanding (Mis) Behavior on the EOSIO Blockchain Y HUANG, H WANG, LEI WU, G TYSON, X LUO, RUN ZHANG, X LIU, ... ACM SIGMETRICS 2020, 2020 | 93* | 2020 |
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem N He, L Wu, H Wang, Y Guo, X Jiang The 24th International Conference on Financial Cryptography and Data …, 2020 | 88 | 2020 |
Make web3. 0 connected Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, Q Li, YC Hu IEEE transactions on dependable and secure computing 19 (5), 2965-2981, 2021 | 81 | 2021 |
Using text mining to infer the purpose of permission use in mobile apps H Wang, J Hong, Y Guo Proceedings of the 2015 ACM international joint conference on pervasive and …, 2015 | 78 | 2015 |
RmvDroid: Towards A Reliable Android Malware Dataset with App Metadata H Wang, J Si, H Li, Y Guo The 16th International Conference on Mining Software Repositories (MSR 2019), 2019 | 77 | 2019 |
Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play H Wang, H Li, Y Guo THE WEB CONFERENCE 2019 (WWW 2019), 2019 | 77 | 2019 |