Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach S Chen, M Xue, L Fan, S Hao, LX Xu, H Zhu, L Bo Proceeding of the Elsevier Computers & Security, 2017 | 231 | 2017 |
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems G Chen, S Chen, L Fan, X Du, Z Zhao, F Song, Y Liu The IEEE Security and Privacy (Oakland'2021), 2021 | 205 | 2021 |
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu, Z Su 40th International Conference on Software Engineering (ICSE'2018), 408-419, 2018 | 111 | 2018 |
StoryDroid: Automated Generation of Storyboard for Android Apps S Chen, L Fan, C Chen, T Su, W Li, Y Liu, L Xu 41st International Conference on Software Engineering (ICSE'2019), 2019 | 102 | 2019 |
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications X Zhan, L Fan, S Chen, F Wu, T Liu, X Luo, Y Liu Proceedings of the 43rd International Conference on Software Engineering (ICSE), 2021 | 80 | 2021 |
An empirical assessment of security risks of global android banking apps S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu 42nd International Conference on Software Engineering (ICSE'2020), 2018 | 76 | 2018 |
Are Mobile Banking Apps Secure? What Can be Improved? S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu In Proceedings of the 26th ACM Joint European Software Engineering …, 2018 | 73 | 2018 |
Efficiently Manifesting Asynchronous Programming Errors in Android Apps L Fan, T Su, S Chen, G Meng, Y Liu, L Xu, G Pu 33rd International Conference on Automated Software Engineering (ASE'18 …, 2018 | 67 | 2018 |
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem C Liu, S Chen, L Fan, B Chen, Y Liu, X Peng International Conference on Software Engineering (ICSE'2022), 2022 | 66 | 2022 |
Why an android app is classified as malware: Toward malware classification interpretation B Wu, S Chen, C Gao, L Fan, Y Liu, W Wen, MR Lyu ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-29, 2021 | 59 | 2021 |
Automated Third-party Library Detection for Android Applications: Are We There Yet? X Zhan, L Fan, T Liu, S Chen, L Li, H Wang, Y Xu, X Luo, Y Liu 35th International Conference on Automated Software Engineering (ASE'20), 2020 | 59 | 2020 |
CORE: Automating Review Recommendation for Code Changes JK Siow, C Gao, L Fan, S Chen, Y Liu 27th edition of the IEEE International Conference on Software Analysis …, 2020 | 53 | 2020 |
Why My App Crashes Understanding and Benchmarking Framework-specific Exceptions of Android apps T Su, L Fan, S Chen, Y Liu, L Xu, G Pu, Z Su IEEE Transactions on Software Engineering (TSE), 2020 | 52 | 2020 |
GUI-Squatting Attack: Automated Generation of Android Phishing Apps S Chen, L Fan, C Chen, M Xue, Y Liu, L Xu IEEE Transactions on Dependable and Secure Computing (TDSC), 2019 | 51 | 2019 |
Advanced evasion attacks and mitigations on practical ML‐based phishing website classifiers F Song, Y Lei, S Chen, L Fan, Y Liu International Journal of Intelligent Systems 36 (9), 5210-5240, 2021 | 49 | 2021 |
Research on third-party libraries in android apps: A taxonomy and systematic literature review X Zhan, T Liu, L Fan, L Li, S Chen, X Luo, Y Liu IEEE Transactions on Software Engineering 48 (10), 4181-4213, 2021 | 43 | 2021 |
Accessible or Not? An Empirical Investigation of Android App Accessibility S Chen, C Chen, L Fan, M Fan, X Zhan, Y Liu IEEE Transactions on Software Engineering, 2021 | 39 | 2021 |
Automated cross-platform GUI code generation for mobile apps S Chen, L Fan, T Su, L Ma, Y Liu, L Xu 2019 IEEE 1st International Workshop on Artificial Intelligence for Mobile …, 2019 | 39 | 2019 |
A Large-scale Empirical Study on Industrial Fake Apps C Tang, S Chen, L Fan, L Xu, Y Liu, Z Tang, L Dou 41st ACM/IEEE International Conference on Software Engineering (ICSE'2019), 2019 | 39 | 2019 |
Towards understanding and mitigating audio adversarial examples for speaker recognition G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang IEEE Transactions on Dependable and Secure Computing 20 (5), 3970-3987, 2022 | 29 | 2022 |