publications
# students supervised (or co-supervised) by me, * co-first author, † corresponding author
2025
-
TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained ModelsACM Transactions on Software Engineering and Methodology (TOSEM), 2025
-
DPUaudit: DPU-assisted Pull-based Architecture for Near-Zero Cost System AuditingIn Proceedings of IEEE International Symposium on High-Performance Computer Architecture (HPCA) , 2025
-
Query Provenance Analysis: Efficient and Robust Defense against Query-based Black-box AttacksIn Proceedings of IEEE Symposium on Security and Privacy (S&P) , 2025
2024
-
A GUI Fuzzing Framework for Mobile Apps Based on Multi-modal RepresentationJournal of Software (in Chinese), 2024
-
Semantic-Enhanced Indirect Call Analysis with Large Language ModelsIn Proceedings of the IEEE/ACM International Conference on Automated Software Engineering (ASE) , 2024
-
A Unified Membership Inference Method for Visual Self-supervised Encoder via Part-aware CapabilityIn Proceedings of the ACM Conference on Computer and Communications Security (CCS) , 2024
-
Interference-free Operating System: A 6 Years’ Experience in Mitigating Cross-Core Interference in LinuxIn Proceedings of IEEE Real-Time Systems Symposium (RTSS) , 2024
-
FAMOS:Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive LearningIn Proceedings of USENIX Security Symposium (Security) , 2024
-
Identifying Vulnerable Third-Party Java Libraries from Textual Descriptions of Vulnerabilities and LibrariesACM Transactions on Software Engineering and Methodology (TOSEM), 2024
-
JSimpo: Structural Deobfuscation of JavaScript ProgramsACM Transactions on Software Engineering and Methodology (TOSEM), 2024
-
NodLink: An Online System for Fine-Grained APT Attack Detection and InvestigationIn Proceedings of Network and Distributed System Security Symposium (NDSS) , 2024
-
No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition for On-Device MLIn Proceedings of IEEE Symposium on Security and Privacy (S&P), 2024
2023
-
Towards OS Heterogeneity Aware Cluster Management for HPCIn Proceedings of the ACM SIGOPS Asia-Pacific Workshop on Systems (APSys), 2023
-
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM ApplicationsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2023
-
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic ExecutionIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2023
-
APIMind: an API-Driven Automated Tool for Assessing Runtime Description-to-Permission Fidelity in Android AppsIn Proceedings of the IEEE International Symposium on Software Reliability Engineering (ISSRE), 2023
-
ReSPlay: Improving Cross-Platform Record-and-Replay with GUI Sequence MatchingIn Proceedings of the IEEE International Symposium on Software Reliability Engineering (ISSRE), 2023
-
Towards OS Heterogeneity Aware Cluster Management for HPCIn Proceedings of the ACM SIGOPS Asia-Pacific Workshop on Systems (APSys), 2023
-
How Android Apps Break the Data Minimization Principle: An Empirical StudyIn Proceedings of the IEEE/ACM International Conference on Automated Software Engineering (ASE), 2023
-
Fuzzing the Latest NTFS in Linux with Papora: An Empirical StudyIn Proceedings of theIEEE Workshop on Offensive Technologies (WOOT), 2023
-
DISTDET: A Cost-Effective Distributed Cyber Threat Detection SystemIn Proceedings of the USENIX Security Symposium (Security), 2023
-
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model SlicingIn Proceedings of the International Conference on Software Engineering (ICSE), 2023
-
Beyond Fine-Tuning: Efficient and Effective Fed-Tuning for Mobile/Web UsersIn Proceedings of the International World Wide Web Conference (WWW), 2023
-
Eunomia: Enabling User-specified Fine-Grained Search in Symbolic ExecutionIn Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023
-
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its MitigationIn Proceedings of the USENIX Security Symposium (Security), 2023
-
Are We There Yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsIn Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2023
-
Detecting Malicious Websites from the Perspective of System Provenance AnalysisIEEE Transactions on Dependable and Secure Computing (TDSC), 2023
-
Adonis : Practical and Efficient Control Flow Recovery through OS-Level TracesACM Transactions on Software Engineering and Methodology (TOSEM), 2023
-
FaaSLight: General Application-Level Cold-Start Latency Optimization for Function-as-a-Service in Serverless ComputingACM Transactions on Software Engineering and Methodology, 2023
2022
-
ReMoS: reducing defect inheritance in transfer learning via relevant model slicingIn Proceedings of the International Conference on Software Engineering (ICSE), 2022
-
DistFL: Distribution-aware Federated Learning for Mobile ScenariosProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (Ubicomp), 2022
-
Teeslice: slicing dnn models for secure and efficient deploymentIn Proceedings of the ACM International Workshop on AI and Software Testing/Analysis, 2022
