Haoyu Wang

Affiliations:
  • Beijing University of Posts and Telecommunications, Beijing, China
  • Peking University, MOE Key Laboratory of High-Confidence Software Technologies, Beijing, China (PhD 2016)


According to our database1, Haoyu Wang authored at least 96 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

Make Web3.0 Connected.
IEEE Trans. Dependable Secur. Comput., 2022

MalRadar: Demystifying Android Malware in the New Era.
Proc. ACM Meas. Anal. Comput. Syst., 2022

Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

A Tale of Two Countries: A Longitudinal Cross-Country Study of Mobile Users' Reactions to the COVID-19 Pandemic Through the Lens of App Popularity.
Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2022

Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection.
ACM Trans. Softw. Eng. Methodol., 2021

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications.
IEEE Trans. Dependable Secur. Comput., 2021

Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange.
Proc. ACM Meas. Anal. Comput. Syst., 2021

SADPonzi: Detecting and Characterizing Ponzi Schemes in Ethereum Smart Contracts.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021

Demystifying Scam Tokens on Uniswap Decentralized Exchange.
CoRR, 2021

A Systematic Assessment on Android Third-party Library Detection Tools.
CoRR, 2021

Ethereum Name Service: the Good, the Bad, and the Ugly.
CoRR, 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

A Longitudinal Study of Removed Apps in iOS App Store.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Demystifying Illegal Mobile Gambling Apps.
Proceedings of the WWW '21: The Web Conference 2021, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

MMGuard: Automatically Protecting On-Device Deep Learning Models in Android Apps.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Understanding the Impact of COVID-19 on Github Developers: A Preliminary Study.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

On the Effectiveness of Deep Vulnerability Detectors to Simple Stupid Bug Detection.
Proceedings of the 18th IEEE/ACM International Conference on Mining Software Repositories, 2021

Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms.
Proceedings of the 8th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2021

DeepPayload: Black-box Backdoor Attack on Deep Learning Models through Neural Payload Injection.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

An Empirical Study on Deployment Faults of Deep Learning Based Mobile Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

A Large-Scale Empirical Study of COVID-19 Themed GitHub Repositories.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Understanding (Mis)Behavior on the EOSIO Blockchain.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Tracking Counterfeit Cryptocurrency End-to-end.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Flow2Vec: value-flow-based precise code embedding.
Proc. ACM Program. Lang., 2020

HyperService: Interoperability and Programmability Across Heterogeneous Blockchains.
IACR Cryptol. ePrint Arch., 2020

VM Matters: A Comparison of WASM VMs and EVMs in the Performance of Blockchain Smart Contracts.
CoRR, 2020

Understanding Characteristics of Commodity Serverless Computing Platforms.
CoRR, 2020

Towards understanding flash loan and its applications in defi ecosystem.
CoRR, 2020

When the Open Source Community Meets COVID-19: Characterizing COVID-19 themed GitHub Repositories.
CoRR, 2020

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
CoRR, 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Understanding Challenges in Deploying Deep Learning Based Software: An Empirical Study.
CoRR, 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

Characterizing EOSIO Blockchain.
CoRR, 2020

MadDroid: Characterising and Detecting Devious Ad Content for Android Apps.
CoRR, 2020

Characterizing cryptocurrency exchange scams.
Comput. Secur., 2020

MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Mobile App Squatting.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

A comprehensive study on challenges in deploying deep learning based software.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Dissecting Mobile Offerwall Advertisements: An Explorative Study.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Demystifying Diehard Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Automated Third-Party Library Detection for Android Applications: Are We There Yet?
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Market-level analysis of government-backed COVID-19 contact tracing apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

KnowledgeZooClient: constructing knowledge graph for Android.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

A<sup>3</sup>Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

Don't Fish in Troubled Waters! Characterizing Coronavirus-themed Cryptocurrency Scams.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Does the Presence of Privacy Relevant Information Affect App Market Choice?
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Revisiting the impact of common libraries for android-related investigations.
J. Syst. Softw., 2019

On Identifying and Explaining Similarities in Android Apps.
J. Comput. Sci. Technol., 2019

Automated Deobfuscation of Android Native Binary Code.
CoRR, 2019

EVulHunter: Detecting Fake Transfer Vulnerabilities for EOSIO's Smart Contracts at Webassembly-level.
CoRR, 2019

AppAuth: Authorship Attribution for Android App Clones.
IEEE Access, 2019

Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play.
Proceedings of the World Wide Web Conference, 2019

Knowledge Graphing Git Repositories: A Preliminary Study.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

AppNet: understanding app recommendation in Google Play.
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019

RmvDroid: towards a reliable Android malware dataset with app metadata.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

Characterizing Android App Signing Issues.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

Characterizing the global mobile app developers: a large-scale empirical study.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

Deobfuscating Android native binary code.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

CiD: automating the detection of API-related compatibility issues in Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection.
CoRR, 2017

CRSPR: PageRank for Android Apps.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Understanding third-party libraries in mobile app analysis.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014

2013
Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013


  Loading...