Wei Yang
Wei Yang
Assistant Professor, Department of Computer Science, University of Texas at Dallas
Verified email at utdallas.edu - Homepage
Title
Cited by
Cited by
Year
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the USENIX Security Symposium, 2013., 2013
3542013
A Grey-box Approach for Automated GUI-Model Generation of Mobile Applications
W Yang, MR Prasad, T Xie
Proc. of International Conference on Fundamental Approaches to Software …, 2013
3122013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
Proceedings of the 37th International Conference on Software Engineering …, 2015
2312015
Free for All! Assessing User Data Exposure to Advertising Libraries on Android
S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter
Proc. of the 23rd Annual Network and Distributed System Security Symposium, 2016
752016
Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
ACM Conference on Computer and Communications Security, 2018
50*2018
Automated test input generation for android: Are we really there yet in an industrial case?
X Zeng, D Li, W Zheng, F Xia, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
502016
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps
W Yang, D Kong, T Xie, CA Gunter
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
492017
Automated test input generation for Android: Towards getting there in an industrial case
H Zheng, D Li, B Liang, X Zeng, W Zheng, Y Deng, W Lam, W Yang, T Xie
Proceedings of the 39th International Conference on Software Engineering …, 2017
282017
An empirical study of android test generation tools in industrial cases
W Wang, D Li, W Yang, Y Cao, Z Zhang, Y Deng, T Xie
2018 33rd IEEE/ACM International Conference on Automated Software …, 2018
262018
Charting the attack surface of trigger-action iot platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
132019
Testing untestable neural machine translation: An industrial case
W Zheng, W Wang, D Liu, C Zhang, Q Zeng, Y Deng, W Yang, P He, T Xie
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
10*2019
Enmobile: Entity-based characterization and analysis of mobile malware
W Yang, MR Prasad, T Xie
Proceedings of the 40th International Conference on Software Engineering …, 2018
102018
Generating regular expressions from natural language specifications: Are we there yet?
Z Zhong, J Guo, W Yang, T Xie, JG Lou, T Liu, D Zhang
AAAI Workshops, 791-794, 2018
102018
SemRegex: A semantics-based approach for generating regular expressions from natural language specifications
Z Zhong, J Guo, W Yang, J Peng, T Xie, JG Lou, T Liu, D Zhang
Proceedings of the 2018 Conference on Empirical Methods in Natural Language …, 2018
72018
Mining Android app descriptions for permission requirements recommendation
X Liu, Y Leng, W Yang, C Zhai, T Xie
2018 IEEE 26th International Requirements Engineering Conference (RE), 147-158, 2018
72018
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors.
W Yang, X Xiao, R Pandita, W Enck, T Xie
ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2014
62014
Telemade: A Testing Framework for Learning-Based Malware Detection Systems.
W Yang, T Xie
AAAI Workshops, 400-403, 2018
52018
REINAM: reinforcement learning for input-grammar inference
Z Wu, E Johnson, W Yang, O Bastani, D Song, J Peng, T Xie
Proceedings of the 2019 27th ACM Joint Meeting on European Software …, 2019
42019
移动应用安全解析学: 成果与挑战
杨威, 肖旭生, 李邓锋, 李豁然, 刘哲, 王浩宇, 郭耀, 谢涛
Journal of Cyber Security 信息安全学报 1 (2), 2016
42016
A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages
X Liu, Y Leng, W Yang, W Wang, C Zhai, T Xie
Symposium on Visual Languages and Human-Centric Computing (VL/HCC)., 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20