2021
-
Structural Temporal Graph Neural Networks for Anomaly Detection in Dynamic GraphsIn Proceedings of the 30th ACM international conference on Information & Knowledge Management, 2021
-
SIGL: Securing Software Installations Through Deep Graph Learning.In Proceedings of the USENIX Security Symposium (Security), 2021
-
SEAL: Storage-efficient Causality Analysis on Enterprise Logs with Query-friendly Compression.In Proceedings of the USENIX Security Symposium (Security), 2021
2020
-
Temporal Context-Aware Representation Learning for Question RoutingIn Proceedings of the International Conference on Web Search and Data Mining (WSDM), 2020
-
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.In Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2020
-
APTrace: A responsive system for agile enterprise level causality analysisIn Proceedings of the IEEE International Conference on Data Engineering (ICDE), 2020
-
Querying Streaming System Monitoring Data for Enterprise System Anomaly DetectionIn 2020 IEEE 36th International Conference on Data Engineering (ICDE), 2020
-
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storageIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2020
2019
-
Nodoze: Combatting threat alert fatigue with automated provenance triageIn Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2019
-
Attentional Heterogeneous Graph Neural Network: Application to Program ReidentificationIn Proceedings of the SIAM International Conference on Data Mining, 2019
-
Countering Malicious Processes with Process-DNS Association.In Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2019
-
Progressive Processing of System-Behavioral QueryIn Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2019
2018
-
Towards a Timely Causality Analysis for Enterprise SecurityIn Proceedings of the Network and Distributed System Security Symposium (NDSS), 2018
-
Remove Rats from Your Code: Automated Optimization of Resource Inefficient Database Writes for Mobile ApplicationsIn Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2018
-
{SAQL}: A Stream-based Query System for Real-time Abnormal System Behavior DetectionIn Proceedings of the USENIX Security Symposium (Security), 2018
-
Nodemerge: Template Based Efficient Data Reduction for Big-data Causality AnalysisIn Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2018
2017
-
Detecting Display Energy Hotspots in Android AppsSoftware Testing, Verification and Reliability, 2017
2016
-
Automated Energy Optimization of HTTP Requests for Mobile ApplicationsIn Proceedings of the International Conference on Software Engineering (ICSE), 2016
-
Lightweight Measurement and Estimation of Mobile Ad Energy ConsumptionIn Proceedings of the International Workshop on Green and Sustainable Software, 2016
2015
-
String analysis for Java and Android applicationsIn Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2015
-
Nyx: A Display Energy Optimizer for Mobile Web AppsIn Proceedings of the Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), 2015
-
Optimizing Energy of HTTP Requests in Android ApplicationsIn Proceedings of the International Workshop on Software Development Lifecycle for Mobile, 2015
-
Domino: understanding wide-area, asynchronous event causality in web applicationsIn Proceedings of the ACM Symposium on Cloud Computing (SoCC), 2015
-
Optimizing display energy consumption for hybrid Android apps (invited talk)In Proceedings of the International Workshop on Software Development Lifecycle for Mobile, 2015
2014
-
Making Web Applications More Energy Efficient for OLED SmartphonesIn Proceedings of the International Conference on Software Engineering (ICSE), 2014
-
An Investigation Into Energy-Saving Programming Practices for Android Smartphone App DevelopmentIn Proceedings of the International Workshop on Green and Sustainable Software (Greens), 2014
-
Integrated Energy-Directed Test Suite OptimizationIn Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), 2014
-
An Empirical Study of the Energy Consumption of Android ApplicationsIn Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME), 2014
2013
-
Energy-Directed Test Suite OptimizationIn Proceedings of the International Workshop on Green and Sustainable Software (GREENS), 2013
-
Estimating Mobile Application Energy Consumption Using Program AnalysisIn Proceedings of the International Conference on Software Engineering (ICSE), 2013
-
Sif: A Selective Instrumentation Framework for Mobile ApplicationsIn Proceeding of the Annual International Conference on Mobile systems, Applications, and Services (Mobisys), 2013
-
Calculating Source Line Level Energy Information for Android ApplicationsIn Proceedings of the International Symposium on Software Testing and Analysis (ISSTA), 2013
2012
-
Estimating Android Applications’ CPU Energy Usage via Bytecode ProfilingIn Proceedings of the International Workshop on Green and Sustainable Software (GREENS), 2012