default search action
Sen Chen 0001
Person information
- affiliation: Tianjin University, College of Intelligence and Computing, Tianjin, China
Other persons with the same name
- Sen Chen — disambiguation page
- Sen Chen 0002 — Tongji University, Computer Integrated Manufacturing System Research Center, Shanghai, China
- Sen Chen 0003 — Shaanxi Normal University, School of Mathematics and Statistics, Xi'an, China
- Sen Chen 0004 — Tsinghua University, Department of Biomedical Engineering, Beijing, China
- Sen Chen 0005 — Guizhou Medical University, School of Biology and Engineering, Guiyang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? Proc. ACM Softw. Eng. 1(FSE): 1447-1470 (2024) - [j17]Fangyuan Zhang, Lingling Fan, Sen Chen, Miaoying Cai, Sihan Xu, Lida Zhao:
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries. IEEE Trans. Software Eng. 50(11): 2906-2920 (2024) - [c43]Kaixuan Li, Jian Zhang, Sen Chen, Han Liu, Yang Liu, Yixiang Chen:
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software. ISSTA 2024: 590-602 - [c42]Jiongchi Yu, Xiaofei Xie, Cen Zhang, Sen Chen, Yuekang Li, Wenbo Shen:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. ISSTA 2024: 1364-1376 - [c41]Ruitao Feng, Sen Li, Sen Chen, Mengmeng Ge, Xuewei Li, Xiaohong Li:
Unmasking the Lurking: Malicious Behavior Detection for IoT Malware with Multi-label Classification. LCTES 2024: 95-106 - [i40]Han Liu, Jian Zhang, Cen Zhang, Xiaohan Zhang, Kaixuan Li, Sen Chen, Shang-Wei Lin, Yixiang Chen, Xinhua Li, Yang Liu:
FineWAVE: Fine-Grained Warning Verification of Bugs for Automated Static Analysis Tools. CoRR abs/2403.16032 (2024) - [i39]Kaixuan Li, Yue Xue, Sen Chen, Han Liu, Kairan Sun, Ming Hu, Haijun Wang, Yang Liu, Yixiang Chen:
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? CoRR abs/2404.18186 (2024) - [i38]Kaixuan Li, Jian Zhang, Sen Chen, Han Liu, Yang Liu, Yixiang Chen:
PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software. CoRR abs/2407.17065 (2024) - [i37]Fangyuan Zhang, Lingling Fan, Sen Chen, Miaoying Cai, Sihan Xu, Lida Zhao:
Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries. CoRR abs/2409.02753 (2024) - [i36]Qijing Qiao, Ruitao Feng, Sen Chen, Fei Zhang, Xiaohong Li:
Multi-label Classification for Android Malware Based on Active Learning. CoRR abs/2410.06444 (2024) - [i35]Jingyun Zhu, Kaixuan Li, Sen Chen, Lingling Fan, Junjie Wang, Xiaofei Xie:
A Comprehensive Study on Static Application Security Testing (SAST) Tools for Android. CoRR abs/2410.20740 (2024) - [i34]Qiang Hu, Xiaofei Xie, Sen Chen, Lei Ma:
Large Language Model Supply Chain: Open Problems From the Security Perspective. CoRR abs/2411.01604 (2024) - 2023
- [j16]Yude Bai, Sen Chen, Zhenchang Xing, Xiaohong Li:
ArgusDroid: detecting Android malware variants by mining permission-API knowledge graph. Sci. China Inf. Sci. 66(9) (2023) - [j15]Pu Sun, Sen Chen, Lingling Fan, Pengfei Gao, Fu Song, Min Yang:
VenomAttack: automated and adaptive activity hijacking in Android. Frontiers Comput. Sci. 17(1): 171801 (2023) - [j14]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. IEEE Trans. Dependable Secur. Comput. 20(5): 3970-3987 (2023) - [j13]Sen Chen, Lingling Fan, Chunyang Chen, Yang Liu:
Automatically Distilling Storyboard With Rich Features for Android Apps. IEEE Trans. Software Eng. 49(2): 667-683 (2023) - [j12]Yao Zhang, Xiaofei Xie, Yi Li, Yun Lin, Sen Chen, Yang Liu, Xiaohong Li:
Demystifying Performance Regressions in String Solvers. IEEE Trans. Software Eng. 49(3): 947-961 (2023) - [c40]Yuxin Zhang, Sen Chen, Lingling Fan:
A Web-Based Tool for Using Storyboard of Android Apps. ICSE Companion 2023: 117-121 - [c39]Sen Yang, Sen Chen, Lingling Fan, Sihan Xu, Zhanwei Hui, Song Huang:
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis. ICSE 2023: 257-269 - [c38]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Lida Zhao, Jiahui Wu, Yang Liu:
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. ICSE 2023: 2540-2552 - [c37]Han Liu, Sen Chen, Ruitao Feng, Chengwei Liu, Kaixuan Li, Zhengzi Xu, Liming Nie, Yang Liu, Yixiang Chen:
