Towards model checking android applications G Bai, Q Ye, Y Wu, H Botha, J Sun, Y Liu, JS Dong, W Visser IEEE Transactions on Software Engineering 44 (6), 595-612, 2017 | 40 | 2017 |
Formal analysis of a single sign-on protocol implementation for android Q Ye, G Bai, K Wang, JS Dong 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 28 | 2015 |
All your sessions are belong to us: Investigating authenticator leakage through backup channels on android G Bai, J Sun, J Wu, Q Ye, L Li, JS Dong, S Guo 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 22 | 2015 |
Deep review sharing C Guo, D Huang, N Dong, Q Ye, J Xu, Y Fan, H Yang, Y Xu 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 13 | 2019 |
Deep attentive factorization machine for app recommendation service C Guo, Y Xu, X Hou, N Dong, J Xu, Q Ye 2019 IEEE International Conference on Web Services (ICWS), 134-138, 2019 | 12 | 2019 |
Systematic comprehension for developer reply in mobile system forum C Guo, W Wang, Y Wu, N Dong, Q Ye, J Xu, S Zhang 2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019 | 7 | 2019 |
Automatic construction of callback model for android application C Guo, Q Ye, N Dong, G Bai, JS Dong, J Xu 2016 21st International Conference on Engineering of Complex Computer …, 2016 | 7 | 2016 |
Inferring implicit assumptions and correct usage of mobile payment protocols Q Ye, G Bai, N Dong, JS Dong Security and Privacy in Communication Networks: 13th International …, 2018 | 6 | 2018 |
Position paper: On using trusted execution environment to secure COTS devices for accessing industrial control systems Q Ye, HC Tan, D Mashima, B Chen, Z Kalbarczyk Authorea Preprints, 2023 | 3 | 2023 |
App genome: callback sequencing in Android C Guo, N Dong, G Bai, Q Ye, J Dong, J Xu, G Si 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 3 | 2017 |
Analyzing security property of android application implementation using formal method Q Ye 2015 20th International Conference on Engineering of Complex Computer …, 2015 | 3 | 2015 |
LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking Q Ye, Y Zhang, G Bai, N Dong, Z Liang, JS Dong, H Wang Information Security: 22nd International Conference, ISC 2019, New York City …, 2019 | 2 | 2019 |
GateKeeper: Operator-centric Trusted App Management Framework on ARM TrustZone B Gowrisankar, D Mashima, W Ong, Q Ye, E Esiner, B Chen, Z Kalbarczyk 2022 IEEE Conference on Communications and Network Security (CNS), 100-108, 2022 | 1 | 2022 |
All your sessions are belong to us: Investigating authenticator leakage through backup channels on Android.(2015) G BAI, J SUN, J WU, Q YE, L LI, JS DONG, S GUO 20th International Conference on Engineering of Complex Computer Systems …, 2015 | 1 | 2015 |
Analysis of Mobile Security and Privacy Q Ye PQDT-Global, 2018 | | 2018 |
Vulnerable Path Attack and its Detection C She, W Wen, Q Ye, K Zheng KSII Transactions on Internet and Information Systems (TIIS) 11 (4), 2149-2170, 2017 | | 2017 |
ICECCS 2015 Additional Reviewers R Arshad, C Attiogbe, P Ballarini, JL Béchennec, A Belaggoun, S Bijo, ... | | |