Yao Guo

Affiliations:
  • Peking University, School of EECS, Key Laboratory of High-Confidence Software Technologies (MOE), Beijing, China
  • University of Massachusetts, Amherst, MA, USA (PhD)


According to our database1, Yao Guo authored at least 119 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Graph-Based Temporal Attention Framework for Multi-Sensor Traffic Flow Forecasting.
IEEE Trans. Intell. Transp. Syst., 2022

A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation.
CoRR, 2022

ReMoS: Reducing Defect Inheritance in Transfer Learning via Relevant Model Slicing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications.
IEEE Trans. Dependable Secur. Comput., 2021

DistFL: Distribution-aware Federated Learning for Mobile Scenarios.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

Understanding the Evolution of Blockchain Ecosystems: A Longitudinal Measurement Study of Bitcoin, Ethereum, and EOSIO.
CoRR, 2021

PFA: Privacy-preserving Federated Adaptation for Effective Model Personalization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

EOSAFE: Security Analysis of EOSIO Smart Contracts.
Proceedings of the 30th USENIX Security Symposium, 2021

Dependency-aware Form Understanding.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

TransTailor: Pruning the Pre-trained Model for Improved Transfer Learning.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
PMC: A Privacy-preserving Deep Learning Model Customization Framework for Edge Computing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware.
CoRR, 2020

Adversarial Attacks on Monocular Depth Estimation.
CoRR, 2020

Security Analysis of EOSIO Smart Contracts.
CoRR, 2020

MadDroid: Characterising and Detecting Devious Ad Content for Android Apps.
CoRR, 2020

MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Mobile App Squatting.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Dynamic slicing for deep neural networks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

DEPOSafe: Demystifying the Fake Deposit Vulnerability in Ethereum Smart Contracts.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Characterizing Code Clones in the Ethereum Smart Contract Ecosystem.
Proceedings of the Financial Cryptography and Data Security, 2020

Does the Presence of Privacy Relevant Information Affect App Market Choice?
Proceedings of the Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

2019
Automated Deobfuscation of Android Native Binary Code.
CoRR, 2019

A Deep Learning based Approach to Automated Android App Testing.
CoRR, 2019

Understanding the Evolution of Mobile App Ecosystems: A Longitudinal Measurement Study of Google Play.
Proceedings of the World Wide Web Conference, 2019

Want to Earn a Few Extra Bucks? A First Look at Money-Making Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

Policy-Based Access Control for Robotic Applications.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

AppNet: understanding app recommendation in Google Play.
Proceedings of the 3rd ACM SIGSOFT International Workshop on App Market Analytics, 2019

RmvDroid: towards a reliable Android malware dataset with app metadata.
Proceedings of the 16th International Conference on Mining Software Repositories, 2019

WealthAdapt: A General Network Adaptation Framework for Small Data Tasks.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Characterizing Android App Signing Issues.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

DaPanda: Detecting Aggressive Push Notifications in Android Apps.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Humanoid: A Deep Learning-Based Approach to Automated Black-box Android App Testing.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Characterizing the global mobile app developers: a large-scale empirical study.
Proceedings of the 6th International Conference on Mobile Software Engineering and Systems, 2019

Deobfuscating Android native binary code.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
Toward Ubiquitous Operating Systems: A Software-Defined Perspective.
Computer, 2018

Building application-specific operating systems: a profile-guided approach.
Sci. China Inf. Sci., 2018

How do Mobile Apps Violate the Behavioral Policy of Advertisement Libraries?
Proceedings of the 19th International Workshop on Mobile Computing Systems & Applications, 2018

FraudDroid: automated ad fraud detection for Android apps.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Re-checking App Behavior against App Description in the Context of Third-party Libraries.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Inferring UI States of Mobile Applications Through Power Side Channel Exploitation.
Proceedings of the Security and Privacy in Communication Networks, 2018

Why are Android apps removed from Google Play?: a large-scale empirical study.
Proceedings of the 15th International Conference on Mining Software Repositories, 2018

Device-Specific Linux Kernel Optimization for Android Smartphones.
Proceedings of the 6th IEEE International Conference on Mobile Cloud Computing, 2018

What's inside my app?: understanding feature redundancy in mobile apps.
Proceedings of the 26th Conference on Program Comprehension, 2018

Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets.
Proceedings of the Internet Measurement Conference 2018, 2018

Operating Systems for Internetware: Challenges and Future Directions.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Towards Light-Weight Deep Learning Based Malware Detection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Automated Extraction of Personal Knowledge from Smartphone Push Notifications.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Understanding the Purpose of Permission Use in Mobile Apps.
ACM Trans. Inf. Syst., 2017

Mining User Reviews for Mobile App Comparisons.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

PrivacyStreams: Enabling Transparency in Personal Data Processing for Mobile Apps.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

FrauDroid: An Accurate and Scalable Approach to Automated Mobile Ad Fraud Detection.
CoRR, 2017

Understanding Application-Battery Interactions on Smartphones: A Large-Scale Empirical Study.
IEEE Access, 2017

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective.
Proceedings of the 26th International Conference on World Wide Web, 2017

Freeze It If You Can: Challenges and Future Directions in Benchmarking Smartphone Performance.
Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, 2017

FreeNavi: Landmark-Based Mapless Indoor Navigation Based on WiFi Fingerprints.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Looxy: Web Access Optimization for Mobile Applications with a Local Proxy.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

E-Spector: Online energy inspection for Android applications.
Proceedings of the 2017 IEEE/ACM International Symposium on Low Power Electronics and Design, 2017

Understanding third-party libraries in mobile app analysis.
Proceedings of the 39th International Conference on Software Engineering, 2017

DroidBot: a lightweight UI-guided test input generator for Android.
Proceedings of the 39th International Conference on Software Engineering, 2017

Hybrid small class teaching: dividing and conquering large computer systems classes.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Identifying and Analyzing the Privacy of Apps for Kids.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Standby Energy Analysis and Optimization for Smartphones.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

LibRadar: fast and accurate detection of third-party libraries in Android apps.
Proceedings of the 38th International Conference on Software Engineering, 2016

PERUIM: understanding mobile application privacy with permission-UI mapping.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Self-Adaptive Step Counting on Smartphones under Unrestricted Stepping Modes.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications.
Proceedings of the Security and Privacy in Communication Networks, 2015

Uniport: A Uniform Programming Support Framework for Mobile Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Cloud-Based Programmable Sensor Data Provision.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

WuKong: a scalable and accurate two-phase approach to Android app clone detection.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Fixing sensor-related energy bugs through automated sensing policy instrumentation.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2015

A Study on Power Side Channels on Mobile Devices.
Proceedings of the 7th Asia-Pacific Symposium on Internetware, 2015

Using text mining to infer the purpose of permission use in mobile apps.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2015

Reevaluating Android Permission Gaps with Static and Dynamic Analysis.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Rethinking Compiler Optimizations for the Linux Kernel: An Explorative Study.
Proceedings of the 6th Asia-Pacific Workshop on Systems, 2015

2014
Context-aware usage control for web of things.
Secur. Commun. Networks, 2014

Similarity-based web browser optimization.
Proceedings of the 23rd International World Wide Web Conference, 2014

Topic Evolutions in Scientific Conferences.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Collaborative privacy management: mobile privacy beyond your own devices.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

An empirical study of indoor localization algorithms with densely deployed APs.
Proceedings of the IEEE Global Communications Conference, 2014

Preserving Location-Related Privacy Collaboratively in Geo-social Networks.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Experiences in profile-guided operating system kernel optimization.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2013
Supporting Localized Interactions among Heterogeneous Smart Things with ThingWare.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Patronus: Augmented Privacy Protection for Resource Publication in Online Social Networks.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Mobile Web Browser Optimizations in the Cloud Era: A Survey.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Power estimation for mobile applications with profile-driven battery traces.
Proceedings of the International Symposium on Low Power Electronics and Design (ISLPED), 2013

Towards an operating system for the campus.
Proceedings of the 5th Asia-Pacific Symposium on Internetware, 2013

2012
Security model oriented attestation on dynamically reconfigurable component-based systems.
J. Netw. Comput. Appl., 2012

Boreas: an accurate and scalable token-based approach to code clone detection.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

Smarter wheelchairs who can talk to each other: An integrated and collaborative approach.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
Energy-Efficient Hardware Data Prefetching.
IEEE Trans. Very Large Scale Integr. Syst., 2011

Jupiter: transparent augmentation of smartphone capabilities through cloud computing.
Proceedings of the 3rd ACM SOSP Workshop on Networking, 2011

A system context-aware approach for battery lifetime prediction in smart phones.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Energy-Aware Fixed-Priority Multi-core Scheduling for Real-Time Systems.
Proceedings of the 17th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2011

CMCD: Count Matrix Based Code Clone Detection.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Context-Aware Usage Control for Android.
Proceedings of the Security and Privacy in Communication Networks, 2010

Modeling TCG-Based Secure Systems with Colored Petri Nets.
Proceedings of the Trusted Systems - Second International Conference, 2010

SCOBA: source code based attestation on custom software.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Transaction-based adaptive dynamic voltage scaling for interactive applications.
Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009

Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009

A Lightweight Dynamic Performance Monitoring Framework for Embedded Systems.
Proceedings of the International Conference on Embedded Software and Systems, 2009

SAConf: Semantic Attestation of Software Configurations.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

FPValidator: Validating Type Equivalence of Function Pointers on the Fly.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Data Memory Subsystem Resilient to Process Variations.
IEEE Trans. Very Large Scale Integr. Syst., 2008

AspectC2C: a symmetric aspect extension to the C language.
ACM SIGPLAN Notices, 2008

Synchronization coherence: A transparent hardware mechanism for cache coherence and fine-grained synchronization.
J. Parallel Distributed Comput., 2008

Automated Aspect Recommendation through Clustering-Based Fan-in Analysis.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Keep Passwords Away from Memory: Password Caching and Verification Using TPM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Fault-Tolerant Nanoscale Processors on Semiconductor Nanowire Grids.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

Designing Memory Subsystems Resilient to Process Variations.
Proceedings of the 2007 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), 2007

Toward Efficient Aspect Mining for Linux.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2006
Compiler-based adaptive fetch throttling for energy-efficiency.
Proceedings of the 2006 IEEE International Symposium on Performance Analysis of Systems and Software, 2006

2005
PARE: a power-aware hardware data prefetching engine.
Proceedings of the 2005 International Symposium on Low Power Electronics and Design, 2005

2004
Energy-Aware Data Prefetching for General-Purpose Programs.
Proceedings of the Power-Aware Computer Systems, 4th International Workshop, 2004

Energy Characterization of Hardware-Based Data Prefetching.
Proceedings of the 22nd IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2004), 2004

2003
Runtime Biased Pointer Reuse Analysis and Its Application to Energy Efficiency.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003

1998
Experiences in Building c++ Front End.
ACM SIGPLAN Notices, 1998


  Loading...