A Comprehensive Study on Quality Assurance Tools for Java. ISSTA 2023: 285-297 - [c36]Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu:
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. ASE 2023: 191-203 - [c35]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. ASE 2023: 686-697 - [c34]Xiangyu Zhang, Lingling Fan, Sen Chen, Yucheng Su, Boyuan Li:
Scene-Driven Exploration and GUI Modeling for Android Apps. ASE 2023: 1251-1262 - [c33]Kaixuan Li, Sen Chen, Lingling Fan, Ruitao Feng, Han Liu, Chengwei Liu, Yang Liu, Yixiang Chen:
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java. ESEC/SIGSOFT FSE 2023: 921-933 - [c32]Lida Zhao, Sen Chen, Zhengzi Xu, Chengwei Liu, Lyuye Zhang, Jiahui Wu, Jun Sun, Yang Liu:
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects. ESEC/SIGSOFT FSE 2023: 960-972 - [c31]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. ESEC/SIGSOFT FSE 2023: 1255-1267 - [i33]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Lida Zhao, Jiahui Wu, Yang Liu:
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. CoRR abs/2301.08434 (2023) - [i32]Han Liu, Sen Chen, Ruitao Feng, Chengwei Liu, Kaixuan Li, Zhengzi Xu, Liming Nie, Yang Liu, Yixiang Chen:
A Comprehensive Study on Quality Assurance Tools for Java. CoRR abs/2305.16812 (2023) - [i31]Lyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan, Lida Zhao, Yiran Zhang, Yang Liu:
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. CoRR abs/2308.03419 (2023) - [i30]Weijie Shao, Yuyang Gao, Fu Song, Sen Chen, Lingling Fan:
An Empirical Study of Bugs in Open-Source Federated Learning Framework. CoRR abs/2308.05014 (2023) - [i29]Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. CoRR abs/2308.09029 (2023) - [i28]Xiangyu Zhang, Lingling Fan, Sen Chen, Yucheng Su, Boyuan Li:
Scene-Driven Exploration and GUI Modeling for Android Apps. CoRR abs/2308.10228 (2023) - [i27]Yao Zhang, Xiaofei Xie, Yi Li, Sen Chen, Cen Zhang, Xiaohong Li:
EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software. CoRR abs/2312.03335 (2023) - 2022
- [j11]Di Cui, Lingling Fan, Sen Chen, Yuanfang Cai, Qinghua Zheng, Yang Liu, Ting Liu:
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects. Sci. China Inf. Sci. 65(7): 1-19 (2022) - [j10]Hao Guo, Sen Chen, Zhenchang Xing, Xiaohong Li, Yude Bai, Jiamou Sun:
Detecting and Augmenting Missing Key Aspects in Vulnerability Descriptions. ACM Trans. Softw. Eng. Methodol. 31(3): 49:1-49:27 (2022) - [j9]Ting Su, Lingling Fan, Sen Chen, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps. IEEE Trans. Software Eng. 48(4): 1115-1137 (2022) - [j8]Shangqing Liu, Cuiyun Gao, Sen Chen, Lun Yiu Nie, Yang Liu:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. IEEE Trans. Software Eng. 48(5): 1800-1817 (2022) - [j7]Sen Chen, Chunyang Chen, Lingling Fan, Mingming Fan, Xian Zhan, Yang Liu:
Accessible or Not? An Empirical Investigation of Android App Accessibility. IEEE Trans. Software Eng. 48(10): 3954-3968 (2022) - [j6]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review. IEEE Trans. Software Eng. 48(10): 4181-4213 (2022) - [c30]Guoqing Yan, Sen Chen, Yude Bai, Xiaohong Li:
Can Deep Learning Models Learn the Vulnerable Patterns for Vulnerability Detection? COMPSAC 2022: 904-913 - [c29]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. ICSE 2022: 672-684 - [c28]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. ASE 2022: 51:1-51:12 - [c27]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. ASE 2022: 105:1-105:13 - [c26]Sen Chen, Yuxin Zhang, Lingling Fan, Jiaming Li, Yang Liu:
AUSERA: Automated Security Vulnerability Detection for Android Apps. ASE 2022: 154:1-154:5 - [c25]Xiuhan Shi, Xiaofei Xie, Yi Li, Yao Zhang, Sen Chen, Xiaohong Li:
Large-scale analysis of non-termination bugs in real-world OSS projects. ESEC/SIGSOFT FSE 2022: 256-268 - [i26]Chengwei Liu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu, Xin Peng:
Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem. CoRR abs/2201.03981 (2022) - [i25]Sen Chen, Lingling Fan, Chunyang Chen, Yang Liu:
Automatically Distilling Storyboard with Rich Features for Android Apps. CoRR abs/2203.06420 (2022) - [i24]Sen Chen, Chunyang Chen, Lingling Fan, Mingming Fan, Xian Zhan, Yang Liu:
