Xiaojing Liao

Orcid: 0000-0001-7555-1673

According to our database1, Xiaojing Liao authored at least 52 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Malla: Demystifying Real-world Large Language Model Integrated Malicious Services.
CoRR, 2024

2023
Detecting and Measuring Aggressive Location Harvesting in Mobile Apps via Data-flow Path Embedding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion.
CoRR, 2023

Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels.
Proceedings of the 32nd USENIX Security Symposium, 2023

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

Vulnerability Intelligence Alignment via Masked Graph Attention Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Stolen Risks of Models with Security Properties.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Detecting Abused Image Hosting Modules as Malicious Services.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Cybersecurity Entity Alignment via Masked Graph Attention Networks.
CoRR, 2022

Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale.
CoRR, 2022

OS-Aware Vulnerability Prioritization via Differential Severity Analysis.
Proceedings of the 31st USENIX Security Symposium, 2022

Analyzing Ground-Truth Data of Mobile Gambling Scams.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Demystifying Local Business Search Poisoning for Illicit Drug Promotion.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Understanding Illicit UI in iOS Apps Through Hidden UI Analysis.
IEEE Trans. Dependable Secur. Comput., 2021

Understanding Malicious Cross-library Data Harvesting on Android.
Proceedings of the 30th USENIX Security Symposium, 2021

Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Your Phone is My Proxy: Detecting and Understanding Mobile Proxy Networks.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Learning Security Classifiers with Verified Global Robustness Properties.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Into the Deep Web: Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Demystifying Resource Management Risks in Emerging Mobile App-in-App Ecosystems.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home.
Wirel. Networks, 2019

Di-PriDA: Differentially Private Distributed Load Balancing Control for the Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2019

Understanding iOS-based Crowdturfing Through Hidden UI Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Resident Evil: Understanding Residential IP Proxy as a Dark Service.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Cracking the Wall of Confinement: Understanding and Analyzing Malicious Domain Take-downs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Cloud repository as a malicious service: challenge, identification and implication.
Cybersecur., 2018

Reading Thieves' Cant: Automatically Identifying and Understanding Dark Jargons from Cybercrime Marketplaces.
Proceedings of the 27th USENIX Security Symposium, 2018

Game of Missuggestions: Semantic Analysis of Search-Autocomplete Manipulations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Apple ZeroConf Holes: How Hackers Can Steal iPhone Photos.
IEEE Secur. Priv., 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Catching predators at watering holes: finding and understanding strategically compromised websites.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Unauthorized Cross-App Resource Access on MAC OS X and iOS.
CoRR, 2015

Design of Literature Management Tool.
Proceedings of the Cross-Cultural Design Applications in Mobile Interaction, Education, Health, Transport and Cultural Heritage, 2015

Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Towards Secure Metering Data Analysis via Distributed Differential Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

S-Match: An efficient privacy-preserving profile matching scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Privacy-preserving and secure top-k query in two-tier wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...