关注
Fenghao Xu
Fenghao Xu
在 ie.cuhk.edu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Understanding android obfuscation techniques: A large-scale investigation in the wild
S Dong, M Li, W Diao, X Liu, J Liu, Z Li, F Xu, K Chen, X Wang, K Zhang
Security and Privacy in Communication Networks: 14th International …, 2018
1502018
Badbluetooth: Breaking android security mechanisms via malicious bluetooth peripherals.
F Xu, W Diao, Z Li, J Chen, K Zhang
NDSS, 2019
542019
Kindness is a Risky Business: On the Usage of the Accessibility {APIs} in Android
W Diao, Y Zhang, L Zhang, Z Li, F Xu, X Pan, X Liu, J Weng, K Zhang, ...
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
252019
Android on pc: On the security of end-user android emulators
F Xu, S Shen, W Diao, Z Li, Y Chen, R Li, K Zhang
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
52021
Identifying the BLE Misconfigurations of IoT Devices through Companion Mobile Apps
J Du, F Xu, C Zhang, Z Zhang, X Liu, P Ren, W Diao, S Guo, K Zhang
2022 19th Annual IEEE International Conference on Sensing, Communication …, 2022
12022
Authorisation inconsistency in IoT thirdparty integration
J Chen, F Xu, S Dong, W Sun, K Zhang
IET Information Security 16 (2), 133-143, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–6