Jiahao Liu

Orcid: 0009-0007-0969-6891

According to our database1, Jiahao Liu authored at least 14 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
When MCP Servers Attack: Taxonomy, Feasibility, and Mitigation.
CoRR, September, 2025

An Accurate and Efficient Vulnerability Propagation Analysis Framework.
CoRR, June, 2025

PsyScam: A Benchmark for Psychological Techniques in Real-World Scams.
CoRR, May, 2025

ProvGuard: Detecting SDN Control Policy Manipulation via Contextual Semantics of Provenance Graphs.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

UI-CTX: Understanding UI Behaviors with Code Contexts for Mobile Applications.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Fuzzing the PHP Interpreter via Dataflow Fusion.
CoRR, 2024

Unraveling the Key of Machine Learning Solutions for Android Malware Detection.
CoRR, 2024

KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

MaskDroid: Robust Android Malware Detection with Masked Graph Representations.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

VulZoo: A Comprehensive Vulnerability Intelligence Dataset.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Learning Graph-based Code Representations for Source-level Functional Similarity Detection.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

TeLL: log level suggestions via modeling multi-level code block information.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022


  Loading...