Zhushou Tang

According to our database1, Zhushou Tang authored at least 12 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Measuring and Understanding Crowdturfing in the App Store.
Inf., 2023

2022
Measurement of the Usage of Web Clips in Underground Economy.
CoRR, 2022

2021
When Similarity Digest Meets Vector Management System: A Survey on Similarity Hash Function.
CoRR, 2021

Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE.
CoRR, 2021

2020
iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Securing android applications via edge assistant third-party library detection.
Comput. Secur., 2019

A large-scale empirical study on industrial fake apps.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering in Practice, 2019

2017
When program analysis meets mobile security: an industrial study of misusing Android internet sockets.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

2016
Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2013
Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2011
DsVD: An Effective Low-Overhead Dynamic Software Vulnerability Discoverer.
Proceedings of the 10th International Symposium on Autonomous Decentralized Systems, 2011


  Loading...