Follow
xian zhan(展鹇)
Title
Cited by
Cited by
Year
Atvhunter: Reliable version detection of third-party libraries for vulnerability identification in android applications
X Zhan, L Fan, S Chen, F We, T Liu, X Luo, Y Liu
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
792021
Automated third-party library detection for android applications: Are we there yet?
X Zhan, L Fan, T Liu, S Chen, L Li, H Wang, Y Xu, X Luo, Y Liu
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
572020
Towards detecting target link flooding attack
L Xue, X Luo, EWW Chan, X Zhan
28th Large Installation System Administration Conference (LISA14), 90-105, 2014
572014
Research on third-party libraries in android apps: A taxonomy and systematic literature review
X Zhan, T Liu, L Fan, L Li, S Chen, X Luo, Y Liu
IEEE Transactions on Software Engineering 48 (10), 4181-4213, 2021
432021
Structural attack against graph based android malware detection
K Zhao, H Zhou, Y Zhu, X Zhan, K Zhou, J Li, L Yu, W Yuan, X Luo
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
402021
Accessible or not? an empirical investigation of Android app accessibility
S Chen, C Chen, L Fan, M Fan, X Zhan, Y Liu
IEEE Transactions on Software Engineering 48 (10), 3954-3968, 2021
392021
Where2Change: Change request localization for app reviews
T Zhang, J Chen, X Zhan, X Luo, D Lo, H Jiang
IEEE Transactions on Software Engineering 47 (11), 2590-2616, 2019
272019
{FOAP}:{Fine-Grained}{Open-World} android app fingerprinting
J Li, H Zhou, S Wu, X Luo, T Wang, X Zhan, X Ma
31st USENIX Security Symposium (USENIX Security 22), 1579-1596, 2022
202022
A systematical study on application performance management libraries for apps
Y Tang, H Wang, X Zhan, X Luo, Y Zhou, H Zhou, Q Yan, Y Sui, J Keung
IEEE Transactions on Software Engineering 48 (8), 3044-3065, 2021
18*2021
A comparative study of android repackaged apps detection techniques
X Zhan, T Zhang, Y Tang
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
152019
Research on android malware detection and interception based on behavior monitoring
G Peng, Y Shao, T Wang, X Zhan, H Zhang
Wuhan University Journal of Natural Sciences 17 (5), 421-427, 2012
142012
Demystifying application performance management libraries for android
Y Tang, X Zhan, H Zhou, X Luo, Z Xu, Y Zhou, Q Yan
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
102019
Aper: evolution-aware runtime permission misuse detection for Android apps
S Wang, Y Wang, X Zhan, Y Wang, Y Liu, X Luo, SC Cheung
Proceedings of the 44th International Conference on Software Engineering …, 2022
82022
Demystifying privacy policy of third-party libraries in mobile apps
K Zhao, X Zhan, L Yu, S Zhou, H Zhou, X Luo, H Wang, Y Liu
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
62023
Automata-guided control-flow-sensitive fuzz driver generation
C Zhang, Y Li, H Zhou, X Zhang, Y Zheng, X Zhan, X Xie, X Luo, X Li, ...
Proceedings of the 32nd USENIX Conference on Security Symposium, 2867-2884, 2023
12023
What You See Is What You Get? It Is Not the Case! Detecting Misleading Icons for Mobile Applications
L Li, R Wang, X Zhan, Y Wang, C Gao, S Wang, Y Liu
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
12023
PPT4J: Patch Presence Test for Java Binaries
Z Pan, X Hu, X Xia, X Zhan, D Lo, X Yang
arXiv preprint arXiv:2312.11013, 2023
2023
Effective Anomaly Detection for Microservice Systems with Real-Time Feature Selection
S Zhou, X Zhan, L Li, Y Liu
2023 30th Asia-Pacific Software Engineering Conference (APSEC), 101-110, 2023
2023
Research on Third-Party Libraries in Android Apps: A Taxonomy and Comprehensive Survey
X Zhan, T Liu, L Fan, S Chen, X Luo, Y Liu
IEEE Transactions on Software Engineering 48 (10), 4181-4213, 2022
2022
Automatic Maturity Rating for Android Apps
C Zhou, X Zhan, L Li, Y Liu
Proceedings of the 13th Asia-Pacific Symposium on Internetware, 16-27, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20