Accessible or Not? An Empirical Investigation of Android App Accessibility. CoRR abs/2203.06422 (2022) - [i23]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu:
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems. CoRR abs/2206.03351 (2022) - [i22]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang:
Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition. CoRR abs/2206.03393 (2022) - [i21]Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. CoRR abs/2209.00393 (2022) - [i20]Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. CoRR abs/2209.04791 (2022) - 2021
- [j5]Fu Song, Yusi Lei, Sen Chen, Lingling Fan, Yang Liu:
Advanced evasion attacks and mitigations on practical ML-based phishing website classifiers. Int. J. Intell. Syst. 36(9): 5210-5240 (2021) - [j4]Sen Chen, Lingling Fan, Chunyang Chen, Minhui Xue, Yang Liu, Lihua Xu:
GUI-Squatting Attack: Automated Generation of Android Phishing Apps. IEEE Trans. Dependable Secur. Comput. 18(6): 2551-2568 (2021) - [j3]Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu:
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 16: 1563-1578 (2021) - [j2]Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael R. Lyu:
Why an Android App Is Classified as Malware: Toward Malware Classification Interpretation. ACM Trans. Softw. Eng. Methodol. 30(2): 21:1-21:29 (2021) - [c24]Yuxuan Li, Ruitao Feng, Sen Chen, Qianyu Guo, Lingling Fan, Xiaohong Li:
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps. APSEC 2021: 202-212 - [c23]Liu Yuan, Yude Bai, Zhenchang Xing, Sen Chen, Xiaohong Li, Zhidong Deng:
Predicting Entity Relations across Different Security Databases by Using Graph Attention Network. COMPSAC 2021: 834-843 - [c22]Hao Guo, Zhenchang Xing, Sen Chen, Xiaohong Li, Yude Bai, Hu Zhang:
Key Aspects Augmentation of Vulnerability Description based on Multiple Security Databases. COMPSAC 2021: 1020-1025 - [c21]Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu:
ATVHUNTER: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. ICSE 2021: 1695-1707 - [c20]Sen Chen, Lingling Fan, Cuiyun Gao, Fu Song, Yang Liu:
Peeking into the Gray Area of Mobile World: An Empirical Study of Unlabeled Android Apps. ISSRE 2021: 579-590 - [c19]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. SP 2021: 694-711 - [c18]Yingwen Lin, Yao Zhang, Sen Chen, Fu Song, Xiaofei Xie, Xiaohong Li, Lintan Sun:
Inferring Loop Invariants for Multi-Path Loops. TASE 2021: 63-70 - [i19]Xian Zhan, Lingling Fan, Sen Chen, Feng Wu, Tianming Liu, Xiapu Luo, Yang Liu:
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Applications. CoRR abs/2102.08172 (2021) - [i18]Xian Zhan, Tianming Liu, Lingling Fan, Li Li, Sen Chen, Xiapu Luo, Yang Liu:
Research on Third-Party Libraries in AndroidApps: A Taxonomy and Systematic LiteratureReview. CoRR abs/2108.03787 (2021) - [i17]Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu:
SEC4SR: A Security Analysis Platform for Speaker Recognition. CoRR abs/2109.01766 (2021) - 2020
- [c17]Ruitao Feng, Jing Qiang Lim, Sen Chen, Shang-Wei Lin, Yang Liu:
SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile Devices. ICECCS 2020: 63-72 - [c16]Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu:
An empirical assessment of security risks of global Android banking apps. ICSE 2020: 1310-1322 - [c15]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. ISSRE 2020: 253-264 - [c14]Xian Zhan, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c13]Zhushou Tang, Ke Tang, Minhui Xue, Yuan Tian, Sen Chen, Muhammad Ikram, Tielei Wang, Haojin Zhu:
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications. USENIX Security Symposium 2020: 2415-2432 - [c12]Jing Kai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu:
CORE: Automating Review Recommendation for Code Changes. SANER 2020: 284-295 - [i16]Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu:
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers. CoRR abs/2004.06954 (2020) - [i15]Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael R. Lyu:
