Follow
Hui Xue
Title
Cited by
Cited by
Year
Framework for computer application analysis of sensitive information tracking
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,159,035, 2015
2322015
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 9,176,843, 2015
2282015
Digging for Data Structures.
A Cozzie, F Stratton, H Xue, ST King
OSDI 8, 255-266, 2008
1922008
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
OA Ismael, D Song, H Xue
US Patent 9,367,681, 2016
1872016
Framework for efficient security coverage of mobile software applications using machine learning
OA Ismael, D Song, PT Ha, PJ Gilbert, H Xue
US Patent 9,594,905, 2017
1592017
Framework for efficient security coverage of mobile software applications
OA Ismael, D Song, A Aziz, N Johnson, P Mohan, H Xue
US Patent 10,296,437, 2019
1462019
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th USENIX Security Symposium (USENIX Security 15), 945-959, 2015
1232015
Verifying security invariants in ExpressOS
H Mai, E Pek, H Xue, ST King, P Madhusudan
Proceedings of the eighteenth international conference on Architectural …, 2013
722013
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
632015
Using replicated execution for a more secure and reliable web browser
H Xue, N Dautenhahn, ST King
Proc. of the 19th Network and Distributed System Security Symposium (NDSS’12), 2012
232012
Enpublic apps: Security threats using ios enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
202015
Operation and security considerations of federated learning platform based on compute first network
L Zhao, X Tang, Z You, Y Pang, H Xue, L Zhu
2020 IEEE/CIC International Conference on Communications in China (ICCC …, 2020
132020
Accurate and efficient exploit capture and classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China. Information Sciences 60 (5), 052110, 2017
122017
Sidewinder Targeted Attack against Android in The Golden Age of Ad Libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
122014
User interface for displaying network analytics
PG Murray, S Shan, Z Wu, Y Xie, H Xue, F Yu
US Patent App. 15/459,664, 2017
112017
Using redundancy to improve security and testing
H Xue
University of Illinois at Urbana-Champaign, 2013
102013
Apple without a shell–iOS under targeted attack
T Wei, M Zheng, H Xue, D Song
Virus Bulletin Conference, 2014
62014
A method for information protection in collaborative assembly design
H Xue, J Li
Ninth International Conference on Computer Aided Design and Computer …, 2005
62005
Masque Attack: All Your iOS Apps Belong to Us
H Xue, T Wei, Y Zhang
FireEye Blog, 2014
52014
Monitoring Vulnaggressive Apps on Google Play
Y Zhang, H Xue, T Wei, D Song
FireEye Blog, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20