Hui Xu
Hui Xu
Computer Science, Fudan University
在 的电子邮件经过验证 - 首页
Towards continuous and passive authentication via touch biometrics: An experimental study on smartphones
H Xu, Y Zhou, MR Lyu
10th Symposium On Usable Privacy and Security (SOUPS), 187-198, 2014
Ar-tracker: Track the dynamics of mobile apps via user review mining
C Gao, H Xu, J Hu, Y Zhou
2015 IEEE Symposium on Service-Oriented System Engineering, 284-290, 2015
DiagDroid: Android performance diagnosis via anatomizing asynchronous executions
Y Kang, Y Zhou, H Xu, MR Lyu
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
On Secure and Usable Program Obfuscation: A Survey
H Xu, Y Zhou, Y Kang, MR Lyu, 2017
Deep Validation: Toward Detecting Real-world Corner Cases for Deep Neural Networks
W Wu, H Xu, S Zhong, MR Lyu, I King
Proceedings of the 49th IEEE/IFIP International Conference on Dependable …, 2019
Manufacturing resilient bi-opaque predicates against symbolic execution
H Xu, Y Zhou, Y Kang, F Tu, M Lyu
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
SpyAware: Investigating the privacy leakage signatures in app execution traces
H Xu, Y Zhou, C Gao, Y Kang, MR Lyu
2015 IEEE 26th International Symposium on Software Reliability Engineering …, 2015
Benchmarking the capability of symbolic execution tools with logic bombs
H Xu, Z Zhao, Y Zhou, MR Lyu
IEEE Transactions on Dependable and Secure Computing 17 (6), 1243-1256, 2018
NV-DNN: Towards Fault-Tolerant DNN Systems with N-Version Programming
H Xu, Z Chen, W Wu, Z Jin, S Kuo, MR Lyu
the 2nd Workshop on Dependable and Secure Machine Learning, 2019
Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs
H Xu, Z Chen, M Sun, Y Zhou, MR Lyu
ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-25, 2021
Concolic execution on small-size binaries: Challenges and empirical study
H Xu, Y Zhou, Y Kang, MR Lyu
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
N-version obfuscation
H Xu, Y Zhou, M Lyu
Proceedings of the 2Nd ACM International Workshop on Cyber-Physical System …, 2016
Deepobfuscation: Securing the structure of convolutional neural networks via knowledge distillation
H Xu, Y Su, Z Zhao, Y Zhou, MR Lyu, I King
arXiv preprint arXiv:1806.10313, 2018
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
H Xu, Y Zhou, J Ming, M Lyu
Cybersecurity 3, 1-18, 2020
Towards Intelligent Incident Management: Why We Need It and HowWe Make It
Z Chen, Y Kang, L Li, X Zhang, H Zhang, H Xu, Y Zhou, L Yang, J Sun, ...
Proceedings of the 28th ACM Joint European Software Engineer-ing Conference …, 2020
IntelliAd: assisting mobile app developers in measuring ad costs automatically
C Gao, Y Man, H Xu, J Zhu, Y Zhou, MR Lyu
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
Textout: Detecting Text-layout Bugs in Mobile Apps via Visualization-oriented Learning
Y Wang, H Xu, Y Zhou, MR Lyu, X Wang
the 30th IEEE International Symposium on Software Reliability Engineering …, 2019
Assessing the security properties of software obfuscation
H Xu, MR Lyu
IEEE Security & Privacy 14 (5), 80-83, 2016
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-Flow Analysis
M Cui, C Chen, H Xu, Y Zhou
arXiv preprint arXiv:2103.15420, 2021
Boosting symbolic execution via constraint solving time prediction (experience paper)
S Luo, H Xu, Y Bi, X Wang, Y Zhou
Proceedings of the 30th ACM SIGSOFT International Symposium on Software …, 2021
文章 1–20