


Остановите войну!
for scientists:


default search action
Haoyu Wang 0001
Person information

- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
- affiliation (PhD 2016): Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China
Other persons with the same name
- Haoyu Wang (aka: Hao-Yu Wang) — disambiguation page
- Haoyu Wang 0002
— Amazon Alexa, Cambridge, MA, USA (and 1 more)
- Haoyu Wang 0003
— University of Virginia, Charlottesville, VA, USA
- Haoyu Wang 0004 — Purdue University, West Lafayette, IN, USA
- Haoyu Wang 0005 — University of Pennsylvania, PA, USA (and 1 more)
- Haoyu Wang 0006 — University of Ilinois at Chicago, IL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j24]Xuanzhe Liu
, Jinfeng Wen
, Zhenpeng Chen
, Ding Li
, Junkai Chen
, Yi Liu
, Haoyu Wang
, Xin Jin
:
FaaSLight: General Application-level Cold-start Latency Optimization for Function-as-a-Service in Serverless Computing. ACM Trans. Softw. Eng. Methodol. 32(5): 119:1-119:29 (2023) - [j23]Yanjie Zhao
, Li Li
, Haoyu Wang, Qiang He
, John C. Grundy
:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023) - [j22]Le Yu
, Haoyu Wang, Xiapu Luo
, Tao Zhang
, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang
, Xusheng Xiao
:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [c83]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. ICSE 2023: 1583-1595 - [c82]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-Specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. ISSTA 2023: 385-397 - [c81]Kailong Wang
, Yuxi Ling
, Yanjun Zhang
, Zhou Yu
, Haoyu Wang
, Guangdong Bai
, Beng Chin Ooi
, Jin Song Dong
:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. SIGMETRICS (Abstracts) 2023: 91-92 - [c80]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023 - [c79]Yanjie Zhao
, Tianming Liu
, Haoyu Wang
, Yepang Liu
, John C. Grundy
, Li Li
:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141 - [i46]Yixuan Zhang, Shangtong Cao, Haoyu Wang, Zhenpeng Chen, Xiapu Luo, Dongliang Mu, Yun Ma, Gang Huang, Xuanzhe Liu:
Characterizing and Detecting WebAssembly Runtime Bugs. CoRR abs/2301.12102 (2023) - [i45]Kaifa Zhao, Xian Zhan, Le Yu, Shiyao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang, Yepang Liu:
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps. CoRR abs/2301.12348 (2023) - [i44]Ningyu He, Zhehao Zhao, Jikai Wang, Yubin Hu, Shengjian Guo, Haoyu Wang, Guangtai Liang, Ding Li, Xiangqun Chen, Yao Guo:
Eunomia: Enabling User-specified Fine-Grained Search in Symbolically Executing WebAssembly Binaries. CoRR abs/2304.07204 (2023) - [i43]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
A General Static Binary Rewriting Framework for WebAssembly. CoRR abs/2305.01454 (2023) - [i42]Jintao Huang, Ningyu He, Kai Ma, Jiang Xiao, Haoyu Wang:
A Deep Dive into NFT Rug Pulls. CoRR abs/2305.06108 (2023) - [i41]Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang, Xiapu Luo:
Abusing the Ethereum Smart Contract Verification Services for Fun and Profit. CoRR abs/2307.00549 (2023) - [i40]Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. CoRR abs/2308.03123 (2023) - [i39]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - 2022
- [j21]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. Proc. ACM Meas. Anal. Comput. Syst. 6(2): 40:1-40:27 (2022) - [j20]Zhuotao Liu
, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao
, Bihan Wen
, Qi Li
, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [j19]Yutian Tang
, Haoyu Wang, Xian Zhan
, Xiapu Luo
, Yajin Zhou
, Hao Zhou, Qiben Yan
, Yulei Sui, Jacky Keung
:
A Systematical Study on Application Performance Management Libraries for Apps. IEEE Trans. Software Eng. 48(8): 3044-3065 (2022) - [j18]Xian Zhan
, Tianming Liu
, Yepang Liu
, Yang Liu
, Li Li
, Haoyu Wang, Xiapu Luo
:
A Systematic Assessment on Android Third-Party Library Detection Tools. IEEE Trans. Software Eng. 48(11): 4249-4273 (2022) - [j17]Yutian Tang
, Hao Zhou, Xiapu Luo
, Ting Chen
, Haoyu Wang, Zhou Xu
, Yan Cai:
XDebloat: Towards Automated Feature-Oriented App Debloating. IEEE Trans. Software Eng. 48(11): 4501-4520 (2022) - [c78]Hao Zhou, Xiapu Luo, Haoyu Wang, Haipeng Cai:
Uncovering Intent based Leak of Sensitive Data in Android Framework. CCS 2022: 3239-3252 - [c77]Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, Xusheng Xiao
:
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. ICSE 2022: 685-697 - [c76]Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao
:
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning. ICSE 2022: 1755-1767 - [c75]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu, Gareth Tyson:
Challenges in decentralized name management: the case of ENS. IMC 2022: 65-82 - [c74]Xiao Cheng
, Guanqin Zhang, Haoyu Wang, Yulei Sui:
Path-sensitive code embedding via contrastive learning for software vulnerability detection. ISSTA 2022: 519-531 - [c73]Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, Lei Wu:
WASAI: uncovering vulnerabilities in Wasm smart contracts. ISSTA 2022: 703-715 - [c72]Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. ASE 2022: 10:1-10:12 - [c71]Liu Wang, Haoyu Wang, Xiapu Luo
, Yulei Sui
:
MalWhiteout: Reducing Label Errors in Android Malware Detection. ASE 2022: 69:1-69:13 - [c70]Zikan Dong, Liu Wang, Hao Xie, Guoai Xu, Haoyu Wang:
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era. ASE 2022: 203:1-203:6 - [c69]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. MOBILESoft 2022: 62-72 - [c68]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c67]Liu Wang, Haoyu Wang, Ren He, Ran Tao, Guozhu Meng, Xiapu Luo, Xuanzhe Liu:
MalRadar: Demystifying Android Malware in the New Era. SIGMETRICS (Abstracts) 2022: 21-22 - [c66]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao
, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. SIGMETRICS (Abstracts) 2022: 23-24 - [c65]Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo
, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. ESEC/SIGSOFT FSE 2022: 1430-1440 - [c64]Liu Wang, Haoyu Wang, Xiapu Luo, Tao Zhang
, Shangguang Wang, Xuanzhe Liu:
Demystifying "removed reviews" in iOS app store. ESEC/SIGSOFT FSE 2022: 1489-1499 - [c63]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao
, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - [i38]Yan Lin, Tianming Liu, Wei Liu, Zhigaoyuan Wang, Li Li, Guoai Xu, Haoyu Wang:
Dataset Bias in Android Malware Detection. CoRR abs/2205.15532 (2022) - [i37]Jingyi Guo, Min Zheng, Yajin Zhou, Haoyu Wang, Lei Wu, Xiapu Luo, Kui Ren:
iLibScope: Reliable Third-Party Library Detection for iOS Mobile Apps. CoRR abs/2207.01837 (2022) - [i36]Jinfeng Wen, Zhenpeng Chen, Ding Li, Junkai Chen, Yi Liu, Haoyu Wang, Xin Jin, Xuanzhe Liu:
LambdaLite: Application-Level Optimization for Cold Start Latency in Serverless Computing. CoRR abs/2207.08175 (2022) - [i35]Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo
, Xiangqun Chen:
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation. CoRR abs/2207.09227 (2022) - 2021
- [j16]Liu Wang, Ren He, Haoyu Wang, Pengcheng Xia, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yulei Sui, Yao Guo
, Guoai Xu:
Beyond the virus: a first look at coronavirus-themed Android malware. Empir. Softw. Eng. 26(4): 82 (2021) - [j15]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. Proc. ACM Meas. Anal. Comput. Syst. 5(2): 26:1-26:30 (2021) - [j14]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao
, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 39:1-39:26 (2021) - [j13]Kailong Wang
, Yuxi Ling
, Yanjun Zhang
, Zhou Yu
, Haoyu Wang
, Guangdong Bai
, Beng Chin Ooi
, Jin Song Dong
:
Characterizing Cryptocurrency-themed Malicious Browser Extensions. Proc. ACM Meas. Anal. Comput. Syst. 6(3): 43:1-43:31 (2021) - [j12]Yangyu Hu
, Haoyu Wang, Yajin Zhou
, Yao Guo
, Li Li
, Bingxuan Luo
, Fangren Xu:
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications. IEEE Trans. Dependable Secur. Comput. 18(3): 1033-1050 (2021) - [j11]Xiao Cheng
, Haoyu Wang, Jiayi Hua, Guoai Xu, Yulei Sui:
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network. ACM Trans. Softw. Eng. Methodol. 30(3): 38:1-38:33 (2021) - [j10]Yanjie Zhao
, Li Li
, Haoyu Wang, Haipeng Cai
, Tegawendé F. Bissyandé
, Jacques Klein
, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021) - [c62]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c61]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories. COMPSAC 2021: 914-923 - [c60]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen
, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. ICSE 2021: 263-274 - [c59]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. ICSE 2021: 674-685 - [c58]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao
, Xiapu Luo, Peng Gao, Yao Guo
:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c57]Hao Zhou
, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c56]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. MOBILESoft@ICSE 2021: 12-23 - [c55]Siming Su, Haoyu Wang, Guoai Xu:
Towards Understanding iOS App Store Search Advertising: An Explorative Study. MOBILESoft@ICSE 2021: 40-51 - [c54]Jiayi Hua, Haoyu Wang:
On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection. MSR 2021: 530-534 - [c53]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Weihang Su, Haoyu Wang:
Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study. SEKE 2021: 249-254 - [c52]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. SIGMETRICS (Abstracts) 2021: 33-34 - [c51]Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, Xiapu Luo:
SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts. SIGMETRICS (Abstracts) 2021: 35-36 - [c50]Jiayi Hua, Yuanchun Li, Haoyu Wang:
MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps. SP (Workshops) 2021: 71-77 - [c49]Ningyu He, Ruiyi Zhang, Haoyu Wang, Lei Wu, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
EOSAFE: Security Analysis of EOSIO Smart Contracts. USENIX Security Symposium 2021: 1271-1288 - [c48]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [c47]Fuqi Lin, Haoyu Wang, Liu Wang, Xuanzhe Liu:
A Longitudinal Study of Removed Apps in iOS App Store. WWW 2021: 1435-1446 - [c46]Yuhao Gao, Haoyu Wang, Li Li, Xiapu Luo, Guoai Xu, Xuanzhe Liu:
Demystifying Illegal Mobile Gambling Apps. WWW 2021: 1447-1458 - [i34]Zhenpeng Chen, Huihan Yao, Yiling Lou, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Xuanzhe Liu:
An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications. CoRR abs/2101.04930 (2021) - [i33]Yuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin Liu:
DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection. CoRR abs/2101.06896 (2021) - [i32]Liu Wang, Haoyu Wang, Yi Wang, Gareth Tyson, Fei Lyu:
A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity. CoRR abs/2102.06528 (2021) - [i31]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - [i30]Yutian Tang, Haoyu Wang, Xian Zhan, Xiapu Luo, Yajin Zhou, Hao Zhou, Qiben Yan, Yulei Sui, Jacky Keung:
A Systematical Study on Application Performance Management Libraries for Apps. CoRR abs/2103.11286 (2021) - [i29]Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu:
Ethereum Name Service: the Good, the Bad, and the Ugly. CoRR abs/2104.05185 (2021) - [i28]Xian Zhan, Tianming Liu, Yepang Liu, Yang Liu, Li Li, Haoyu Wang, Xiapu Luo:
A Systematic Assessment on Android Third-party Library Detection Tools. CoRR abs/2108.01964 (2021) - [i27]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Demystifying Scam Tokens on Uniswap Decentralized Exchange. CoRR abs/2109.00229 (2021) - [i26]Ningyu He, Weihang Su, Zhou Yu, Xinyu Liu, Fengyi Zhao, Haoyu Wang, Xiapu Luo, Gareth Tyson, Lei Wu, Yao Guo:
Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO. CoRR abs/2110.07534 (2021) - 2020
- [j9]Pengcheng Xia, Haoyu Wang, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Guoai Xu:
Characterizing cryptocurrency exchange scams. Comput. Secur. 98: 101993 (2020) - [j8]Yulei Sui
, Xiao Cheng
, Guanqin Zhang, Haoyu Wang:
Flow2Vec: value-flow-based precise code embedding. Proc. ACM Program. Lang. 4(OOPSLA): 233:1-233:27 (2020) - [j7]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. Proc. ACM Meas. Anal. Comput. Syst. 4(2): 37:1-37:28 (2020) - [j6]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. Proc. ACM Meas. Anal. Comput. Syst. 4(3): 50:1-50:28 (2020) - [c45]Maria K. Wolters
, Shuobing Li, Haoyu Wang, Xinyu Yang, Yao Guo
:
Does the Presence of Privacy Relevant Information Affect App Market Choice? CHI Extended Abstracts 2020: 1-7 - [c44]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. eCrime 2020: 1-14 - [c43]Ningyu He, Lei Wu, Haoyu Wang, Yao Guo
, Xuxian Jiang:
Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. Financial Cryptography 2020: 654-675 - [c42]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo
:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. ICECCS 2020: 125-134 - [c41]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. ICSME 2020: 617-628 - [c40]Li Li, Jun Gao, Pingfan Kong, Haoyu Wang, Mengyu Huang, Yuan-Fang Li, Tegawendé F. Bissyandé:
KnowledgeZooClient: constructing knowledge graph for Android. ASE Workshops 2020: 73-78 - [c39]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level analysis of government-backed COVID-19 contact tracing apps. ASE Workshops 2020: 79-84 - [c38]Hao Zhou
, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [c37]Hao Zhou
, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c36]Xian Zhan
, Lingling Fan, Tianming Liu, Sen Chen, Li Li, Haoyu Wang, Yifei Xu, Xiapu Luo, Yang Liu
:
Automated Third-Party Library Detection for Android Applications: Are We There Yet? ASE 2020: 919-930 - [c35]Xu Xu, Yangyu Hu, Qian Guo, Ren He, Li Li, Guoai Xu, Zhihui Han, Haoyu Wang:
Dissecting Mobile Offerwall Advertisements: An Explorative Study. QRS 2020: 518-526 - [c34]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Understanding (Mis)Behavior on the EOSIO Blockchain. SIGMETRICS (Abstracts) 2020: 83-84 - [c33]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie
, Xuanzhe Liu:
A comprehensive study on challenges in deploying deep learning based software. ESEC/SIGSOFT FSE 2020: 750-762 - [c32]Yutian Tang
, Yulei Sui
, Haoyu Wang, Xiapu Luo, Hao Zhou, Zhou Xu:
All your app links are belong to us: understanding the threats of instant apps based attacks. ESEC/SIGSOFT FSE 2020: 914-926 - [c31]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo
, Liu Wang, Tegawendé F. Bissyandé
, Jacques Klein
:
MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. WWW 2020: 1715-1726 - [c30]Yangyu Hu, Haoyu Wang, Ren He, Li Li, Gareth Tyson, Ignacio Castro, Yao Guo
, Lei Wu, Guoai Xu:
Mobile App Squatting. WWW 2020: 1727-1738 - [i25]Tianming Liu, Haoyu Wang, Li Li, Xiapu Luo, Feng Dong, Yao Guo, Liu Wang, Tegawendé F. Bissyandé, Jacques Klein:
MadDroid: Characterising and Detecting Devious Ad Content for Android Apps. CoRR abs/2002.01656 (2020) - [i24]Yuheng Huang, Haoyu Wang, Lei Wu, Gareth Tyson, Xiapu Luo, Run Zhang, Xuanzhe Liu, Gang Huang, Xuxian Jiang:
Characterizing EOSIO Blockchain. CoRR abs/2002.05369 (2020) - [i23]Ningyu He, Ruiyi Zhang, Lei Wu, Haoyu Wang, Xiapu Luo, Yao Guo, Ting Yu, Xuxian Jiang:
Security Analysis of EOSIO Smart Contracts. CoRR abs/2003.06568 (2020) - [i22]Pengcheng Xia, Bowen Zhang, Ru Ji, Bingyu Gao, Lei Wu, Xiapu Luo, Haoyu Wang, Guoai Xu:
Characterizing Cryptocurrency Exchange Scams. CoRR abs/2003.07314 (2020) - [i21]Zhenpeng Chen, Yanbin Cao, Yuanqiang Liu, Haoyu Wang, Tao Xie, Xuanzhe Liu:
Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study. CoRR abs/2005.00760 (2020) - [i20]Ren He, Haoyu Wang, Pengcheng Xia, Liu Wang, Yuanchun Li, Lei Wu, Yajin Zhou, Xiapu Luo, Yao Guo, Guoai Xu:
Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware. CoRR abs/2005.14619 (2020) - [i19]Ru Ji, Ningyu He, Lei Wu, Haoyu Wang, Guangdong Bai, Yao Guo:
DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts. CoRR abs/2006.06419 (2020) - [i18]Pengcheng Xia, Haoyu Wang, Xiapu Luo, Lei Wu, Yajin Zhou, Guangdong Bai, Guoai Xu, Gang Huang, Xuanzhe Liu:
Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams. CoRR abs/2007.13639 (2020) - [i17]Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li:
A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps. CoRR abs/2008.13768 (2020) - [i16]Liu Wang, Ruiqing Li, Jiaxin Zhu, Guangdong Bai, Haoyu Wang:
When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories. CoRR abs/2010.12218 (2020) - [i15]Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, Kui Ren:
Towards understanding flash loan and its applications in defi ecosystem. CoRR abs/2010.12252 (2020) - [i14]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020) - [i13]Bingyu Gao, Haoyu Wang, Pengcheng Xia, Siwei Wu, Yajin Zhou, Xiapu Luo, Gareth Tyson:
Tracking Counterfeit Cryptocurrency End-to-end. CoRR abs/2011.02673 (2020) - [i12]Yixue Zhao, Siwei Yin, Adriana Sejfia, Marcelo Schmitt Laser, Haoyu Wang, Nenad Medvidovic:
Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms. CoRR abs/2011.04654 (2020) - [i11]Jinfeng Wen, Yi Liu, Zhenpeng Chen, Yun Ma, Haoyu Wang, Xuanzhe Liu:
Understanding Characteristics of Commodity Serverless Computing Platforms. CoRR abs/2012.00992 (2020) - [i10]Shuyu Zheng, Haoyu Wang, Lei Wu, Gang Huang, Xuanzhe Liu:
VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts. CoRR abs/2012.01032 (2020) - [i9]Huiyi Wang, Liu Wang, Haoyu Wang:
Market-level Analysis of Government-backed COVID-19 Contact Tracing Apps. CoRR abs/2012.10866 (2020) - [i8]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j5]Guoai Xu, Chengpeng Zhang
, Bowen Sun, Xinyu Yang, Yanhui Guo, Chengze Li, Haoyu Wang:
AppAuth: Authorship Attribution for Android App Clones. IEEE Access 7: 141850-141867 (2019) - [j4]Li Li, Tegawendé F. Bissyandé, Haoyu Wang, Jacques Klein
:
On Identifying and Explaining Similarities in Android Apps. J. Comput. Sci. Technol. 34(2): 437-455 (2019) - [j3]