Xusheng Xiao
Title
Cited by
Cited by
Year
WHYPER: Towards Automating Risk Assessment of Mobile Applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
4242013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
2752015
Inferring method specifications from natural language API descriptions
R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar
2012 34th international conference on software engineering (ICSE), 815-825, 2012
1742012
Automated Extraction of Security Policies from Natural-Language Software Documents
X Xiao, A Paradkar, S Thummalapenta, T Xie
FSE '12 Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
1312012
SUPOR: precise and scalable sensitive user input detection for android apps
J Huang, Z Li, X Xiao, Z Wu, K Lu, X Zhang, G Jiang
24th USENIX Security Symposium (USENIX Security 2015), 977-992, 2015
1162015
Precise identification of problems for structural test generation
X Xiao, T Xie, N Tillmann, J De Halleux
Proceedings of the 33rd International Conference on Software Engineering …, 2011
912011
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
782016
Context-Sensitive Delta Inference for Identifying Workload-Dependent Performance Bottlenecks
X Xiao, S Han, D Zhang, T Xie
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
762013
User-aware privacy control via extended static-information-flow analysis
X Xiao, N Tillmann, M Fahndrich, J De Halleux, M Moskal
Proceedings of the 27th IEEE/ACM International Conference on Automated …, 2012
562012
Characteristic Studies of Loop Problems for Structural Test Generation via Symbolic Execution
X Xiao, S Li, T Xie, N Tillmann
Proceedings of the 28th IEEE/ACM International Conference on Automated …, 2013
542013
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
P Gao, X Xiao, D Li, Z Li, K Jee, Z Wu, CH Kim, SR Kulkarni, P Mittal
27th USENIX Security Symposium (USENIX Security 18), 2018
472018
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data
P Gao, X Xiao, Z Li, K Jee, F Xu, SR Kulkarni, P Mittal
2018 USENIX Annual Technical Conference (USENIX ATC 18), 113-126, 2018
362018
Relation extraction for inferring access control rules from natural language artifacts
J Slankas, X Xiao, L Williams, T Xie
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
342014
Hyperservice: Interoperability and programmability across heterogeneous blockchains
Z Liu, Y Xiang, J Shi, P Gao, H Wang, X Xiao, B Wen, YC Hu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
292019
Nodemerge: Template based efficient data reduction for big-data causality analysis
Y Tang, D Li, Z Li, M Zhang, K Jee, X Xiao, Z Wu, J Rhee, F Xu, Q Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
282018
Measuring code behavioral similarity for programming and software engineering education
S Li, X Xiao, B Bassett, T Xie, N Tillmann
2016 IEEE/ACM 38th International Conference on Software Engineering …, 2016
282016
Cooperative Software Testing and Analysis: Advances and Challenges
T Xie, L Zhang, X Xiao, YF Xiong, D Hao
Journal of Computer Science and Technology 29 (4), 713-723, 2014
272014
DeepIntent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps
S Xi, S Yang, X Xiao, Y Yao, Y Xiong, F Xu, H Wang, P Gao, Z Liu, F Xu, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
232019
Behavior Query Discovery in System-Generated Temporal Graphs
B Zong, X Xiao, Z Li, Z Wu, Z Qian, X Yan, AK Singh, G Jiang
Proceedings of the VLDB Endowment 9 (4), 240-251, 2015
232015
Behavior Query Discovery in System-Generated Temporal Graphs
B Zong, X Xiao, Z Li, Z Wu, Z Qian, X Yan, AK Singh, G Jiang
arXiv preprint arXiv:1511.05911, 2015
232015
The system can't perform the operation now. Try again later.
Articles 1–20