Why an Android App is Classified as Malware? Towards Malware Classification Interpretation. CoRR abs/2004.11516 (2020) - [i14]Ruitao Feng, Sen Chen, Xiaofei Xie, Guozhu Meng, Shang-Wei Lin, Yang Liu:
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices. CoRR abs/2005.04970 (2020) - [i13]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. CoRR abs/2008.05864 (2020) - [i12]Ruitao Feng, Jing Qiang Lim, Sen Chen, Shang-Wei Lin, Yang Liu:
SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices. CoRR abs/2011.05218 (2020)
2010 – 2019
- 2019
- [c11]Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, Shang-Wei Lin:
MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform. ICECCS 2019: 61-70 - [c10]Chongbin Tang, Sen Chen, Lingling Fan, Lihua Xu, Yang Liu, Zhushou Tang, Liang Dou:
A large-scale empirical study on industrial fake apps. ICSE (SEIP) 2019: 183-192 - [c9]Sen Chen, Lingling Fan, Chunyang Chen, Ting Su, Wenhe Li, Yang Liu, Lihua Xu:
StoryDroid: automated generation of storyboard for Android apps. ICSE 2019: 596-607 - [c8]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. ASE 2019: 810-822 - [i11]Sen Chen, Lingling Fan, Chunyang Chen, Ting Su, Wenhe Li, Yang Liu, Lihua Xu:
StoryDroid: Automated Generation of Storyboard for Android Apps. CoRR abs/1902.00476 (2019) - [i10]Chongbin Tang, Sen Chen, Lingling Fan, Lihua Xu, Yang Liu, Zhushou Tang, Liang Dou:
A Large-Scale Empirical Study on Industrial Fake Apps. CoRR abs/1902.00647 (2019) - [i9]Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li:
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms. CoRR abs/1909.06727 (2019) - [i8]Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu:
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems. CoRR abs/1911.01840 (2019) - [i7]Shangqing Liu, Cuiyun Gao, Sen Chen, Lun Yiu Nie, Yang Liu:
ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking. CoRR abs/1912.02972 (2019) - [i6]Jing Kai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu:
CORE: Automating Review Recommendation for Code Changes. CoRR abs/1912.09652 (2019) - 2018
- [j1]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. Comput. Secur. 73: 326-344 (2018) - [c7]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Large-scale analysis of framework-specific exceptions in Android apps. ICSE 2018: 408-419 - [c6]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently manifesting asynchronous programming errors in Android apps. ASE 2018: 486-497 - [c5]Sen Chen, Ting Su, Lingling Fan, Guozhu Meng, Minhui Xue, Yang Liu, Lihua Xu:
Are mobile banking apps secure? what can be improved? ESEC/SIGSOFT FSE 2018: 797-802 - [i5]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu, Zhendong Su:
Large-Scale Analysis of Framework-Specific Exceptions in Android Apps. CoRR abs/1801.07009 (2018) - [i4]Sen Chen, Guozhu Meng, Ting Su, Lingling Fan, Yinxing Xue, Yang Liu, Lihua Xu, Minhui Xue, Bo Li, Shuang Hao:
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps. CoRR abs/1805.05236 (2018) - [i3]Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu:
Efficiently Manifesting Asynchronous Programming Errors in Android Apps. CoRR abs/1808.03178 (2018) - [i2]Lei Ma, Felix Juefei-Xu, Minhui Xue, Qiang Hu, Sen Chen, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See:
Secure Deep Learning Engineering: A Software Quality Assurance Perspective. CoRR abs/1810.04538 (2018) - 2017
- [i1]Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu:
Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach. CoRR abs/1706.04146 (2017) - 2016
- [c4]Lingling Fan, Sen Chen, Lihua Xu, Zongyuan Yang, Huibiao Zhu:
Model-Based Continuous Verification. APSEC 2016: 81-88 - [c3]Sen Chen, Minhui Xue, Zhushou Tang, Lihua Xu, Haojin Zhu:
StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. AsiaCCS 2016: 377-388 - [c2]Lingling Fan, Minhui Xue, Sen Chen, Lihua Xu, Haojin Zhu:
POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning. CCS 2016: 1748-1750 - [c1]Sen Chen, Minhui Xue, Lihua Xu:
Towards adversarial detection of mobile malware: poster. MobiCom 2016: 415-416
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint