Skip to main content Start main content

Journals Papers of RIAIoT

RIAIOT
Author(s) Paper Titles Paper Details (Journal name, publication year, volume, issue numbers, pages/paper number)
B. Gao, H. Wang, P. Xia, S. Wu, Y. Zhou, X. Luo, and G. Tyson Tracking Counterfeit Cryptocurrency End-to-end Proc. of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), Beijing, China, June 2021.
L. Xue, H. Zhou, X. Luo, Y. Zhou, Y. Shi, G. Gu, F. Zhang, and M. Au Happer: Unpacking Android Apps via a Hardware-Assisted Approach Proc. of the 42nd IEEE Symposium on Security and Privacy (S&P), May 2021.
X. Zhan, L. Fan, S. Chen, F. Wu, T. Liu, X. Luo, and Y. Liu ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021
Z. Wan, X. Xia, D. Lo, J. Chen, X. Luo, and X. Yang Smart Contract Security: a Practitioners' Perspective Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021.
Y. Hu, H. Wang, T. Ji, X. Xiao, X. Luo, P. Gao, and Y. Guo CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies Proc. of the 43rd International Conference on Software Engineering (ICSE), May 2021.
X. Ma, M. Shi, B. An, J. Li, X. Luo, J. Zhang, and X. Guan Context-aware Website Fingerprinting over Encrypted Proxies Proc. of IEEE International Conference on Computer Communications (INFOCOM), May 2021.
K. Zhao, H. Zhou, Y. Zhu, K. Zhou, X. Zhan, J. Li, L. Yu, W. Yuan, and X. Luo Structural Attack against Graph Based Android Malware Detection Proc. of the 28th ACM Conference on Computer and Communications Security (CCS), Seoul, Korea, November 2021.
H. Zhou, H. Wang, S. Wu, X. Luo, Y. Zhou, T. Chen, and T. Wang Finding the Missing Piece: Permission Specification Analysis for Android NDK Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021.
Q. Liu, C. Zhang, L. Ma, M. Jiang, Y. Zhou, L. Wu, W. Shen, X. Luo, Y. Liu, and K. Ren Firm Guide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution Proc. of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), Melbourne, Australia, November 2021.
P. Jing, Q. Tang, Y. Du, L. Xue, X. Luo, T. Wang, S. Nie, and S. Wu Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations Proc. of the 30th USENIX Security Symposium (USENIX SEC), Vancouver, Canada, August 2021.

Your browser is not the latest version. If you continue to browse our website, Some pages may not function properly.

You are recommended to upgrade to a newer version or switch to a different browser. A list of the web browsers that we support can be found here